期刊文献+
共找到268,432篇文章
< 1 2 250 >
每页显示 20 50 100
Solar Radiation Estimation Based on a New Combined Approach of Artificial Neural Networks (ANN) and Genetic Algorithms (GA) in South Algeria
1
作者 Djeldjli Halima Benatiallah Djelloul +3 位作者 Ghasri Mehdi Tanougast Camel Benatiallah Ali Benabdelkrim Bouchra 《Computers, Materials & Continua》 SCIE EI 2024年第6期4725-4740,共16页
When designing solar systems and assessing the effectiveness of their many uses,estimating sun irradiance is a crucial first step.This study examined three approaches(ANN,GA-ANN,and ANFIS)for estimating daily global s... When designing solar systems and assessing the effectiveness of their many uses,estimating sun irradiance is a crucial first step.This study examined three approaches(ANN,GA-ANN,and ANFIS)for estimating daily global solar radiation(GSR)in the south of Algeria:Adrar,Ouargla,and Bechar.The proposed hybrid GA-ANN model,based on genetic algorithm-based optimization,was developed to improve the ANN model.The GA-ANN and ANFIS models performed better than the standalone ANN-based model,with GA-ANN being better suited for forecasting in all sites,and it performed the best with the best values in the testing phase of Coefficient of Determination(R=0.9005),Mean Absolute Percentage Error(MAPE=8.40%),and Relative Root Mean Square Error(rRMSE=12.56%).Nevertheless,the ANFIS model outperformed the GA-ANN model in forecasting daily GSR,with the best values of indicators when testing the model being R=0.9374,MAPE=7.78%,and rRMSE=10.54%.Generally,we may conclude that the initial ANN stand-alone model performance when forecasting solar radiation has been improved,and the results obtained after injecting the genetic algorithm into the ANN to optimize its weights were satisfactory.The model can be used to forecast daily GSR in dry climates and other climates and may also be helpful in selecting solar energy system installations and sizes. 展开更多
关键词 Solar energy systems genetic algorithm neural networks hybrid adaptive neuro fuzzy inference system solar radiation
下载PDF
ADI模式下培养物理师范生科学推理能力实证研究
2
作者 高嵩 汪莹莹 蔡阳健 《高等理科教育》 2024年第4期45-56,共12页
当下培养师范生科学推理能力的课程往往脱离真实的科学探究,基于此,本研究对A师范大学物理师范专业“物理实验教学能力训练”课程进行了改革,引入论证驱动(argument-driven inquiry,简称ADI)的教学模式。在师范生进行了一学期的学习后,... 当下培养师范生科学推理能力的课程往往脱离真实的科学探究,基于此,本研究对A师范大学物理师范专业“物理实验教学能力训练”课程进行了改革,引入论证驱动(argument-driven inquiry,简称ADI)的教学模式。在师范生进行了一学期的学习后,应用认知网络分析法分析了他们科学推理能力的变化情况。结果表明,本教学模式可以很好地提升师范生的科学推理能力。这为在真实科学探究活动中培养师范生的科学推理能力、提升师范生的素质提供了一个可行方案。 展开更多
关键词 科学推理 adi 师范生 物理实验 认知网络分析
下载PDF
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
3
作者 Shehab Abdulhabib Alzaeemi Kim Gaik Tay +2 位作者 Audrey Huong Saratha Sathasivam Majid Khan bin Majahar Ali 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期1163-1184,共22页
Radial Basis Function Neural Network(RBFNN)ensembles have long suffered from non-efficient training,where incorrect parameter settings can be computationally disastrous.This paper examines different evolutionary algor... Radial Basis Function Neural Network(RBFNN)ensembles have long suffered from non-efficient training,where incorrect parameter settings can be computationally disastrous.This paper examines different evolutionary algorithms for training the Symbolic Radial Basis Function Neural Network(SRBFNN)through the behavior’s integration of satisfiability programming.Inspired by evolutionary algorithms,which can iteratively find the nearoptimal solution,different Evolutionary Algorithms(EAs)were designed to optimize the producer output weight of the SRBFNN that corresponds to the embedded logic programming 2Satisfiability representation(SRBFNN-2SAT).The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms,including Genetic Algorithm(GA),Evolution Strategy Algorithm(ES),Differential Evolution Algorithm(DE),and Evolutionary Programming Algorithm(EP).Each of these methods is presented in the steps in the flowchart form which can be used for its straightforward implementation in any programming language.With the use of SRBFNN-2SAT,a training method based on these algorithms has been presented,then training has been compared among algorithms,which were applied in Microsoft Visual C++software using multiple metrics of performance,including Mean Absolute Relative Error(MARE),Root Mean Square Error(RMSE),Mean Absolute Percentage Error(MAPE),Mean Bias Error(MBE),Systematic Error(SD),Schwarz Bayesian Criterion(SBC),and Central Process Unit time(CPU time).Based on the results,the EP algorithm achieved a higher training rate and simple structure compared with the rest of the algorithms.It has been confirmed that the EP algorithm is quite effective in training and obtaining the best output weight,accompanied by the slightest iteration error,which minimizes the objective function of SRBFNN-2SAT. 展开更多
