期刊文献+
共找到2,953篇文章
< 1 2 148 >
每页显示 20 50 100
Distributed Computation Models for Data Fusion System Simulation
1
作者 张岩 曾涛 +1 位作者 龙腾 崔智社 《Journal of Beijing Institute of Technology》 EI CAS 2001年第3期291-297,共7页
An attempt has been made to develop a distributed software infrastructure model for onboard data fusion system simulation, which is also applied to netted radar systems, onboard distributed detection systems and advan... An attempt has been made to develop a distributed software infrastructure model for onboard data fusion system simulation, which is also applied to netted radar systems, onboard distributed detection systems and advanced C3I systems. Two architectures are provided and verified: one is based on pure TCP/IP protocol and C/S model, and implemented with Winsock, the other is based on CORBA (common object request broker architecture). The performance of data fusion simulation system, i.e. reliability, flexibility and scalability, is improved and enhanced by two models. The study of them makes valuable explore on incorporating the distributed computation concepts into radar system simulation techniques. 展开更多
关键词 radar system computer network data fusion SIMULATION distributed computation
下载PDF
Research on the Distributed Data Mining Cloud Framework Oriented Internet of Things
2
作者 Guan Wei Lu Hui-Juan +1 位作者 Chen Jing-Jing Wu Jie 《International Journal of Technology Management》 2014年第8期106-108,共3页
The rapid development of Internet of Things imposes new requirements on the data mining system, due to the weak capability of traditional distributed networking data mining. To meet the needs of the Internet of Things... The rapid development of Internet of Things imposes new requirements on the data mining system, due to the weak capability of traditional distributed networking data mining. To meet the needs of the Internet of Things, this paper proposes a novel distributed data-mining model to realize the seamless access between cloud computing and distributed data mining. The model is based on the cloud computing architecture, which belongs to the type of incredible nodes. 展开更多
关键词 cloud computing data mining Intemet of things
下载PDF
The diagnostic rules of peripheral lung cancer preliminary study based on data mining technique 被引量:5
3
作者 Yongqian Qiang Youmin Guo +3 位作者 Xue Li Qiuping Wang Hao Chen Duwu Cui 《Journal of Nanjing Medical University》 2007年第3期190-195,共6页
Objective: To discuss the clinical and imaging diagnostic rules of peripheral lung cancer by data mining technique, and to explore new ideas in the diagnosis of peripheral lung cancer, and to obtain early-stage techn... Objective: To discuss the clinical and imaging diagnostic rules of peripheral lung cancer by data mining technique, and to explore new ideas in the diagnosis of peripheral lung cancer, and to obtain early-stage technology and knowledge support of computer-aided detecting (CAD). Methods: 58 cases of peripheral lung cancer confirmed by clinical pathology were collected. The data were imported into the database after the standardization of the clinical and CT findings attributes were identified. The data was studied comparatively based on Association Rules (AR) of the knowledge discovery process and the Rough Set (RS) reduction algorithm and Genetic Algorithm(GA) of the generic data analysis tool (ROSETTA), respectively. Results: The genetic classification algorithm of ROSETTA generates 5 000 or so diagnosis rules. The RS reduction algorithm of Johnson's Algorithm generates 51 diagnosis rules and the AR algorithm generates 123 diagnosis rules. Three data mining methods basically consider gender, age, cough, location, lobulation sign, shape, ground-glass density attributes as the main basis for the diagnosis of peripheral lung cancer. Conclusion: These diagnosis rules for peripheral lung cancer with three data mining technology is same as clinical diagnostic rules, and these rules also can be used to build the knowledge base of expert system. This study demonstrated the potential values of data mining technology in clinical imaging diagnosis and differential diagnosis. 展开更多
关键词 peripheral lung cancer TOMOGRAPHY X-ray computed data mining computer aided detecting(CAD)
下载PDF
Data Mining and Machine Learning Methods Applied to A Numerical Clinching Model
4
作者 Marco Gotz Ferenc Leichsenring +5 位作者 Thomas Kropp Peter Müller Tobias Falk Wolfgang Graf Michael Kaliske Welf-Guntram Drossel 《Computer Modeling in Engineering & Sciences》 SCIE EI 2018年第12期387-423,共37页
