期刊文献+
共找到3,744篇文章
< 1 2 188 >
每页显示 20 50 100
Explainable Rules and Heuristics in AI Algorithm Recommendation Approaches——A Systematic Literature Review and Mapping Study
1
作者 Francisco JoséGarcía-Penlvo Andrea Vázquez-Ingelmo Alicia García-Holgado 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第8期1023-1051,共29页
The exponential use of artificial intelligence(AI)to solve and automated complex tasks has catapulted its popularity generating some challenges that need to be addressed.While AI is a powerfulmeans to discover interes... The exponential use of artificial intelligence(AI)to solve and automated complex tasks has catapulted its popularity generating some challenges that need to be addressed.While AI is a powerfulmeans to discover interesting patterns and obtain predictive models,the use of these algorithms comes with a great responsibility,as an incomplete or unbalanced set of training data or an unproper interpretation of the models’outcomes could result in misleading conclusions that ultimately could become very dangerous.For these reasons,it is important to rely on expert knowledge when applying these methods.However,not every user can count on this specific expertise;non-AIexpert users could also benefit from applying these powerful algorithms to their domain problems,but they need basic guidelines to obtain themost out of AI models.The goal of this work is to present a systematic review of the literature to analyze studies whose outcomes are explainable rules and heuristics to select suitable AI algorithms given a set of input features.The systematic review follows the methodology proposed by Kitchenham and other authors in the field of software engineering.As a result,9 papers that tackle AI algorithmrecommendation through tangible and traceable rules and heuristics were collected.The reduced number of retrieved papers suggests a lack of reporting explicit rules and heuristics when testing the suitability and performance of AI algorithms. 展开更多
关键词 SLR systematic literature review artificial intelligence machine learning algorithm recommendation heuristics explainability
下载PDF
An Algorithm for the Inverse Problem of Matrix Processing: DNA Chains, Their Distance Matrices and Reconstructing
2
作者 Boris F. Melnikov Ye Zhang Dmitrii Chaikovskii 《Journal of Biosciences and Medicines》 CAS 2023年第5期310-320,共11页
We continue to consider one of the cybernetic methods in biology related to the study of DNA chains. Exactly, we are considering the problem of reconstructing the distance matrix for DNA chains. Such a matrix is forme... We continue to consider one of the cybernetic methods in biology related to the study of DNA chains. Exactly, we are considering the problem of reconstructing the distance matrix for DNA chains. Such a matrix is formed on the basis of any of the possible algorithms for determining the distances between DNA chains, as well as any specific object of study. At the same time, for example, the practical programming results show that on an average modern computer, it takes about a day to build such a 30 × 30 matrix for mnDNAs using the Needleman-Wunsch algorithm;therefore, for such a 300 × 300 matrix, about 3 months of continuous computer operation is expected. Thus, even for a relatively small number of species, calculating the distance matrix on conventional computers is hardly feasible and the supercomputers are usually not available. Therefore, we started publishing our variants of the algorithms for calculating the distance between two DNA chains, then we publish algorithms for restoring partially filled matrices, i.e., the inverse problem of matrix processing. Previously, we used the method of branches and boundaries, but in this paper we propose to use another new algorithm for restoring the distance matrix for DNA chains. Our recent work has shown that even greater improvement in the quality of the algorithm can often be achieved without improving the auxiliary heuristics of the branches and boundaries method. Thus, we are improving the algorithms that formulate the greedy function of this method only. . 展开更多
关键词 DNA Chains Distance Matrix Optimization Problem Restoring algorithm Greedy algorithm heuristics
下载PDF