关键词 Satisfiability logic programming symbolic radial basis function neural network evolutionary programming algorithm genetic algorithm evolution strategy algorithm differential evolution algorithm
下载PDF
从标准的制修订看ADI生产技术的进步
4
作者 闫启栋 王静 +1 位作者 李强 刘金城 《铸造》 CAS 2024年第1期53-59,共7页
等温淬火球墨铸铁(ADI)由于具有高强度、高韧性、抗疲劳及耐磨、抗磨等综合性能,为21世纪人们关注的热点和最具发展潜力的材料之一。国外ADI的生产技术及应用发展较快,相关标准制定和更新比较及时而且不断完善。随着国内ADI生产技术水... 等温淬火球墨铸铁(ADI)由于具有高强度、高韧性、抗疲劳及耐磨、抗磨等综合性能,为21世纪人们关注的热点和最具发展潜力的材料之一。国外ADI的生产技术及应用发展较快,相关标准制定和更新比较及时而且不断完善。随着国内ADI生产技术水平的提高,我国ADI等温淬火球墨铸铁件的标准从早期的企业标准到国家标准、团体标准,形成了不同层级的标准体系。2009年我国发布了GB/T 24733—2009《等温淬火球墨铸铁件》,2021年发布了团体标准T/CFA 020101243—2021《等温淬火球墨铸铁件》;2022年又对GB/T 24733《等温淬火球墨铸铁件》进行了修订。从不同层级的标准制修订技术指标的提高可以看出我国ADI生产技术近十年来取得的进步。 展开更多
关键词 等温淬火球墨铸铁 材料 标准
下载PDF
Rao Algorithms-Based Structure Optimization for Heterogeneous Wireless Sensor Networks 被引量:1
5
作者 Shereen K.Refaay Samia A.Ali +2 位作者 Moumen T.El-Melegy Louai A.Maghrabi Hamdy H.El-Sayed 《Computers, Materials & Continua》 SCIE EI 2024年第1期873-897,共25页
The structural optimization of wireless sensor networks is a critical issue because it impacts energy consumption and hence the network’s lifetime.Many studies have been conducted for homogeneous networks,but few hav... The structural optimization of wireless sensor networks is a critical issue because it impacts energy consumption and hence the network’s lifetime.Many studies have been conducted for homogeneous networks,but few have been performed for heterogeneouswireless sensor networks.This paper utilizes Rao algorithms to optimize the structure of heterogeneous wireless sensor networks according to node locations and their initial energies.The proposed algorithms lack algorithm-specific parameters and metaphorical connotations.The proposed algorithms examine the search space based on the relations of the population with the best,worst,and randomly assigned solutions.The proposed algorithms can be evaluated using any routing protocol,however,we have chosen the well-known routing protocols in the literature:Low Energy Adaptive Clustering Hierarchy(LEACH),Power-Efficient Gathering in Sensor Information Systems(PEAGSIS),Partitioned-based Energy-efficient LEACH(PE-LEACH),and the Power-Efficient Gathering in Sensor Information Systems Neural Network(PEAGSIS-NN)recent routing protocol.We compare our optimized method with the Jaya,the Particle Swarm Optimization-based Energy Efficient Clustering(PSO-EEC)protocol,and the hybrid Harmony Search Algorithm and PSO(HSA-PSO)algorithms.The efficiencies of our proposed algorithms are evaluated by conducting experiments in terms of the network lifetime(first dead node,half dead nodes,and last dead node),energy consumption,packets to cluster head,and packets to the base station.The experimental results were compared with those obtained using the Jaya optimization algorithm.The proposed algorithms exhibited the best performance.The proposed approach successfully prolongs the network lifetime by 71% for the PEAGSIS protocol,51% for the LEACH protocol,10% for the PE-LEACH protocol,and 73% for the PEGSIS-NN protocol;Moreover,it enhances other criteria such as energy conservation,fitness convergence,packets to cluster head,and packets to the base station. 展开更多
关键词 Wireless sensor networks Rao algorithms OPTIMIZATION LEACH PEAGSIS
下载PDF
DOUBLE INERTIAL PROXIMAL GRADIENT ALGORITHMS FOR CONVEX OPTIMIZATION PROBLEMS AND APPLICATIONS
6
作者 Kunrada KANKAM Prasit CHOLAMJIAK 《Acta Mathematica Scientia》 SCIE CSCD 2023年第3期1462-1476,共15页
In this paper, we propose double inertial forward-backward algorithms for solving unconstrained minimization problems and projected double inertial forward-backward algorithms for solving constrained minimization prob... In this paper, we propose double inertial forward-backward algorithms for solving unconstrained minimization problems and projected double inertial forward-backward algorithms for solving constrained minimization problems. We then prove convergence theorems under mild conditions. Finally, we provide numerical experiments on image restoration problem and image inpainting problem. The numerical results show that the proposed algorithms have more efficient than known algorithms introduced in the literature. 展开更多