Numerical mechanical models used for design of structures and processes are very complex and high-dimensionally parametrised.The understanding of the model characteristics is of interest for engineering tasks and subs... Numerical mechanical models used for design of structures and processes are very complex and high-dimensionally parametrised.The understanding of the model characteristics is of interest for engineering tasks and subsequently for an efficient design.Multiple analysis methods are known and available to gain insight into existing models.In this contribution,selected methods from various fields are applied to a real world mechanical engineering example of a currently developed clinching process.The selection of introduced methods comprises techniques of machine learning and data mining,in which the utilization is aiming at a decreased numerical effort.The methods of choice are basically discussed and references are given as well as challenges in the context of meta-modelling and sensitivities are shown.An incremental knowledge gain is provided by a step-bystep application of the numerical methods,whereas resulting consequences for further applications are highlighted.Furthermore,a visualisation method aiming at an easy design guideline is proposed.These visual decision maps incorporate the uncertainty coming from the reduction of dimensionality and can be applied in early stage of design. 展开更多
关键词 DESIGN data mining computational intelligence META-MODELLING permissible design space sensitivity analysis self-organizing maps inverse problem early stage of design CLINCHING
下载PDF
Research on Privacy Preserving Data Mining
5
作者 Pingshui Wang Tao Chen Zecheng Wang 《Journal of Information Hiding and Privacy Protection》 2019年第2期61-68,共8页
In recent years,with the explosive development in Internet,data storage and data processing technologies,privacy preservation has been one of the greater concerns in data mining.A number of methods and techniques have... In recent years,with the explosive development in Internet,data storage and data processing technologies,privacy preservation has been one of the greater concerns in data mining.A number of methods and techniques have been developed for privacy preserving data mining.This paper provided a wide survey of different privacy preserving data mining algorithms and analyzed the representative techniques for privacy preservation.The existing problems and directions for future research are also discussed. 展开更多
关键词 Privacy preserving data mining RANDOMIZATION ANONYMIZATION secure multiparty computation
下载PDF
Data Mining in Electronic Commerce: Benefits and Challenges
6
作者 Mustapha Ismail Mohammed Mansur Ibrahim +1 位作者 Zayyan Mahmoud Sanusi Muesser Nat 《International Journal of Communications, Network and System Sciences》 2015年第12期501-509,共9页
Huge volume of structured and unstructured data which is called big data, nowadays, provides opportunities for companies especially those that use electronic commerce (e-commerce). The data is collected from customer... Huge volume of structured and unstructured data which is called big data, nowadays, provides opportunities for companies especially those that use electronic commerce (e-commerce). The data is collected from customer’s internal processes, vendors, markets and business environment. This paper presents a data mining (DM) process for e-commerce including the three common algorithms: association, clustering and prediction. It also highlights some of the benefits of DM to e-commerce companies in terms of merchandise planning, sale forecasting, basket analysis, customer relationship management and market segmentation which can be achieved with the three data mining algorithms. The main aim of this paper is to review the application of data mining in e-commerce by focusing on structured and unstructured data collected thorough various resources and cloud computing services in order to justify the importance of data mining. Moreover, this study evaluates certain challenges of data mining like spider identification, data transformations and making data model comprehensible to business users. Other challenges which are supporting the slow changing dimensions of data, making the data transformation and model building accessible to business users are also evaluated. A clear guide to e-commerce companies sitting on huge volume of data to easily manipulate the data for business improvement which in return will place them highly competitive among their competitors is also provided in this paper. 展开更多
关键词 data mining BIG data E-COMMERCE CLOUD Computing
下载PDF
Research on the Big Data Cloud Computing Based on the Network Data Mining
7
作者 ZHANG Haiyang ZHANG Zhiwei 《International English Education Research》 2019年第2期72-74,共3页
