期刊文献+
共找到1,798篇文章
< 1 2 90 >
每页显示 20 50 100
An Improved Iterated Greedy Algorithm for Solving Rescue Robot Path Planning Problem with Limited Survival Time
1
作者 Xiaoqing Wang Peng Duan +1 位作者 Leilei Meng Kaidong Yang 《Computers, Materials & Continua》 SCIE EI 2024年第7期931-947,共17页
Effective path planning is crucial for mobile robots to quickly reach rescue destination and complete rescue tasks in a post-disaster scenario.In this study,we investigated the post-disaster rescue path planning probl... Effective path planning is crucial for mobile robots to quickly reach rescue destination and complete rescue tasks in a post-disaster scenario.In this study,we investigated the post-disaster rescue path planning problem and modeled this problem as a variant of the travel salesman problem(TSP)with life-strength constraints.To address this problem,we proposed an improved iterated greedy(IIG)algorithm.First,a push-forward insertion heuristic(PFIH)strategy was employed to generate a high-quality initial solution.Second,a greedy-based insertion strategy was designed and used in the destruction-construction stage to increase the algorithm’s exploration ability.Furthermore,three problem-specific swap operators were developed to improve the algorithm’s exploitation ability.Additionally,an improved simulated annealing(SA)strategy was used as an acceptance criterion to effectively prevent the algorithm from falling into local optima.To verify the effectiveness of the proposed algorithm,the Solomon dataset was extended to generate 27 instances for simulation.Finally,the proposed IIG was compared with five state-of-the-art algorithms.The parameter analysiswas conducted using the design of experiments(DOE)Taguchi method,and the effectiveness analysis of each component has been verified one by one.Simulation results indicate that IIGoutperforms the compared algorithms in terms of the number of rescue survivors and convergence speed,proving the effectiveness of the proposed algorithm. 展开更多
关键词 Rescue robot path planning life strength improved iterative greedy algorithm problem-specific swap operators
下载PDF
A greedy path planning algorithm based on pre-path-planning and real-time-conflict for multiple automated guided vehicles in large-scale outdoor scenarios 被引量:2
2
作者 王腾达 WU Wenjun +2 位作者 YANG Feng SUN Teng GAO Qiang 《High Technology Letters》 EI CAS 2023年第3期279-287,共9页
With the wide application of automated guided vehicles(AGVs) in large scale outdoor scenarios with complex terrain,the collaborative work of a large number of AGVs becomes the main trend.The effective multi-agent path... With the wide application of automated guided vehicles(AGVs) in large scale outdoor scenarios with complex terrain,the collaborative work of a large number of AGVs becomes the main trend.The effective multi-agent path finding(MAPF) algorithm is urgently needed to ensure the efficiency and realizability of the whole system. The complex terrain of outdoor scenarios is fully considered by using different values of passage cost to quantify different terrain types. The objective of the MAPF problem is to minimize the cost of passage while the Manhattan distance of paths and the time of passage are also evaluated for a comprehensive comparison. The pre-path-planning and real-time-conflict based greedy(PRG) algorithm is proposed as the solution. Simulation is conducted and the proposed PRG algorithm is compared with waiting-stop A^(*) and conflict based search(CBS) algorithms. Results show that the PRG algorithm outperforms the waiting-stop A^(*) algorithm in all three performance indicators,and it is more applicable than the CBS algorithm when a large number of AGVs are working collaboratively with frequent collisions. 展开更多
关键词 automated guided vehicle(AGV) multi-agent path finding(MAPF) complex terrain greedy algorithm
下载PDF
An Innovative K-Anonymity Privacy-Preserving Algorithm to Improve Data Availability in the Context of Big Data
3
作者 Linlin Yuan Tiantian Zhang +2 位作者 Yuling Chen Yuxiang Yang Huang Li 《Computers, Materials & Continua》 SCIE EI 2024年第4期1561-1579,共19页