关键词 weak convergence forward-backward algorithm convex minimization inertial technique
下载PDF
基于ADI格式的多尺度图像分解
7
作者 罗肖义 韩欢 张贻民 《数学物理学报(A辑)》 CSCD 北大核心 2024年第1期160-172,共13页
针对文献[Xu R et al.,IEEE Trans.Biomed.Eng.,2014]的多尺度图像分解模型,该文提出了Alternating Direction Implicit (ADI)格式下的多尺度图像分解算法,并证明了在该模型下ADI格式的收敛性和稳定性,进一步,通过对不同图像的数值实验... 针对文献[Xu R et al.,IEEE Trans.Biomed.Eng.,2014]的多尺度图像分解模型,该文提出了Alternating Direction Implicit (ADI)格式下的多尺度图像分解算法,并证明了在该模型下ADI格式的收敛性和稳定性,进一步,通过对不同图像的数值实验,验证了该文提出的算法具有更好的纹理提取效果. 展开更多
关键词 变分模型 图像分解 adi 多尺度
下载PDF
A Review of the Current Task Offloading Algorithms,Strategies and Approach in Edge Computing Systems
8
作者 Abednego Acheampong Yiwen Zhang +1 位作者 Xiaolong Xu Daniel Appiah Kumah 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第1期35-88,共54页
Task offloading is an important concept for edge computing and the Internet of Things(IoT)because computationintensive tasksmust beoffloaded tomore resource-powerful remote devices.Taskoffloading has several advantage... Task offloading is an important concept for edge computing and the Internet of Things(IoT)because computationintensive tasksmust beoffloaded tomore resource-powerful remote devices.Taskoffloading has several advantages,including increased battery life,lower latency,and better application performance.A task offloading method determines whether sections of the full application should be run locally or offloaded for execution remotely.The offloading choice problem is influenced by several factors,including application properties,network conditions,hardware features,and mobility,influencing the offloading system’s operational environment.This study provides a thorough examination of current task offloading and resource allocation in edge computing,covering offloading strategies,algorithms,and factors that influence offloading.Full offloading and partial offloading strategies are the two types of offloading strategies.The algorithms for task offloading and resource allocation are then categorized into two parts:machine learning algorithms and non-machine learning algorithms.We examine and elaborate on algorithms like Supervised Learning,Unsupervised Learning,and Reinforcement Learning(RL)under machine learning.Under the non-machine learning algorithm,we elaborate on algorithms like non(convex)optimization,Lyapunov optimization,Game theory,Heuristic Algorithm,Dynamic Voltage Scaling,Gibbs Sampling,and Generalized Benders Decomposition(GBD).Finally,we highlight and discuss some research challenges and issues in edge computing. 展开更多
关键词 Task offloading machine learning algorithm game theory dynamic voltage scaling
下载PDF
Identification of High-Risk Scenarios for Cascading Failures in New Energy Power Grids Based on Deep Embedding Clustering Algorithms
9
作者 Xueting Cheng Ziqi Zhang +1 位作者 Yueshuang Bao Huiping Zheng 《Energy Engineering》 EI 2023年第11期2517-2529,共13页
At present,the proportion of new energy in the power grid is increasing,and the random fluctuations in power output increase the risk of cascading failures in the power grid.In this paper,we propose a method for ident... At present,the proportion of new energy in the power grid is increasing,and the random fluctuations in power output increase the risk of cascading failures in the power grid.In this paper,we propose a method for identifying high-risk scenarios of interlocking faults in new energy power grids based on a deep embedding clustering(DEC)algorithm and apply it in a risk assessment of cascading failures in different operating scenarios for new energy power grids.First,considering the real-time operation status and system structure of new energy power grids,the scenario cascading failure risk indicator is established.Based on this indicator,the risk of cascading failure is calculated for the scenario set,the scenarios are clustered based on the DEC algorithm,and the scenarios with the highest indicators are selected as the significant risk scenario set.The results of simulations with an example power grid show that our method can effectively identify scenarios with a high risk of cascading failures from a large number of scenarios. 展开更多
关键词 New energy power system deep embedding clustering algorithms cascading failures