The big data cloud computing is a new computing mode,which integrates the distributed processing,the parallel processing,the network computing,the virtualization technology,the load balancing and other network technol... The big data cloud computing is a new computing mode,which integrates the distributed processing,the parallel processing,the network computing,the virtualization technology,the load balancing and other network technologies.Under the operation of the big data cloud computing system,the computing resources can be distributed in a resource pool composed of a large number of the computers,allowing users to connect with the remote computer systems according to their own data information needs. 展开更多
关键词 NETWORK data mining BIG data CLOUD computing technology processing
下载PDF
Improves Treatment Programs of Lung Cancer Using Data Mining Techniques
8
作者 Zakaria Suliman Zubi Rema Asheibani Saad 《Journal of Software Engineering and Applications》 2014年第2期69-77,共9页
Lung cancer is a deadly disease, but there is a big chance for the patient to be cured if he or she is correctly diagnosed in early stage of his or her case. At a first glance, lung X-ray chest films being considered ... Lung cancer is a deadly disease, but there is a big chance for the patient to be cured if he or she is correctly diagnosed in early stage of his or her case. At a first glance, lung X-ray chest films being considered as the most reliable method in early detection of lung cancers, the serious mistake in some diagnosing cases giving bad results and causing the death, the computer aided diagnosis systems are necessary to support the medical staff to achieve high capability and effectiveness. Clinicians could predict patient’s behavior future and improve treatment programs by using data mining techniques and they can be better managing the health of patients today, in addition they do not become the problems of tomorrow. The lung cancer biological database which contains the medical images (chest X-ray) classifies the digital X-ray chest films into three categories: normal, benign and malignant. The normal ones are those characterizing a healthy patient (non nodules);, lung nodules can be either benign (non-cancerous) or malignant (cancer). Two steps are major in computer-aided diagnosis systems: pattern recognition approach, which is a combination of a feature extraction process and a classification process using neural network classifier. 展开更多
关键词 COMPUTER Aided Diagnosis Systems data mining Classification Image RECOGNITION NEURAL Networks
下载PDF
An Adaptive Privacy Preserving Framework for Distributed Association Rule Mining in Healthcare Databases
9
作者 Hasanien K.Kuba Mustafa A.Azzawi +2 位作者 Saad M.Darwish Oday A.Hassen Ansam A.Abdulhussein 《Computers, Materials & Continua》 SCIE EI 2023年第2期4119-4133,共15页
It is crucial,while using healthcare data,to assess the advantages of data privacy against the possible drawbacks.Data from several sources must be combined for use in many data mining applications.The medical practit... It is crucial,while using healthcare data,to assess the advantages of data privacy against the possible drawbacks.Data from several sources must be combined for use in many data mining applications.The medical practitioner may use the results of association rule mining performed on this aggregated data to better personalize patient care and implement preventive measures.Historically,numerous heuristics(e.g.,greedy search)and metaheuristics-based techniques(e.g.,evolutionary algorithm)have been created for the positive association rule in privacy preserving data mining(PPDM).When it comes to connecting seemingly unrelated diseases and drugs,negative association rules may be more informative than their positive counterparts.It is well-known that during negative association rules mining,a large number of uninteresting rules are formed,making this a difficult problem to tackle.In this research,we offer an adaptive method for negative association rule mining in vertically partitioned healthcare datasets that respects users’privacy.The applied approach dynamically determines the transactions to be interrupted for information hiding,as opposed to predefining them.This study introduces a novel method for addressing the problem of negative association rules in healthcare data mining,one that is based on the Tabu-genetic optimization paradigm.Tabu search is advantageous since it removes a huge number of unnecessary rules and item sets.Experiments using benchmark healthcare datasets prove that the discussed scheme outperforms state-of-the-art solutions in terms of decreasing side effects and data distortions,as measured by the indicator of hiding failure. 展开更多
关键词 distributed data mining evolutionary computation sanitization process healthcare informatics
下载PDF
Information mining and similarity computation for semi-/un-structured sentences from the social data 被引量:1
10
作者 Peiying Zhang Xingzhe Huang Lei Zhang 《Digital Communications and Networks》 SCIE CSCD 2021年第4期518-525,共8页