The development of technologies such as big data and blockchain has brought convenience to life,but at the same time,privacy and security issues are becoming more and more prominent.The K-anonymity algorithm is an eff... The development of technologies such as big data and blockchain has brought convenience to life,but at the same time,privacy and security issues are becoming more and more prominent.The K-anonymity algorithm is an effective and low computational complexity privacy-preserving algorithm that can safeguard users’privacy by anonymizing big data.However,the algorithm currently suffers from the problem of focusing only on improving user privacy while ignoring data availability.In addition,ignoring the impact of quasi-identified attributes on sensitive attributes causes the usability of the processed data on statistical analysis to be reduced.Based on this,we propose a new K-anonymity algorithm to solve the privacy security problem in the context of big data,while guaranteeing improved data usability.Specifically,we construct a new information loss function based on the information quantity theory.Considering that different quasi-identification attributes have different impacts on sensitive attributes,we set weights for each quasi-identification attribute when designing the information loss function.In addition,to reduce information loss,we improve K-anonymity in two ways.First,we make the loss of information smaller than in the original table while guaranteeing privacy based on common artificial intelligence algorithms,i.e.,greedy algorithm and 2-means clustering algorithm.In addition,we improve the 2-means clustering algorithm by designing a mean-center method to select the initial center of mass.Meanwhile,we design the K-anonymity algorithm of this scheme based on the constructed information loss function,the improved 2-means clustering algorithm,and the greedy algorithm,which reduces the information loss.Finally,we experimentally demonstrate the effectiveness of the algorithm in improving the effect of 2-means clustering and reducing information loss. 展开更多
关键词 Blockchain big data K-ANONYMITY 2-means clustering greedy algorithm mean-center method
下载PDF
Effective Iterated Greedy Algorithm for Flow-Shop Scheduling Problems with Time lags 被引量:4
4
作者 Ning ZHAO Song YE +1 位作者 Kaidian LI Siyu CHEN 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2017年第3期652-662,共11页
Flow shop scheduling problem with time lags is a practical scheduling problem and attracts many studies. Permutation problem(PFSP with time lags) is concentrated but non-permutation problem(non-PFSP with time lags... Flow shop scheduling problem with time lags is a practical scheduling problem and attracts many studies. Permutation problem(PFSP with time lags) is concentrated but non-permutation problem(non-PFSP with time lags) seems to be neglected. With the aim to minimize the makespan and satisfy time lag constraints, efficient algo- rithms corresponding to PFSP and non-PFSP problems are proposed, which consist of iterated greedy algorithm for permutation(IGTLP) and iterated greedy algorithm for non-permutation (IGTLNP). The proposed algorithms are verified using well-known simple and complex instances of permutation and non-permutation problems with various time lag ranges. The permutation results indicate that the proposed IGTLP can reach near optimal solution within nearly 11% computational time of traditional GA approach. The non-permutation results indicate that the proposed IG can reach nearly same solution within less than 1% com- putational time compared with traditional GA approach. The proposed research combines PFSP and non-PFSP together with minimal and maximal time lag consideration, which provides an interesting viewpoint for industrial implementation. 展开更多
关键词 PERMUTATION Non-permutation Flow shopTime lags . Makespan Iterated greedy algorithm
下载PDF
Using Greedy algorithm: DBSCAN revisited II 被引量:2
5
作者 岳士弘 李平 +1 位作者 郭继东 周水庚 《Journal of Zhejiang University Science》 EI CSCD 2004年第11期1405-1412,共8页
The density-based clustering algorithm presented is different from the classical Density-Based Spatial Clustering of Applications with Noise (DBSCAN) (Ester et al., 1996), and has the following advantages: first, Gree... The density-based clustering algorithm presented is different from the classical Density-Based Spatial Clustering of Applications with Noise (DBSCAN) (Ester et al., 1996), and has the following advantages: first, Greedy algorithm substitutes for R*-tree (Bechmann et al., 1990) in DBSCAN to index the clustering space so that the clustering time cost is decreased to great extent and I/O memory load is reduced as well; second, the merging condition to approach to arbitrary-shaped clusters is designed carefully so that a single threshold can distinguish correctly all clusters in a large spatial dataset though some density-skewed clusters live in it. Finally, authors investigate a robotic navigation and test two artificial datasets by the proposed algorithm to verify its effectiveness and efficiency. 展开更多
关键词 DBSCAN algorithm greedy algorithm Density-skewed cluster