Traffic flow of connected and automated vehicles at lane drop on two-lane highway: An optimization-based control algorithm versus a heuristic rules-based algorithm
3
作者 刘华清 姜锐 +1 位作者 田钧方 朱凯旋 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第1期380-391,共12页
This paper investigates traffic flow of connected and automated vehicles at lane drop on two-lane highway. We evaluate and compare performance of an optimization-based control algorithm(OCA) with that of a heuristic r... This paper investigates traffic flow of connected and automated vehicles at lane drop on two-lane highway. We evaluate and compare performance of an optimization-based control algorithm(OCA) with that of a heuristic rules-based algorithm(HRA). In the OCA, the average speed of each vehicle is maximized. In the HRA, virtual vehicle and restriction of the command acceleration caused by the virtual vehicle are introduced. It is found that(i) capacity under the HRA(denoted as C_(H)) is smaller than capacity under the OCA;(ii) the travel delay is always smaller under the OCA, but driving is always much more comfortable under the HRA;(iii) when the inflow rate is smaller than C_(H), the HRA outperforms the OCA with respect to the fuel consumption and the monetary cost;(iv) when the inflow rate is larger than C_(H), the HRA initially performs better with respect to the fuel consumption and the monetary cost, but the OCA would become better after certain time. The spatiotemporal pattern and speed profile of traffic flow are presented, which explains the reason underlying the different performance. The study is expected to help for better understanding of the two different types of algorithm. 展开更多
关键词 traffic flow connected and automated vehicles(CAVs) lane drop optimization-based control algorithm heuristic rules-based algorithm
下载PDF
Research on Different Heuristics for Minimax Algorithm Insight from Connect-4 Game 被引量:2
4
作者 Xiyu Kang Yiqi Wang Yanrui Hu 《Journal of Intelligent Learning Systems and Applications》 2019年第2期15-31,共17页
Minimax algorithm and machine learning technologies have been studied for decades to reach an ideal optimization in game areas such as chess and backgammon. In these fields, several generations try to optimize the cod... Minimax algorithm and machine learning technologies have been studied for decades to reach an ideal optimization in game areas such as chess and backgammon. In these fields, several generations try to optimize the code for pruning and effectiveness of evaluation function. Thus, there are well-armed algorithms to deal with various sophisticated situations in gaming occasion. However, as a traditional zero-sum game, Connect-4 receives less attention compared with the other members of its zero-sum family using traditional minimax algorithm. In recent years, new generation of heuristics is created to address this problem based on research conclusions, expertise and gaming experiences. However, this paper mainly introduced a self-developed heuristics supported by well-demonstrated result from researches and our own experiences which fighting against the available version of Connect-4 system online. While most previous works focused on winning algorithms and knowledge based approaches, we complement these works with analysis of heuristics. We have conducted three experiments on the relationship among functionality, depth of searching and number of features and doing contrastive test with sample online. Different from the sample based on summarized experience and generalized features, our heuristics have a basic concentration on detailed connection between pieces on board. By analysing the winning percentages when our version fights against the online sample with different searching depths, we find that our heuristics with minimax algorithm is perfect on the early stages of the zero-sum game playing. Because some nodes in the game tree have no influence on the final decision of minimax algorithm, we use alpha-beta pruning to decrease the number of meaningless node which greatly increases the minimax efficiency. During the contrastive experiment with the online sample, this paper also verifies basic characters of the minimax algorithm including depths and quantity of features. According to the experiment, these two characters can both effect the decision for each step and none of them can be absolutely in charge. Besides, we also explore some potential future issues in Connect-4 game optimization such as precise adjustment on heuristic values and inefficiency pruning on the search tree. 展开更多