In recent years,with the development of the social Internet of Things(IoT),all kinds of data accumulated on the network.These data,which contain a lot of social information and opinions.However,these data are rarely f... In recent years,with the development of the social Internet of Things(IoT),all kinds of data accumulated on the network.These data,which contain a lot of social information and opinions.However,these data are rarely fully analyzed,which is a major obstacle to the intelligent development of the social IoT.In this paper,we propose a sentence similarity analysis model to analyze the similarity in people’s opinions on hot topics in social media and news pages.Most of these data are unstructured or semi-structured sentences,so the accuracy of sentence similarity analysis largely determines the model’s performance.For the purpose of improving accuracy,we propose a novel method of sentence similarity computation to extract the syntactic and semantic information of the semi-structured and unstructured sentences.We mainly consider the subjects,predicates and objects of sentence pairs and use Stanford Parser to classify the dependency relation triples to calculate the syntactic and semantic similarity between two sentences.Finally,we verify the performance of the model with the Microsoft Research Paraphrase Corpus(MRPC),which consists of 4076 pairs of training sentences and 1725 pairs of test sentences,and most of the data came from the news of social data.Extensive simulations demonstrate that our method outperforms other state-of-the-art methods regarding the correlation coefficient and the mean deviation. 展开更多
关键词 Sentence similarity computation Information mining and computation Social data Internet of things Type of sentence pairs
下载PDF
Parallel Computation of Fourier Transform on Distributed Memory Computer System
11
作者 Yihui Yan Qingfeng Hu Xinfang He 《Wuhan University Journal of Natural Sciences》 CAS 1996年第Z1期557-560,共4页
Multicomputer systems(distributed memory computer systems) are becoming more and more popular and will be wildly used in scientific researches. In this paper, we present a parallel algorithm of Fourier Transform of a ... Multicomputer systems(distributed memory computer systems) are becoming more and more popular and will be wildly used in scientific researches. In this paper, we present a parallel algorithm of Fourier Transform of a vector of complex numbers on multicomputer system and give its computing times and its speedup in parallel environment supported by EXPRESS system on the multicomputer system which consists of four SGI workstations. Our analysis shows that the results is ideal and this scheme is suitable to multicomputer systems. 展开更多
关键词 Fourier Transform distributed Memory Computer System parallel Computing
下载PDF
Fortifying Healthcare Data Security in the Cloud:A Comprehensive Examination of the EPM-KEA Encryption Protocol
12
作者 Umi Salma Basha Shashi Kant Gupta +2 位作者 Wedad Alawad SeongKi Kim Salil Bharany 《Computers, Materials & Continua》 SCIE EI 2024年第5期3397-3416,共20页
A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is stil... A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconcern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentialityand integrity of healthcare data in the cloud. The computational overhead of encryption technologies could leadto delays in data access and processing rates. To address these challenges, we introduced the Enhanced ParallelMulti-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate the securestorage of critical patient records in the cloud. The data was gathered from two categories Authorization forHospital Admission (AIH) and Authorization for High Complexity Operations.We use Z-score normalization forpreprocessing. The primary goal of implementing encryption techniques is to secure and store massive amountsof data on the cloud. It is feasible that cloud storage alternatives for protecting healthcare data will become morewidely available if security issues can be successfully fixed. As a result of our analysis using specific parametersincluding Execution time (42%), Encryption time (45%), Decryption time (40%), Security level (97%), and Energyconsumption (53%), the system demonstrated favorable performance when compared to the traditional method.This suggests that by addressing these security concerns, there is the potential for broader accessibility to cloudstorage solutions for safeguarding healthcare data. 展开更多
关键词 Cloud computing healthcare data security enhanced parallel multi-key encryption algorithm(EPM-KEA)
下载PDF
Performance improvement of optimization solutions by POD-based data mining 被引量:3
13
作者 Yanhui DUAN Wenhua WU +4 位作者 Peihong ZHANG Fulin TONG Zhaolin FAN Guiyu ZHOU Jiaqi LUO 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2019年第4期826-838,共13页