下载PDF
Low Complexity Precoded Greedy Power Allocation Algorithms for OFDM Communication Systems 被引量:1
6
作者 Najib A. Odhah Moawad I. Dessouky +1 位作者 Waleed Al-Hanafy Fathi E. Abd El-Samie 《Journal of Signal and Information Processing》 2012年第2期185-191,共7页
In this paper, an enhanced greedy bit and power allocation algorithms for orthogonal frequency division multiplexing (OFDM) communication systems are introduced. These algorithms combine low complexity greedy power al... In this paper, an enhanced greedy bit and power allocation algorithms for orthogonal frequency division multiplexing (OFDM) communication systems are introduced. These algorithms combine low complexity greedy power allocation algorithms with a simplified maximum ratio combining (MRC) precoding technique at the transmitter for maximizing the average data throughput of OFDM communication systems. Results of computer simulations show that precoding is an effective technique for improving the throughput performance of the proposed bit and power allocation algorithms. 展开更多
关键词 OFDM Uniform Power Allocation greedy algorithm THROUGHPUT Enhancement MRC PRECODING
下载PDF
GREEDY NON-DOMINATED SORTING IN GENETIC ALGORITHM-ⅡFOR VEHICLE ROUTING PROBLEM IN DISTRIBUTION 被引量:4
7
作者 WEI Tian FAN Wenhui XU Huayu 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2008年第6期18-24,共7页
Vehicle routing problem in distribution (VRPD) is a widely used type of vehicle routing problem (VRP), which has been proved as NP-Hard, and it is usually modeled as single objective optimization problem when mode... Vehicle routing problem in distribution (VRPD) is a widely used type of vehicle routing problem (VRP), which has been proved as NP-Hard, and it is usually modeled as single objective optimization problem when modeling. For multi-objective optimization model, most researches consider two objectives. A multi-objective mathematical model for VRP is proposed, which considers the number of vehicles used, the length of route and the time arrived at each client. Genetic algorithm is one of the most widely used algorithms to solve VRP. As a type of genetic algorithm (GA), non-dominated sorting in genetic algorithm-Ⅱ (NSGA-Ⅱ) also suffers from premature convergence and enclosure competition. In order to avoid these kinds of shortage, a greedy NSGA-Ⅱ (GNSGA-Ⅱ) is proposed for VRP problem. Greedy algorithm is implemented in generating the initial population, cross-over and mutation. All these procedures ensure that NSGA-Ⅱ is prevented from premature convergence and refine the performance of NSGA-Ⅱ at each step. In the distribution problem of a distribution center in Michigan, US, the GNSGA-Ⅱ is compared with NSGA-Ⅱ. As a result, the GNSGA-Ⅱ is the most efficient one and can get the most optimized solution to VRP problem. Also, in GNSGA-Ⅱ, premature convergence is better avoided and search efficiency has been improved sharply. 展开更多
关键词 greedy non-dominated sorting in genetic algorithm-Ⅱ (GNSGA-Ⅱ) Vehicle routing problem (VRP) Multi-objective optimization
下载PDF
Greedy Algorithm Applied to Relay Selection for Cooperative Communication Systems in Amplify-and-Forward Mode
8
作者 Cheng-Ying Yang Yi-Shan Lin Jyh-Horng Wen 《Journal of Electronic Science and Technology》 CAS 2014年第1期49-53,共5页
Using a relaying system to provide spatial diversity and improve the system performance is a tendency in the wireless cooperative communications. Amplify-and-forward (AF) mode with a low complexity is easy to be imp... Using a relaying system to provide spatial diversity and improve the system performance is a tendency in the wireless cooperative communications. Amplify-and-forward (AF) mode with a low complexity is easy to be implemented. Under the consideration of cooperative communication systems, the scenario includes one information source, M relay stations and N destinations. This work proposes a relay selection algorithm in the Raleigh fading channel. Based on the exhaustive search method, easily to realize, the optimal selection scheme can be found with a highly complicated calculation. In order to reduce the computational complexity, an approximate optimal solution with a greedy algorithm applied for the relay station selection is proposed. With different situations of the communication systems, the performance evaluation obtained by both the proposed algorithm and the exhaustive search algorithm are given for comparison. It shows the proposed algorithm could provide a solution approach to the optimal one. 展开更多
关键词 Amplify-and-forward mode cooperativecommunication exhaustive search greedy algorithm relay selection.