关键词 heuristics MINIMAX algorithm ZERO-SUM GAME Connect-4 GAME
下载PDF
基于HA-RF-SHAP的露天煤矿粉尘浓度预测模型
5
作者 金磊 杨晓伟 +4 位作者 张浩 杜勇志 李新鹏 戴春田 周伟 《西安科技大学学报》 CAS 北大核心 2024年第1期74-83,共10页
为了有效预测和控制煤矿粉尘浓度,保障煤矿工人健康及环境安全,以宝日希勒露天煤矿现场粉尘监测数据为基础,使用随机森林对粉尘浓度进行预测,提出了4种启发式智能优化算法优化随机森林超参数的方法,通过RMSE、MAE和皮尔逊相关系数R对模... 为了有效预测和控制煤矿粉尘浓度,保障煤矿工人健康及环境安全,以宝日希勒露天煤矿现场粉尘监测数据为基础,使用随机森林对粉尘浓度进行预测,提出了4种启发式智能优化算法优化随机森林超参数的方法,通过RMSE、MAE和皮尔逊相关系数R对模型进行评价,采用SHAP可解释模型分析影响露天煤矿粉尘浓度的因素。结果表明:PM2.5、PM10、TSP的最优模型分别为GWO-RF、WOA-RF和HHO-RF;超参数调整使模型整体RMSE指标提升约为1~3,MAE提升约为1~2.5,R提升约4%~6%;PM2.5的预测表现最好,训练集与测试集共同作用时,R为0.9463,MAE为3.059,RMSE为4.919,其次是PM10、TSP;单因素作用时,湿度对于该矿粉尘浓度影响最大,双因素同时影响下湿度和气压对粉尘浓度变化影响最大。研究提供了一个有效的粉尘浓度预测方法,可准确预测粉尘浓度并确定粉尘最影响因素,对矿山粉尘管控具有重要参考价值。 展开更多
关键词 露天煤矿 粉尘浓度预测 启发式算法 ShaP 模型可解释性
下载PDF
Intelligent Solution System for Cloud Security Based on Equity Distribution:Model and Algorithms
6
作者 Sarah Mustafa Eljack Mahdi Jemmali +3 位作者 Mohsen Denden Mutasim Al Sadig Abdullah M.Algashami Sadok Turki 《Computers, Materials & Continua》 SCIE EI 2024年第1期1461-1479,共19页
In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding ... In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding the risk of data loss and data overlapping.The development of data flow scheduling approaches in the cloud environment taking security parameters into account is insufficient.In our work,we propose a data scheduling model for the cloud environment.Themodel is made up of three parts that together help dispatch user data flow to the appropriate cloudVMs.The first component is the Collector Agent whichmust periodically collect information on the state of the network links.The second one is the monitoring agent which must then analyze,classify,and make a decision on the state of the link and finally transmit this information to the scheduler.The third one is the scheduler who must consider previous information to transfer user data,including fair distribution and reliable paths.It should be noted that each part of the proposedmodel requires the development of its algorithms.In this article,we are interested in the development of data transfer algorithms,including fairness distribution with the consideration of a stable link state.These algorithms are based on the grouping of transmitted files and the iterative method.The proposed algorithms showthe performances to obtain an approximate solution to the studied problem which is an NP-hard(Non-Polynomial solution)problem.The experimental results show that the best algorithm is the half-grouped minimum excluding(HME),with a percentage of 91.3%,an average deviation of 0.042,and an execution time of 0.001 s. 展开更多
关键词 Cyber-security cloud computing cloud security algorithmS heuristics
下载PDF
Heuristics Scheduling Algorithm on the Links Scheduling of Satellite-Ground Clock Synchronization and Ephemeris Uploading in COMPASS System
7
作者 张忠山 闫俊刚 +1 位作者 谭跃进 王沛 《Journal of Donghua University(English Edition)》 EI CAS 2016年第3期462-466,共5页
The execution process of satellite-ground clock synchronization and ephemeris uploading in the system is analyzed,as well as their characterized operation and their relationship.Based on the analysis of the scheduling... The execution process of satellite-ground clock synchronization and ephemeris uploading in the system is analyzed,as well as their characterized operation and their relationship.Based on the analysis of the scheduling goal and constraint character,a heuristics rule-based multi-stage link scheduling algorithm was put forward.The algorithm distinguishes the on-off-frontier satellites from the others and schedules them by turns.The paper presented the main flow as well as the detailed design of the rule.Finally based on the current COMPASS global system,some typical resources and constraints are selected to generate an instance.Then the comparison analysis between the heuristics scheduling algorithm and three other traditional scheduling strategies are carried out.The result shows the validity and reasonability of the multi-stage strategy. 展开更多