The performance of an optimized aerodynamic shape is further improved by a second-step optimization using the design knowledge discovered by a data mining technique based on Proper Orthogonal Decomposition(POD) in the... The performance of an optimized aerodynamic shape is further improved by a second-step optimization using the design knowledge discovered by a data mining technique based on Proper Orthogonal Decomposition(POD) in the present study. Data generated in the first-step optimization by using evolution algorithms is saved as the source data, among which the superior data with improved objectives and maintained constraints is chosen. Only the geometry components of the superior data are picked out and used for constructing the snapshots of POD. Geometry characteristics of the superior data illustrated by POD bases are the design knowledge, by which the second-step optimization can be rapidly achieved. The optimization methods are demonstrated by redesigning a transonic compressor rotor blade, NASA Rotor 37, in the study to maximize the peak adiabatic efficiency, while maintaining the total pressure ratio and mass flow rate.Firstly, the blade is redesigned by using a particle swarm optimization method, and the adiabatic efficiency is increased by 1.29%. Then, the second-step optimization is performed by using the design knowledge, and a 0.25% gain on the adiabatic efficiency is obtained. The results are presented and addressed in detail, demonstrating that geometry variations significantly change the pattern and strength of the shock wave in the blade passage. The former reduces the separation loss,while the latter reduces the shock loss, and both favor an increase of the adiabatic efficiency. 展开更多
关键词 Aerodynamic shape optimization computational fluid dynamics data mining Particle swarm optimization Proper Orthogonal Decomposition Transonic flow TURBOMACHINERY
原文传递
Parallelized Jaccard-Based Learning Method and MapReduce Implementation for Mobile Devices Recognition from Massive Network Data 被引量:2
14
作者 刘军 李银周 +2 位作者 Felix Cuadrado Steve Uhlig 雷振明 《China Communications》 SCIE CSCD 2013年第7期71-84,共14页
The ability of accurate and scalable mobile device recognition is critically important for mobile network operators and ISPs to understand their customers' behaviours and enhance their user experience.In this pape... The ability of accurate and scalable mobile device recognition is critically important for mobile network operators and ISPs to understand their customers' behaviours and enhance their user experience.In this paper,we propose a novel method for mobile device model recognition by using statistical information derived from large amounts of mobile network traffic data.Specifically,we create a Jaccardbased coefficient measure method to identify a proper keyword representing each mobile device model from massive unstructured textual HTTP access logs.To handle the large amount of traffic data generated from large mobile networks,this method is designed as a set of parallel algorithms,and is implemented through the MapReduce framework which is a distributed parallel programming model with proven low-cost and high-efficiency features.Evaluations using real data sets show that our method can accurately recognise mobile client models while meeting the scalability and producer-independency requirements of large mobile network operators.Results show that a 91.5% accuracy rate is achieved for recognising mobile client models from 2 billion records,which is dramatically higher than existing solutions. 展开更多
关键词 mobile device recognition data mining Jaccard coefficient measurement distributed computing MAPREDUCE
下载PDF
Fast modeling of gravity gradients from topographic surface data using GPU parallel algorithm 被引量:1
15
作者 Xuli Tan Qingbin Wang +2 位作者 Jinkai Feng Yan Huang Ziyan Huang 《Geodesy and Geodynamics》 CSCD 2021年第4期288-297,共10页
The gravity gradient is a secondary derivative of gravity potential,containing more high-frequency information of Earth’s gravity field.Gravity gradient observation data require deducting its prior and intrinsic part... The gravity gradient is a secondary derivative of gravity potential,containing more high-frequency information of Earth’s gravity field.Gravity gradient observation data require deducting its prior and intrinsic parts to obtain more variational information.A model generated from a topographic surface database is more appropriate to represent gradiometric effects derived from near-surface mass,as other kinds of data can hardly reach the spatial resolution requirement.The rectangle prism method,namely an analytic integration of Newtonian potential integrals,is a reliable and commonly used approach to modeling gravity gradient,whereas its computing efficiency is extremely low.A modified