下载PDF
基于ADI模型发展科学思维的初中生物学教学实践
10
作者 占迪专 《生物学教学》 北大核心 2024年第4期13-15,共3页
以“单细胞生物”为例,阐释运用ADI模型,让学生通过辨析“草履虫是细胞还是生物”这个引领式的话题,进行辩驳、质疑、论证等一系列思维碰撞,体验问题的生成、分析、论证到解决的完整学习过程,促使学生运用科学思维寻找解决问题的方法。
关键词 adi模型 单细胞生物 论证探究 科学思维
下载PDF
Enhancing Wireless Sensor Network Efficiency through Al-Biruni Earth Radius Optimization
11
作者 Reem Ibrahim Alkanhel Doaa Sami Khafaga +4 位作者 Ahmed Mohamed Zaki Marwa M.Eid Abdyalaziz A.Al-Mooneam Abdelhameed Ibrahim S.K.Towfek 《Computers, Materials & Continua》 SCIE EI 2024年第6期3549-3568,共20页
The networks of wireless sensors provide the ground for a range of applications,including environmental moni-toring and industrial operations.Ensuring the networks can overcome obstacles like power and communication r... The networks of wireless sensors provide the ground for a range of applications,including environmental moni-toring and industrial operations.Ensuring the networks can overcome obstacles like power and communication reliability and sensor coverage is the crux of network optimization.Network infrastructure planning should be focused on increasing performance,and it should be affected by the detailed data about node distribution.This work recommends the creation of each sensor’s specs and radius of influence based on a particular geographical location,which will contribute to better network planning and design.By using the ARIMA model for time series forecasting and the Al-Biruni Earth Radius algorithm for optimization,our approach bridges the gap between successive terrains while seeking the equilibrium between exploration and exploitation.Through implementing adaptive protocols according to varying environments and sensor constraints,our study aspires to improve overall network operation.We compare the Al-Biruni Earth Radius algorithm along with Gray Wolf Optimization,Particle Swarm Optimization,Genetic Algorithms,and Whale Optimization about performance on real-world problems.Being the most efficient in the optimization process,Biruni displays the lowest error rate at 0.00032.The two other statistical techniques,like ANOVA,are also useful in discovering the factors influencing the nature of sensor data and network-specific problems.Due to the multi-faceted support the comprehensive approach promotes,there is a chance to understand the dynamics that affect the optimization outcomes better so decisions about network design can be made.Through delivering better performance and reliability for various in-situ applications,this research leads to a fusion of time series forecasters and a customized optimizer algorithm. 展开更多
关键词 Wireless sensor networks OPTIMIZATION ARIMA model BER algorithm metaheuristic algorithms
下载PDF
Lightweight innovation ADIs help development of renewable energy and new technology industries in China
12
作者 Qi-dong Yan Xu-dong Gong +1 位作者 Wen-bang Gong Jin-cheng Liu 《China Foundry》 SCIE EI CAS CSCD 2024年第5期507-515,共9页
The world is undergoing profound changes in energy and technology.Countries are vigorously developing new sustainable energy sources and technologies.Renewable energy sources encompass various technologies such as win... The world is undergoing profound changes in energy and technology.Countries are vigorously developing new sustainable energy sources and technologies.Renewable energy sources encompass various technologies such as wind turbines,solar energy,nuclear energy,and bioenergy.Additionally,emerging technology fields include new energy vehicles,robots,and artificial intelligence devices,among others.The renewable energy industries and implementation of new technologies necessitate the development and adoption of new equipment and components.Austempered ductile iron(ADI)is renowned for its unique microstructure and superior properties.By utilizing ADI,lightweight and innovative castings can be designed to not only reduce weight but also save energy and decrease emissions.More importantly,these castings enhance the efficiency and reliability of new energy equipment and emerging technology installations.This paper describes the development,applications,and future prospects of lightweight and innovative ADI castings within sectors such as solar photovoltaic(PV),wind power generation,industry robots,and trucks in China. 展开更多
关键词 LIGHTWEIGHT adi renewable energy emission reduction
下载PDF
ADI材料滑动摩擦磨损性能的研究
13