关键词 heuristics algorithm COMPASS system CROSSLINKS satelliteground clock synchronization and ephemeris uploading SCHEDULING
下载PDF
Algorithms for Multicriteria Scheduling Problems to Minimize Maximum Late Work, Tardy, and Early
8
作者 Karrar Alshaikhli Aws Alshaikhli 《Journal of Applied Mathematics and Physics》 2024年第2期661-682,共22页
This study examines the multicriteria scheduling problem on a single machine to minimize three criteria: the maximum cost function, denoted by maximum late work (V<sub>max</sub>), maximum tardy job, denote... This study examines the multicriteria scheduling problem on a single machine to minimize three criteria: the maximum cost function, denoted by maximum late work (V<sub>max</sub>), maximum tardy job, denoted by (T<sub>max</sub>), and maximum earliness (E<sub>max</sub>). We propose several algorithms based on types of objectives function to be optimized when dealing with simultaneous minimization problems with and without weight and hierarchical minimization problems. The proposed Algorithm (3) is to find the set of efficient solutions for 1//F (V<sub>max</sub>, T<sub>max</sub>, E<sub>max</sub>) and 1//(V<sub>max</sub> + T<sub>max</sub> + E<sub>max</sub>). The Local Search Heuristic Methods (Descent Method (DM), Simulated Annealing (SA), Genetic Algorithm (GA), and the Tree Type Heuristics Method (TTHM) are applied to solve all suggested problems. Finally, the experimental results of Algorithm (3) are compared with the results of the Branch and Bound (BAB) method for optimal and Pareto optimal solutions for smaller instance sizes and compared to the Local Search Heuristic Methods for large instance sizes. These results ensure the efficiency of Algorithm (3) in a reasonable time. 展开更多
关键词 Scheduling Single Machine Hierarchical Simultaneous Minimization algorithmS Branch and Bound Local Search heuristic Methods
下载PDF
DDoS Attack Detection Using Heuristics Clustering Algorithm and Naive Bayes Classification
9
作者 Sharmila Bista Roshan Chitrakar 《Journal of Information Security》 2018年第1期33-44,共12页
In recent times among the multitude of attacks present in network system, DDoS attacks have emerged to be the attacks with the most devastating effects. The main objective of this paper is to propose a system that eff... In recent times among the multitude of attacks present in network system, DDoS attacks have emerged to be the attacks with the most devastating effects. The main objective of this paper is to propose a system that effectively detects DDoS attacks appearing in any networked system using the clustering technique of data mining followed by classification. This method uses a Heuristics Clustering Algorithm (HCA) to cluster the available data and Na?ve Bayes (NB) classification to classify the data and detect the attacks created in the system based on some network attributes of the data packet. The clustering algorithm is based in unsupervised learning technique and is sometimes unable to detect some of the attack instances and few normal instances, therefore classification techniques are also used along with clustering to overcome this classification problem and to enhance the accuracy. Na?ve Bayes classifiers are based on very strong independence assumptions with fairly simple construction to derive the conditional probability for each relationship. A series of experiment is performed using “The CAIDA UCSD DDoS Attack 2007 Dataset” and “DARPA 2000 Dataset” and the efficiency of the proposed system has been tested based on the following performance parameters: Accuracy, Detection Rate and False Positive Rate and the result obtained from the proposed system has been found that it has enhanced accuracy and detection rate with low false positive rate. 展开更多
关键词 DDOS Attacks heuristic Clustering algorithm NAIVE BAYES Classification CAIDA UCSD DARPA 2000
下载PDF
Aheuristic Algorithm for Berth Scheduling Problem in Container Ports
10
作者 张海滨 《科技信息》 2011年第3期I0185-I0186,共2页