rectangle prism method and a graphical processing unit(GPU)parallel algorithm were proposed to speed up the modeling process.The modified method avoided massive redundant computations by deforming formulas according to the symmetries of prisms’integral regions,and the proposed algorithm parallelized this method’s computing process.The parallel algorithm was compared with a conventional serial algorithm using 100 elevation data in two topographic areas(rough and moderate terrain).Modeling differences between the two algorithms were less than 0.1 E,which is attributed to precision differences between single-precision and double-precision float numbers.The parallel algorithm showed computational efficiency approximately 200 times higher than the serial algorithm in experiments,demonstrating its effective speeding up in the modeling process.Further analysis indicates that both the modified method and computational parallelism through GPU contributed to the proposed algorithm’s performances in experiments. 展开更多
关键词 Gravity gradient Topographic surface data Rectangle prism method parallel computation Graphical processing unit(GPU)
下载PDF
MobSafe:Cloud Computing Based Forensic Analysis for Massive Mobile Applications Using Data Mining 被引量:2
16
作者 Jianlin Xu Yifan Yu +4 位作者 Zhen Chen Bin Cao Wenyu Dong Yu Guo Junwei Cao 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第4期418-427,共10页
With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Int... With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Internet, the apps replace the PC client software as the major target of malicious usage. In this paper, to improve the security status of current mobile apps, we propose a methodology to evaluate mobile apps based on cloud computing platform and data mining. We also present a prototype system named MobSafe to identify the mobile app's virulence or benignancy. Compared with traditional method, such as permission pattern based method, MobSafe combines the dynamic and static analysis methods to comprehensively evaluate an Android app. In the implementation, we adopt Android Security Evaluation Framework (ASEF) and Static Android Analysis Framework (SAAF), the two representative dynamic and static analysis methods, to evaluate the Android apps and estimate the total time needed to evaluate all the apps stored in one mobile app market. Based on the real trace from a commercial mobile app market called AppChina, we can collect the statistics of the number of active Android apps, the average number apps installed in one Android device, and the expanding ratio of mobile apps. As mobile app market serves as the main line of defence against mobile malwares, our evaluation results show that it is practical to use cloud computing platform and data mining to verify all stored apps routinely to filter out malware apps from mobile app markets. As the future work, MobSafe can extensively use machine learning to conduct automotive forensic analysis of mobile apps based on the generated multifaceted data in this stage. 展开更多
关键词 Android platform mobile malware detection cloud computing forensic analysis machine learning redis key-value store big data hadoop distributed file system data mining
原文传递
Ubiquitous Mining with Interactive Data Mining Agents
17
作者 吴信东 朱兴全 +1 位作者 陈琪君 王飞跃 《Journal of Computer Science & Technology》 SCIE EI CSCD 2009年第6期1018-1027,共10页
Due to the increasing availability and sophistication of data recording techniques, multiple information sources and distributed computing are becoming the important trends of modern information systems. Many applicat... Due to the increasing availability and sophistication of data recording techniques, multiple information sources and distributed computing are becoming the important trends of modern information systems. Many applications such as security informatics and social computing require a ubiquitous data analysis platform so that decisions can be made rapidly under distributed and dynamic system environments. Although data mining has now been popularly used to achieve such goals, building a data mining system is, however, a nontrivial task, which may require a complete understanding on numerous data mining techniques as well as solid programming skills. Employing agent techniques for data analysis thus becomes increasingly important, especially for users not familiar with engineering and computational sciences, to implement an effective ubiquitous mining platform. Such data mining agents should, in practice, be intelligent, complete, and compact. In this paper, we present an interactive data mining agent - OIDM (online interactive data mining), which provides three categories (classification, association analysis, and clustering) of data mining tools, and interacts with the user to facilitate the mining process. The interactive mining is accomplished through interviewing the user about the data mining task to gain efficient and intelligent data mining control. OIDM can help users find appropriate mining algorithms, refine and compare the mining process, and finally achieve the best mining results. Such interactive data mining agent techniques provide alternative solutions to rapidly deploy data mining techniques to broader areas of data intelligence and knowledge informaties. 展开更多