作者 王成琪 王瑞 +4 位作者 宋坤林 张闰琦 张世琦 邓晗 张彬 《中国铸造装备与技术》 CAS 2024年第4期55-59,共5页
等温淬火球墨铸铁具有良好的耐磨性,采用销盘摩擦磨损试验机进行等温淬火球墨铸铁和中碳钢的滑动摩擦磨损性能试验,得到以下结论:在高速无风冷条件下,ADI材料滑动摩擦磨损性能低于中碳钢;低速有风冷条件下,ADI材料滑动摩擦磨损性能高于... 等温淬火球墨铸铁具有良好的耐磨性,采用销盘摩擦磨损试验机进行等温淬火球墨铸铁和中碳钢的滑动摩擦磨损性能试验,得到以下结论:在高速无风冷条件下,ADI材料滑动摩擦磨损性能低于中碳钢;低速有风冷条件下,ADI材料滑动摩擦磨损性能高于中碳钢。 展开更多
关键词 adi 中碳钢 滑动摩擦磨损 耐磨性
下载PDF
Optimizing Connections:Applied Shortest Path Algorithms for MANETs
14
作者 Ibrahim Alameri Jitka Komarkova +2 位作者 Tawfik Al-Hadhrami Abdulsamad Ebrahim Yahya Atef Gharbi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期787-807,共21页
This study is trying to address the critical need for efficient routing in Mobile Ad Hoc Networks(MANETs)from dynamic topologies that pose great challenges because of the mobility of nodes.Themain objective was to del... This study is trying to address the critical need for efficient routing in Mobile Ad Hoc Networks(MANETs)from dynamic topologies that pose great challenges because of the mobility of nodes.Themain objective was to delve into and refine the application of the Dijkstra’s algorithm in this context,a method conventionally esteemed for its efficiency in static networks.Thus,this paper has carried out a comparative theoretical analysis with the Bellman-Ford algorithm,considering adaptation to the dynamic network conditions that are typical for MANETs.This paper has shown through detailed algorithmic analysis that Dijkstra’s algorithm,when adapted for dynamic updates,yields a very workable solution to the problem of real-time routing in MANETs.The results indicate that with these changes,Dijkstra’s algorithm performs much better computationally and 30%better in routing optimization than Bellman-Ford when working with configurations of sparse networks.The theoretical framework adapted,with the adaptation of the Dijkstra’s algorithm for dynamically changing network topologies,is novel in this work and quite different from any traditional application.The adaptation should offer more efficient routing and less computational overhead,most apt in the limited resource environment of MANETs.Thus,from these findings,one may derive a conclusion that the proposed version of Dijkstra’s algorithm is the best and most feasible choice of the routing protocol for MANETs given all pertinent key performance and resource consumption indicators and further that the proposed method offers a marked improvement over traditional methods.This paper,therefore,operationalizes the theoretical model into practical scenarios and also further research with empirical simulations to understand more about its operational effectiveness. 展开更多
关键词 Dijkstra’s algorithm optimization complexity analysis shortest path first comparative algorithm analysis nondeterministic polynomial(NP)-complete
下载PDF
Intelligent Solution System for Cloud Security Based on Equity Distribution:Model and Algorithms
15
作者 Sarah Mustafa Eljack Mahdi Jemmali +3 位作者 Mohsen Denden Mutasim Al Sadig Abdullah M.Algashami Sadok Turki 《Computers, Materials & Continua》 SCIE EI 2024年第1期1461-1479,共19页
In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding ... In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding the risk of data loss and data overlapping.The development of data flow scheduling approaches in the cloud environment taking security parameters into account is insufficient.In our work,we propose a data scheduling model for the cloud environment.Themodel is made up of three parts that together help dispatch user data flow to the appropriate cloudVMs.The first component is the Collector Agent whichmust periodically collect information on the state of the network links.The second one is the monitoring agent which must then analyze,classify,and make a decision on the state of the link and finally transmit this information to the scheduler.The third one is the scheduler who must consider previous information to transfer user data,including fair distribution and reliable paths.It should be noted that each part of the proposedmodel requires the development of its algorithms.In this article,we are interested in the development of data transfer algorithms,including fairness distribution with the consideration of a stable link state.These algorithms are based on the grouping of transmitted files and the iterative method.The proposed algorithms showthe performances to obtain an approximate solution to the studied problem which is an NP-hard(Non-Polynomial solution)problem.The experimental results show that the best algorithm is the half-grouped minimum excluding(HME),with a percentage of 91.3%,an average deviation of 0.042,and an execution time of 0.001 s. 展开更多