In this paper,the berth scheduling problem is transformed into a special two-dimensional packing problem with some constraints.A nonlinear programming model for the problem is established,and a heuristic algorithm is ... In this paper,the berth scheduling problem is transformed into a special two-dimensional packing problem with some constraints.A nonlinear programming model for the problem is established,and a heuristic algorithm is proposed to solve the model.Simulation results show that the algorithm can improve the utilization of berths on discrete berth scheduling in the container port. 展开更多
关键词 BERTH SCHEDULING TWO-DIMENSIONAL PACKING heuristIC algorithm
下载PDF
Heuristic algorithm for RCPSP with the objective of minimizing activities' cost 被引量:5
11
作者 Liu Zhenyuan Wang Hongwei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第1期96-102,共7页
Resource-constrained project scheduling problem(RCPSP) is an important problem in research on project management. But there has been little attention paid to the objective of minimizing activities' cost with the re... Resource-constrained project scheduling problem(RCPSP) is an important problem in research on project management. But there has been little attention paid to the objective of minimizing activities' cost with the resource constraints that is a critical sub-problem in partner selection of construction supply chain management because the capacities of the renewable resources supplied by the partners will effect on the project scheduling. Its mathematic model is presented firstly, and analysis on the characteristic of the problem shows that the objective function is non-regular and the problem is NP-complete following which the basic idea for solution is clarified. Based on a definition of preposing activity cost matrix, a heuristic algorithm is brought forward. Analyses on the complexity of the heuristics and the result of numerical studies show that the heuristic algorithm is feasible and relatively effective. 展开更多
关键词 systems engineering resource-constrained project scheduling problem activities' cost preposing activity cost matrix heuristic algorithm.
下载PDF
A Heuristic Algorithm for the Fabric Spreading and Cutting Problem in Apparel Factories 被引量:2
12
作者 Xiuqin Shang Dayong Shen +1 位作者 Fei-Yue Wang Timo R. Nyberg 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2019年第4期961-968,共8页
We study the fabric spreading and cutting problem in apparel factories.For the sake of saving the material costs,the cutting requirement should be met exactly without producing additional garment components.For reduci... We study the fabric spreading and cutting problem in apparel factories.For the sake of saving the material costs,the cutting requirement should be met exactly without producing additional garment components.For reducing the production costs,the number of lays that corresponds to the frequency of using the cutting beds should be minimized.We propose an iterated greedy algorithm for solving the fabric spreading and cutting problem.This algorithm contains a constructive procedure and an improving loop.Firstly the constructive procedure creates a set of lays in sequence,and then the improving loop tries to pick each lay from the lay set and rearrange the remaining lays into a smaller lay set.The improving loop will run until it cannot obtain any smaller lay set or the time limit is due.The experiment results on 500 cases show that the proposed algorithm is effective and efficient. 展开更多
关键词 Construction and improvement CUTTING and PACKING FABRIC SPREADING and CUTTING heuristIC algorithm
下载PDF
Data-Driven Heuristic Assisted Memetic Algorithm for Efficient Inter-Satellite Link Scheduling in the BeiDou Navigation Satellite System 被引量:5
13
作者 Yonghao Du Ling Wang +2 位作者 Lining Xing Jungang Yan Mengsi Cai 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第11期1800-1816,共17页