下载PDF
Adaptive block greedy algorithms for receiving multi-narrowband signal in compressive sensing radar reconnaissance receiver
9
作者 ZHANG Chaozhu XU Hongyi JIANG Haiqing 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第6期1158-1169,共12页
This paper extends the application of compressive sensing(CS) to the radar reconnaissance receiver for receiving the multi-narrowband signal. By combining the concept of the block sparsity, the self-adaption methods, ... This paper extends the application of compressive sensing(CS) to the radar reconnaissance receiver for receiving the multi-narrowband signal. By combining the concept of the block sparsity, the self-adaption methods, the binary tree search,and the residual monitoring mechanism, two adaptive block greedy algorithms are proposed to achieve a high probability adaptive reconstruction. The use of the block sparsity can greatly improve the efficiency of the support selection and reduce the lower boundary of the sub-sampling rate. Furthermore, the addition of binary tree search and monitoring mechanism with two different supports self-adaption methods overcome the instability caused by the fixed block length while optimizing the recovery of the unknown signal.The simulations and analysis of the adaptive reconstruction ability and theoretical computational complexity are given. Also, we verify the feasibility and effectiveness of the two algorithms by the experiments of receiving multi-narrowband signals on an analogto-information converter(AIC). Finally, an optimum reconstruction characteristic of two algorithms is found to facilitate efficient reception in practical applications. 展开更多
关键词 compressive sensing(CS) adaptive greedy algorithm block sparsity analog-to-information convertor(AIC) multinarrowband signal
下载PDF
Greedy Constructive Procedure-Based Hybrid Differential Algorithm for Flexible Flow shop Group Scheduling
10
作者 郑永前 于萌萌 谢松杭 《Journal of Donghua University(English Edition)》 EI CAS 2015年第4期577-582,共6页
Aiming at the flexible flowshop group scheduling problem,taking sequence dependent setup time and machine skipping into account, a mathematical model for minimizing makespan is established,and a hybrid differential ev... Aiming at the flexible flowshop group scheduling problem,taking sequence dependent setup time and machine skipping into account, a mathematical model for minimizing makespan is established,and a hybrid differential evolution( HDE) algorithm based on greedy constructive procedure( GCP) is proposed,which combines differential evolution( DE) with tabu search( TS). DE is applied to generating the elite individuals of population,while TS is used for finding the optimal value by making perturbation in selected elite individuals. A lower bounding technique is developed to evaluate the quality of proposed algorithm. Experimental results verify the effectiveness and feasibility of proposed algorithm. 展开更多
关键词 FLEXIBLE flowshop group scheduling HYBRID DIFFERENTIAL evolution(HDE) algorithm greedy CONSTRUCTIVE procedure(GCP) lower bound
下载PDF
Dynamic thermal management by greedy scheduling algorithm
11
作者 QU Shuang-xi ZHANG Min-xuan +1 位作者 LIU Guang-hui LIU Tao 《Journal of Central South University》 SCIE EI CAS 2012年第1期193-199,共7页