关键词 Cyber-security cloud computing cloud security algorithms HEURISTICS
下载PDF
Topological optimization of ballistic protective structures through genetic algorithms in a vulnerability-driven environment
16
作者 Salvatore Annunziata Luca Lomazzi +1 位作者 Marco Giglio Andrea Manes 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第10期125-137,共13页
Reducing the vulnerability of a platform,i.e.,the risk of being affected by hostile objects,is of paramount importance in the design process of vehicles,especially aircraft.A simple and effective way to decrease vulne... Reducing the vulnerability of a platform,i.e.,the risk of being affected by hostile objects,is of paramount importance in the design process of vehicles,especially aircraft.A simple and effective way to decrease vulnerability is to introduce protective structures to intercept and possibly stop threats.However,this type of solution can lead to a significant increase in weight,affecting the performance of the aircraft.For this reason,it is crucial to study possible solutions that allow reducing the vulnerability of the aircraft while containing the increase in structural weight.One possible strategy is to optimize the topology of protective solutions to find the optimal balance between vulnerability and the weight of the added structures.Among the many optimization techniques available in the literature for this purpose,multiobjective genetic algorithms stand out as promising tools.In this context,this work proposes the use of a in-house software for vulnerability calculation to guide the process of topology optimization through multi-objective genetic algorithms,aiming to simultaneously minimize the weight of protective structures and vulnerability.In addition to the use of the in-house software,which itself represents a novelty in the field of topology optimization of structures,the method incorporates a custom mutation function within the genetic algorithm,specifically developed using a graph-based approach to ensure the continuity of the generated structures.The tool developed for this work is capable of generating protections with optimized layouts considering two different types of impacting objects,namely bullets and fragments from detonating objects.The software outputs a set of non-dominated solutions describing different topologies that the user can choose from. 展开更多
关键词 Topological optimization Protective structure Genetic algorithm SURVIVABILITY VULNERABILITY
下载PDF
Domain Knowledge Used in Meta-Heuristic Algorithms for the Job-Shop Scheduling Problem:Review and Analysis
17
作者 Lin Gui Xinyu Li +1 位作者 Qingfu Zhang Liang Gao 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2024年第5期1368-1389,共22页
Meta-heuristic algorithms search the problem solution space to obtain a satisfactory solution within a reasonable timeframe.By combining domain knowledge of the specific optimization problem,the search efficiency and ... Meta-heuristic algorithms search the problem solution space to obtain a satisfactory solution within a reasonable timeframe.By combining domain knowledge of the specific optimization problem,the search efficiency and quality of meta-heuristic algorithms can be significantly improved,making it crucial to identify and summarize domain knowledge within the problem.In this paper,we summarize and analyze domain knowledge that can be applied to meta-heuristic algorithms in the job-shop scheduling problem(JSP).Firstly,this paper delves into the importance of domain knowledge in optimization algorithm design.After that,the development of different methods for the JSP are reviewed,and the domain knowledge in it for meta-heuristic algorithms is summarized and classified.Applications of this domain knowledge are analyzed,showing it is indispensable in ensuring the optimization performance of meta-heuristic algorithms.Finally,this paper analyzes the relationship among domain knowledge,optimization problems,and optimization algorithms,and points out the shortcomings of the existing research and puts forward research prospects.This paper comprehensively summarizes the domain knowledge in the JSP,and discusses the relationship between the optimization problems,optimization algorithms and domain knowledge,which provides a research direction for the metaheuristic algorithm design for solving the JSP in the future. 展开更多