Inter-satellite link(ISL)scheduling is required by the BeiDou Navigation Satellite System(BDS)to guarantee the system ranging and communication performance.In the BDS,a great number of ISL scheduling instances must be... Inter-satellite link(ISL)scheduling is required by the BeiDou Navigation Satellite System(BDS)to guarantee the system ranging and communication performance.In the BDS,a great number of ISL scheduling instances must be addressed every day,which will certainly spend a lot of time via normal metaheuristics and hardly meet the quick-response requirements that often occur in real-world applications.To address the dual requirements of normal and quick-response ISL schedulings,a data-driven heuristic assisted memetic algorithm(DHMA)is proposed in this paper,which includes a high-performance memetic algorithm(MA)and a data-driven heuristic.In normal situations,the high-performance MA that hybridizes parallelism,competition,and evolution strategies is performed for high-quality ISL scheduling solutions over time.When in quick-response situations,the data-driven heuristic is performed to quickly schedule high-probability ISLs according to a prediction model,which is trained from the high-quality MA solutions.The main idea of the DHMA is to address normal and quick-response schedulings separately,while high-quality normal scheduling data are trained for quick-response use.In addition,this paper also presents an easy-to-understand ISL scheduling model and its NP-completeness.A seven-day experimental study with 10080 one-minute ISL scheduling instances shows the efficient performance of the DHMA in addressing the ISL scheduling in normal(in 84 hours)and quick-response(in 0.62 hour)situations,which can well meet the dual scheduling requirements in real-world BDS applications. 展开更多
关键词 BeiDou Navigation Satellite System(BDS) data-driven heuristic inter-satellite link(ISL)scheduling memetic algorithm METAheuristIC quick-response
下载PDF
A Novel Heuristic Algorithm for theModeling and Risk Assessment of the COVID-19 Pandemic Phenomenon 被引量:2
14
作者 Panagiotis G.Asteris Maria G.Douvika +6 位作者 Chrysoula A.Karamani Athanasia D.Skentou Katerina Chlichlia Liborio Cavaleri Tryfon Daras Danial J.Armaghani Theoklis E.Zaoutis 《Computer Modeling in Engineering & Sciences》 SCIE EI 2020年第11期815-828,共14页
Themodeling and risk assessment of a pandemic phenomenon such as COVID-19 is an important and complicated issue in epidemiology,and such an attempt is of great interest for public health decision-making.To this end,in... Themodeling and risk assessment of a pandemic phenomenon such as COVID-19 is an important and complicated issue in epidemiology,and such an attempt is of great interest for public health decision-making.To this end,in the present study,based on a recent heuristic algorithm proposed by the authors,the time evolution of COVID-19 is investigated for six different countries/states,namely New York,California,USA,Iran,Sweden and UK.The number of COVID-19-related deaths is used to develop the proposed heuristic model as it is believed that the predicted number of daily deaths in each country/state includes information about the quality of the health system in each area,the age distribution of population,geographical and environmental factors as well as other conditions.Based on derived predicted epidemic curves,a new 3D-epidemic surface is proposed to assess the epidemic phenomenon at any time of its evolution.This research highlights the potential of the proposed model as a tool which can assist in the risk assessment of the COVID-19.Mapping its development through 3D-epidemic surface can assist in revealing its dynamic nature as well as differences and similarities among different districts. 展开更多
关键词 algorithm COVID-19 Gaussian-function heuristic model pandemic trend prediction SARS-CoV-2
下载PDF
A Multi-stage Heuristic Algorithm for Matching Problem in the Modified Miniload Automated Storage and Retrieval System of E-commerce 被引量:2
15
作者 WANG Wenrui WU Yaohua WU Yingying 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2016年第3期641-648,共8页