Chip multiprocessors(CMPs) allow thread level parallelism,thus increasing performance.However,this comes with the cost of temperature problem.CMPs require more power,creating non uniform power map and hotspots.Aiming ... Chip multiprocessors(CMPs) allow thread level parallelism,thus increasing performance.However,this comes with the cost of temperature problem.CMPs require more power,creating non uniform power map and hotspots.Aiming at this problem,a thread scheduling algorithm,the greedy scheduling algorithm,was proposed to reduce the thermal emergencies and to improve the throughput.The greedy scheduling algorithm was implemented in the Linux kernel on Intel's Quad-Core system.The experimental results show that the greedy scheduling algorithm can reduce 9.6%-78.5% of the hardware dynamic thermal management(DTM) in various combinations of workloads,and has an average of 5.2% and up to 9.7% throughput higher than the Linux standard scheduler. 展开更多
关键词 greedy scheduling algorithm chip multiprocessor thermal-aware
下载PDF
Greedy Algorithm in m-Term Approximation for Periodic Besov Class with Mixed Smoothness
12
作者 宋占杰 叶培新 《Transactions of Tianjin University》 EI CAS 2009年第1期75-78,共4页
Nonlinear m-term approximation plays an important role in machine learning, signal processing and statistical estimating. In this paper by means of a nondecreasing dominated function, a greedy adaptive compression num... Nonlinear m-term approximation plays an important role in machine learning, signal processing and statistical estimating. In this paper by means of a nondecreasing dominated function, a greedy adaptive compression numerical algorithm in the best m -term approximation with regard to tensor product wavelet-type basis is pro-posed. The algorithm provides the asymptotically optimal approximation for the class of periodic functions with mixed Besov smoothness in the L q norm. Moreover, it depends only on the expansion of function f by tensor pro-duct wavelet-type basis, but neither on q nor on any special features of f. 展开更多
关键词 greedy algorithm m -term approximation Besov space mixed smoothness
下载PDF
A greedy algorithm based on joint assignment of airport gates and taxiways in large hub airports
13
作者 Nie Tongtong Wu Wenjun +3 位作者 He Qichang Zhang Xuanyi Sun Yang Zhang Yanhua 《High Technology Letters》 EI CAS 2020年第4期417-423,共7页
With the rapid development of civil aviation in recent years,the management and assignment of airport resources are becoming more and more difficult.Among the various airport resources,gates and taxiways are very impo... With the rapid development of civil aviation in recent years,the management and assignment of airport resources are becoming more and more difficult.Among the various airport resources,gates and taxiways are very important,therefore,many researchers focus on the airport gate and taxiway assignment problem.However,the joint assignment algorithm of airport gates and taxiways with realistic airport data has not been well studied.A greedy algorithm based on joint assignment of airport gates and taxiways using the data of a large hub airport in China is proposed.The objective is maximizing the ratio of fixed gates and minimizing the ratio of taxiway collisions.Simulation results show that it outperforms other assignment schemes. 展开更多
关键词 greedy algorithm airport gate TAXIWAY resources assignment
下载PDF
Numerical Studies of the Generalized <i>l</i><sub>1</sub>Greedy Algorithm for Sparse Signals
14
作者 Fangjun Arroyo Edward Arroyo +2 位作者 Xiezhang Li Jiehua Zhu Jiehua Zhu 《Advances in Computed Tomography》 2013年第4期132-139,共8页