关键词 domain knowledge job-shop scheduling problem meta-heuristic algorithm
原文传递
ADI/CADI产品的生产与应用
18
作者 刘慧玲 侯晓华 《铸造工程》 2024年第S02期42-46,共5页
鉴于等温淬火球墨铸铁(ADI/CADI)具有优良的力学性能,已在工业发达国家得到越来越广泛的使用,概述了等温淬火球墨铸铁的发展历史、力学性能,介绍了球墨铸铁的等温淬火工艺及生产问题的解决措施。在此基础上,对典型等温淬火球墨铸铁件开... 鉴于等温淬火球墨铸铁(ADI/CADI)具有优良的力学性能,已在工业发达国家得到越来越广泛的使用,概述了等温淬火球墨铸铁的发展历史、力学性能,介绍了球墨铸铁的等温淬火工艺及生产问题的解决措施。在此基础上,对典型等温淬火球墨铸铁件开发、应用状况进行了阐述,认为ADI和CADI的生产应用水平不断提高。 展开更多
关键词 adi 球墨铸铁 等温淬火 应用
下载PDF
An Online Fake Review Detection Approach Using Famous Machine Learning Algorithms
19
作者 Asma Hassan Alshehri 《Computers, Materials & Continua》 SCIE EI 2024年第2期2767-2786,共20页
Online review platforms are becoming increasingly popular,encouraging dishonest merchants and service providers to deceive customers by creating fake reviews for their goods or services.Using Sybil accounts,bot farms,... Online review platforms are becoming increasingly popular,encouraging dishonest merchants and service providers to deceive customers by creating fake reviews for their goods or services.Using Sybil accounts,bot farms,and real account purchases,immoral actors demonize rivals and advertise their goods.Most academic and industry efforts have been aimed at detecting fake/fraudulent product or service evaluations for years.The primary hurdle to identifying fraudulent reviews is the lack of a reliable means to distinguish fraudulent reviews from real ones.This paper adopts a semi-supervised machine learning method to detect fake reviews on any website,among other things.Online reviews are classified using a semi-supervised approach(PU-learning)since there is a shortage of labeled data,and they are dynamic.Then,classification is performed using the machine learning techniques Support Vector Machine(SVM)and Nave Bayes.The performance of the suggested system has been compared with standard works,and experimental findings are assessed using several assessment metrics. 展开更多
关键词 SECURITY fake review semi-supervised learning ML algorithms review detection
下载PDF
Uniaxial Compressive Strength Prediction for Rock Material in Deep Mine Using Boosting-Based Machine Learning Methods and Optimization Algorithms
20
作者 Junjie Zhao Diyuan Li +1 位作者 Jingtai Jiang Pingkuang Luo 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期275-304,共30页
Traditional laboratory tests for measuring rock uniaxial compressive strength(UCS)are tedious and timeconsuming.There is a pressing need for more effective methods to determine rock UCS,especially in deep mining envir... Traditional laboratory tests for measuring rock uniaxial compressive strength(UCS)are tedious and timeconsuming.There is a pressing need for more effective methods to determine rock UCS,especially in deep mining environments under high in-situ stress.Thus,this study aims to develop an advanced model for predicting the UCS of rockmaterial in deepmining environments by combining three boosting-basedmachine learning methods with four optimization algorithms.For this purpose,the Lead-Zinc mine in Southwest China is considered as the case study.Rock density,P-wave velocity,and point load strength index are used as input variables,and UCS is regarded as the output.Subsequently,twelve hybrid predictive models are obtained.Root mean square error(RMSE),mean absolute error(MAE),coefficient of determination(R2),and the proportion of the mean absolute percentage error less than 20%(A-20)are selected as the evaluation metrics.Experimental results showed that the hybridmodel consisting of the extreme gradient boostingmethod and the artificial bee colony algorithm(XGBoost-ABC)achieved satisfactory results on the training dataset and exhibited the best generalization performance on the testing dataset.The values of R2,A-20,RMSE,and MAE on the training dataset are 0.98,1.0,3.11 MPa,and 2.23MPa,respectively.The highest values of R2 and A-20(0.93 and 0.96),and the smallest RMSE and MAE values of 4.78 MPa and 3.76MPa,are observed on the testing dataset.The proposed hybrid model can be considered a reliable and effective method for predicting rock UCS in deep mines. 展开更多
关键词 Uniaxial compression strength strength prediction machine learning optimization algorithm
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部