E-commerce, as an emerging marketing mode, has attracted more and more attention and gradually changed the way of our life. However, the existing layout of distribution centers can't fulfill the storage and picking d... E-commerce, as an emerging marketing mode, has attracted more and more attention and gradually changed the way of our life. However, the existing layout of distribution centers can't fulfill the storage and picking demands of e-commerce sufficiently. In this paper, a modified miniload automated storage/retrieval system is designed to fit these new characteristics of e-commerce in logistics. Meanwhile, a matching problem, concerning with the improvement of picking efficiency in new system, is studied in this paper. The problem is how to reduce the travelling distance of totes between aisles and picking stations. A multi-stage heuristic algorithm is proposed based on statement and model of this problem. The main idea of this algorithm is, with some heuristic strategies based on similarity coefficients, minimizing the transportations of items which can not arrive in the destination picking stations just through direct conveyors. The experimental results based on the cases generated by computers show that the average reduced rate of indirect transport times can reach 14.36% with the application of multi-stage heuristic algorithm. For the cases from a real e-commerce distribution center, the order processing time can be reduced from 11.20 h to 10.06 h with the help of the modified system and the proposed algorithm. In summary, this research proposed a modified system and a multi-stage heuristic algorithm that can reduce the travelling distance of totes effectively and improve the whole performance of e-commerce distribution center. 展开更多
关键词 e-commerce modified miniload automated storage/retrieval system matching problem multi-stage heuristic algorithm
下载PDF
An Improved Heuristic Recursive Strategy Based on Genetic Algorithm for the Strip Rectangular Packing Problem 被引量:4
16
作者 ZHANG De-Fu CHEN Sheng-Da LIU Yan-Juan 《自动化学报》 EI CSCD 北大核心 2007年第9期911-916,共6页
与基因算法结合的改进启发式的递归的策略在这份报纸被介绍。第一,这个方法寻找一些矩形,它有一样的长度或宽度,到没有浪费空间,形成一些层,然后,计算留下包装顺序的高度使用启发式的递归的策略并且使用基因算法的进化能力减少高... 与基因算法结合的改进启发式的递归的策略在这份报纸被介绍。第一,这个方法寻找一些矩形,它有一样的长度或宽度,到没有浪费空间,形成一些层,然后,计算留下包装顺序的高度使用启发式的递归的策略并且使用基因算法的进化能力减少高度。基准问题的几个班上的计算结果证明了介绍算法能与已知的进化启发规则竞争。它特别为大测试问题更好表现。 展开更多
关键词 改良式 启发式 递归策略 遗传算法 矩形封装
下载PDF
Flower Pollination Heuristics for Nonlinear Active Noise Control Systems 被引量:1
17
作者 Wasim Ullah Khan Yigang He +3 位作者 Muhammad Asif Zahoor Raja Naveed Ishtiaq Chaudhary Zeshan Aslam Khan Syed Muslim Shah 《Computers, Materials & Continua》 SCIE EI 2021年第4期815-834,共20页
In this paper,a novel design of the flower pollination algorithm is presented for model identification problems in nonlinear active noise control systems.The recently introduced flower pollination based heuristics is ... In this paper,a novel design of the flower pollination algorithm is presented for model identification problems in nonlinear active noise control systems.The recently introduced flower pollination based heuristics is implemented to minimize the mean squared error based merit/cost function representing the scenarios of active noise control system with linear/nonlinear and primary/secondary paths based on the sinusoidal signal,random and complex random signals as noise interferences.The flower pollination heuristics based active noise controllers are formulated through exploitation of nonlinear filtering with Volterra series.The comparative study on statistical observations in terms of accuracy,convergence and complexity measures demonstrates that the proposed meta-heuristic of flower pollination algorithm is reliable,accurate,stable as well as robust for active noise control system.The accuracy of the proposed nature inspired computing of flower pollination is in good agreement with the state of the art counterpart solvers based on variants of genetic algorithms,particle swarm optimization,backtracking search optimization algorithm,fireworks optimization algorithm along with their memetic combination with local search methodologies.Moreover,the central tendency and variation based statistical indices further validate the consistency and reliability of the proposed scheme mimic the mathematical model for the process of flower pollination systems. 展开更多
关键词 Active noise control computational heuristics volterra filtering flower pollination algorithm
下载PDF
A Branch-and-Bound Based Heuristic Algorithm for Minimizing Makespan in Machining-Assembly Flowshop Scheduling 被引量:1
18
作者 Kazuko Morizawa 《Engineering(科研)》 2014年第13期877-885,共9页