关键词 information systems human-centered computing data mining intelligent agents
原文传递
Evolutionary computation in China: A literature survey 被引量:1
18
作者 Maoguo Gong Shanfeng Wang +2 位作者 Wenfeng Liu Jianan Yan Licheng Jiao 《CAAI Transactions on Intelligence Technology》 2016年第4期334-354,共21页
Evolutionary computation (EC) has received significant attention in China during the last two decades. In this paper, we present an overview of the current state of this rapidly growing field in China. Chinese resea... Evolutionary computation (EC) has received significant attention in China during the last two decades. In this paper, we present an overview of the current state of this rapidly growing field in China. Chinese research in theoretical foundations of EC, EC-based optimization, EC-based data mining, and EC-based real-world applications are summarized. 展开更多
关键词 Evolutionary computation Evolutionary algorithms OPTIMIZATION data mining
下载PDF
Parallel Computing of a Variational Data Assimilation Model for GPS/MET Observation Using the Ray-Tracing Method 被引量:5
19
作者 张昕 刘月巍 +1 位作者 王斌 季仲贞 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2004年第2期220-226,共7页
The Spectral Statistical Interpolation (SSI) analysis system of NCEP is used to assimilate meteorological data from the Global Positioning Satellite System (GPS/MET) refraction angles with the variational technique. V... The Spectral Statistical Interpolation (SSI) analysis system of NCEP is used to assimilate meteorological data from the Global Positioning Satellite System (GPS/MET) refraction angles with the variational technique. Verified by radiosonde, including GPS/MET observations into the analysis makes an overall improvement to the analysis variables of temperature, winds, and water vapor. However, the variational model with the ray-tracing method is quite expensive for numerical weather prediction and climate research. For example, about 4 000 GPS/MET refraction angles need to be assimilated to produce an ideal global analysis. Just one iteration of minimization will take more than 24 hours CPU time on the NCEP's Cray C90 computer. Although efforts have been taken to reduce the computational cost, it is still prohibitive for operational data assimilation. In this paper, a parallel version of the three-dimensional variational data assimilation model of GPS/MET occultation measurement suitable for massive parallel processors architectures is developed. The divide-and-conquer strategy is used to achieve parallelism and is implemented by message passing. The authors present the principles for the code's design and examine the performance on the state-of-the-art parallel computers in China. The results show that this parallel model scales favorably as the number of processors is increased. With the Memory-IO technique implemented by the author, the wall clock time per iteration used for assimilating 1420 refraction angles is reduced from 45 s to 12 s using 1420 processors. This suggests that the new parallelized code has the potential to be useful in numerical weather prediction (NWP) and climate studies. 展开更多
关键词 parallel computing variational data assimilation GPS/MET
下载PDF
Parallel evolutionary computing and 3-tier load balance of remote mining robot 被引量:1
20
作者 龚涛 蔡自兴 《中国有色金属学会会刊:英文版》 CSCD 2003年第4期948-952,共5页
To realize nonferrous metals deposit mining remotely with mobile robot under unknown environment, parallel evolutionary computing and 3 tier load balance were proposed to overcome the efficiency problem of online evol... To realize nonferrous metals deposit mining remotely with mobile robot under unknown environment, parallel evolutionary computing and 3 tier load balance were proposed to overcome the efficiency problem of online evolutionary computing. A system of polar coordinates can be established on remote mining robot with the polar point of current position and the polar axis from the current point to goal point. With the polar coordinate system path planning of remote mining robot can be computed in a parallel way. From the results of simulations and analysis based on agent techniques, good computing quality can be guaranteed for remote mining robot, such as efficiency, optimization and robustness. 展开更多
关键词 采矿机器人 遥控 负荷平衡 并行计算 遗传算法
下载PDF
上一页 1 2 148 下一页 到第
使用帮助 返回顶部