The generalized l1 greedy algorithm was recently introduced and used to reconstruct medical images in computerized tomography in the compressed sensing framework via total variation minimization. Experimental results ... The generalized l1 greedy algorithm was recently introduced and used to reconstruct medical images in computerized tomography in the compressed sensing framework via total variation minimization. Experimental results showed that this algorithm is superior to the reweighted l1-minimization and l1 greedy algorithms in reconstructing these medical images. In this paper the effectiveness of the generalized l1 greedy algorithm in finding random sparse signals from underdetermined linear systems is investigated. A series of numerical experiments demonstrate that the generalized l1 greedy algorithm is superior to the reweighted l1-minimization and l1 greedy algorithms in the successful recovery of randomly generated Gaussian sparse signals from data generated by Gaussian random matrices. In particular, the generalized l1 greedy algorithm performs extraordinarily well in recovering random sparse signals with nonzero small entries. The stability of the generalized l1 greedy algorithm with respect to its parameters and the impact of noise on the recovery of Gaussian sparse signals are also studied. 展开更多
关键词 Compressed Sensing Gaussian Sparse Signals l1-Minimization Reweighted l1-Minimization L1 greedy algorithm Generalized L1 greedy algorithm
下载PDF
基于I-Greedy求解CVaR模型的传感器网络布局优化
15
作者 高安迪 吴晓霞 李峰 《机械设计与制造》 北大核心 2023年第12期138-141,共4页
无线传感器网络在机械设备状态监测领域有着重要的作用,为了解决传统随机优化方法不适合某些复杂场传感器网络布局景的问题,提出了一种基于I-Greedy求解CVaR模型。采用惰性赋值的方法完成算法的简化过程,为τ设置了相应的搜索间隔Δ和... 无线传感器网络在机械设备状态监测领域有着重要的作用,为了解决传统随机优化方法不适合某些复杂场传感器网络布局景的问题,提出了一种基于I-Greedy求解CVaR模型。采用惰性赋值的方法完成算法的简化过程,为τ设置了相应的搜索间隔Δ和搜索区间(0,Γ),防止算法出现局部最优解的情况,通过惰性赋值的方式实现快速搜索的功能。研究结果表明:τ搜索上界Γ设定成50和置信水平α=0.9时,能够确保各置信水平都搜索获得全局最优解。逐渐增加传感器节点数量后,布局效益获得了持续提升。计算得到互信息相对随机部署方法增加69%,与传统贪婪算法相比增加14.1%。CVaR布局模型相对传统布局模型可以达到更低损失程度,能够获得更优布局结果,提升了模型鲁棒性。算法能够显著降低时间复杂度,特别是进行大规模传感器布局时表现出了更强的优越性。 展开更多
关键词 传感器网络 布局优化 贪婪算法 布局损失
下载PDF
An Algorithm for the Inverse Problem of Matrix Processing: DNA Chains, Their Distance Matrices and Reconstructing
16
作者 Boris F. Melnikov Ye Zhang Dmitrii Chaikovskii 《Journal of Biosciences and Medicines》 CAS 2023年第5期310-320,共11页
We continue to consider one of the cybernetic methods in biology related to the study of DNA chains. Exactly, we are considering the problem of reconstructing the distance matrix for DNA chains. Such a matrix is forme... We continue to consider one of the cybernetic methods in biology related to the study of DNA chains. Exactly, we are considering the problem of reconstructing the distance matrix for DNA chains. Such a matrix is formed on the basis of any of the possible algorithms for determining the distances between DNA chains, as well as any specific object of study. At the same time, for example, the practical programming results show that on an average modern computer, it takes about a day to build such a 30 × 30 matrix for mnDNAs using the Needleman-Wunsch algorithm;therefore, for such a 300 × 300 matrix, about 3 months of continuous computer operation is expected. Thus, even for a relatively small number of species, calculating the distance matrix on conventional computers is hardly feasible and the supercomputers are usually not available. Therefore, we started publishing our variants of the algorithms for calculating the distance between two DNA chains, then we publish algorithms for restoring partially filled matrices, i.e., the inverse problem of matrix processing. Previously, we used the method of branches and boundaries, but in this paper we propose to use another new algorithm for restoring the distance matrix for DNA chains. Our recent work has shown that even greater improvement in the quality of the algorithm can often be achieved without improving the auxiliary heuristics of the branches and boundaries method. Thus, we are improving the algorithms that formulate the greedy function of this method only. . 展开更多