This paper proposes a heuristic algorithm, called list-based squeezing branch and bound algorithm, for solving a machine-fixed, machining-assembly flowshop scheduling problem to minimize makespan. The machine-fixed, m... This paper proposes a heuristic algorithm, called list-based squeezing branch and bound algorithm, for solving a machine-fixed, machining-assembly flowshop scheduling problem to minimize makespan. The machine-fixed, machining-assembly flowshop consists of some parallel two-machine flow lines at a machining stage and one robot at an assembly stage. Since an optimal schedule for this problem is not always a permutation schedule, the proposed algorithm first finds a promising permutation schedule, and then searches better non-permutation schedules near the promising permutation schedule in an enumerative manner by elaborating a branching procedure in a branch and bound algorithm. The results of numerical experiments show that the proposed algorithm can efficiently provide an optimal or a near-optimal schedule with high accuracy such as mean relative error being less than 0.2% and the maximum relative error being at most 3%. 展开更多
关键词 Scheduling heuristIC Branch and BOUND algorithm Machining-Assembly FLOWSHOP MAKESPAN
下载PDF
Designing an optimal stope layout for underground mining based on a heuristic algorithm 被引量:2
19
作者 Sandanayake Don Suneth Sameera Topal Erkan Asad Mohammad Waqar Ali 《International Journal of Mining Science and Technology》 SCIE EI CSCD 2015年第5期767-772,共6页
An optimal layout or three-dimensional spatial distribution of stopes guarantees the maximum profitability over life span of an underground mining operation.Thus,stope optimization is one of the key areas in undergrou... An optimal layout or three-dimensional spatial distribution of stopes guarantees the maximum profitability over life span of an underground mining operation.Thus,stope optimization is one of the key areas in underground mine planning practice.However,the computational complexity in developing an optimal stope layout has been a reason for limited availability of the algorithms offering solution to this problem.This article shares a new and efficient heuristic algorithm that considers a three-dimensional ore body model as an input,maximizes the economic value,and satisfies the physical mining and geotechnical constraints for generating an optimal stope layout.An implementation at a copper deposit demonstrates the applicability and robustness of the algorithm.A parallel processing based modification improving the performance of the original algorithm in terms of enormous computational time saving is also presented. 展开更多
关键词 启发式算法 采场布局 地下开采 布局设计 三维矿体模型 计算复杂性 空间分布 规划实践
下载PDF
Damage Identification of A TLP Floating Wind Turbine by Meta-Heuristic Algorithms 被引量:4
20
作者 M.M.Ettefagh 《China Ocean Engineering》 SCIE EI CSCD 2015年第6期891-902,共12页
Damage identification of the offshore floating wind turbine by vibration/dynamic signals is one of the important and new research fields in the Structural Health Monitoring(SHM). In this paper a new damage identific... Damage identification of the offshore floating wind turbine by vibration/dynamic signals is one of the important and new research fields in the Structural Health Monitoring(SHM). In this paper a new damage identification method is proposed based on meta-heuristic algorithms using the dynamic response of the TLP(Tension-Leg Platform) floating wind turbine structure. The Genetic Algorithms(GA), Artificial Immune System(AIS), Particle Swarm Optimization(PSO), and Artificial Bee Colony(ABC) are chosen for minimizing the object function, defined properly for damage identification purpose. In addition to studying the capability of mentioned algorithms in correctly identifying the damage, the effect of the response type on the results of identification is studied. Also, the results of proposed damage identification are investigated with considering possible uncertainties of the structure. Finally, for evaluating the proposed method in real condition, a 1/100 scaled experimental setup of TLP Floating Wind Turbine(TLPFWT) is provided in a laboratory scale and the proposed damage identification method is applied to the scaled turbine. 展开更多
关键词 floating wind turbine multi-body dynamics damage identification meta-heuristic algorithms OPTIMIZATION
下载PDF
上一页 1 2 188 下一页 到第
使用帮助 返回顶部