关键词 DNA Chains Distance Matrix Optimization Problem Restoring algorithm greedy algorithm HEURISTICS
下载PDF
Selection of Metaheuristic Algorithm to Design Wireless Sensor Network
17
作者 Rakhshan Zulfiqar Tariq Javed +2 位作者 Zain Anwar Ali Eman H.Alkhammash Myriam Hadjouni 《Intelligent Automation & Soft Computing》 SCIE 2023年第7期985-1000,共16页
The deployment of sensor nodes is an important aspect in mobile wireless sensor networks for increasing network performance.The longevity of the networks is mostly determined by the proportion of energy consumed and t... The deployment of sensor nodes is an important aspect in mobile wireless sensor networks for increasing network performance.The longevity of the networks is mostly determined by the proportion of energy consumed and the sensor nodes’access network.The optimal or ideal positioning of sensors improves the portable sensor networks effectiveness.Coverage and energy usage are mostly determined by successful sensor placement strategies.Nature-inspired algorithms are the most effective solution for short sensor lifetime.The primary objective of work is to conduct a comparative analysis of nature-inspired optimization for wireless sensor networks(WSNs’)maximum network coverage.Moreover,it identifies quantity of installed sensor nodes for the given area.Superiority of algorithm has been identified based on value of optimized energy.The first half of the paper’s literature on nature-inspired algorithms is discussed.Later six metaheuristics algorithms(Grey wolf,Ant lion,Dragonfly,Whale,Moth flame,Sine cosine optimizer)are compared for optimal coverage of WSNs.The simulation outcomes confirm that whale opti-mization algorithm(WOA)gives optimized Energy with improved network coverage with the least number of nodes.This comparison will be helpful for researchers who will use WSNs in their applications. 展开更多
关键词 BIO-INSPIRED computing EVOLUTIONARY COMPUTATION greedy algorithms wireless sensor network computational intelligence
下载PDF
改进RRT算法的采摘机械臂路径规划 被引量:2
18
作者 赵辉 郑缙奕 +1 位作者 岳有军 王红君 《重庆理工大学学报(自然科学)》 CAS 北大核心 2024年第1期338-345,共8页
针对采用传统的快速随机扩展树(RRT)算法的采摘机械臂在果园工作环境中搜索路径时间长,最终路径不平滑、拐点多等问题,提出了一种改进的RRT避障算法。改进的算法采用高斯采样策略,减少了采样的随机性,避免产生更多不必要的随机树,增加... 针对采用传统的快速随机扩展树(RRT)算法的采摘机械臂在果园工作环境中搜索路径时间长,最终路径不平滑、拐点多等问题,提出了一种改进的RRT避障算法。改进的算法采用高斯采样策略,减少了采样的随机性,避免产生更多不必要的随机树,增加规划的导向性;再添加A*代价函数去除路径的冗余点,最后使用贪婪算法简化路径,减少拐点,让机械臂可以快速、准确、平稳地沿着最佳路径运动到目标点。仿真表明,改进后的算法有效地减少了路径规划的时间,缩短了路径长度,具有良好的可行性和有效性。 展开更多
关键词 机械臂 RRT 高斯采样 贪婪算法
下载PDF
基于改进遗传算法的细纱接头路径指引方法 被引量:1
19
作者 王庆峰 黄克华 +4 位作者 张立杰 李辉 董相杰 曹玉胜 朱伟伟 《棉纺织技术》 CAS 2024年第1期7-12,共6页
为了提高细纱车间整体断头的接头效率,在细纱单锭监测系统响应到细纱断头信息的条件下,建立以整体车间断头接头路径最优化为目标函数的细纱接头路径指引模型,并运用Python编程语言分别实现对贪心算法、遗传算法和改进遗传算法接头路径... 为了提高细纱车间整体断头的接头效率,在细纱单锭监测系统响应到细纱断头信息的条件下,建立以整体车间断头接头路径最优化为目标函数的细纱接头路径指引模型,并运用Python编程语言分别实现对贪心算法、遗传算法和改进遗传算法接头路径模型的求解,结合传统巡回式接头路径与3种算法在效率、运行速度和解的质量上的仿真测试,对比验证改进遗传算法用于细纱接头路径指引方法的可行性。试验结果表明:相较于传统巡回式路径,改进遗传算法平均效率提升了11.8%,且解均优于其他两种算法;相较于遗传算法,改进遗传算法的响应时间缩短较多,平均为1.25 s,且波动较小,时间效率提升了80.3%。认为:改进遗传算法在效率、运行速度和解的质量上都优于其他算法,在细纱接头领域具有较高的应用优势,能够显著提高接头效率和降低成本。 展开更多
关键词 细纱接头 路径指引 单锭监测 贪心算法 遗传算法
下载PDF
可重构智能表面辅助通信系统的非线性优化及实验设计 被引量:1
20
作者 许方敏 《实验技术与管理》 CAS 北大核心 2024年第4期53-59,共7页
针对可重构智能表面辅助的通信系统,提出了一种智能反射表面开关选择和功率分配的联合设计方法,以改变电磁波传播环境、提高信号传输效率、减少功率消耗。首先,在保证接收端数据传输速率达到一定门限值等多个约束条件下,建立以系统能量... 针对可重构智能表面辅助的通信系统,提出了一种智能反射表面开关选择和功率分配的联合设计方法,以改变电磁波传播环境、提高信号传输效率、减少功率消耗。首先,在保证接收端数据传输速率达到一定门限值等多个约束条件下,建立以系统能量效率最大化为目标的多维变量联合非线性优化问题,其中涉及的优化变量包括:智能反射表面开关选择、相位调整和功率分配。在开关选择方面,采用贪婪算法选择开启起主要作用的元器件,并关掉起次要作用的智能反射表面。在功率分配方面,通过求解凸优化问题得到功率分配的闭式解。基于此,设计出一种高传输速率、低功率消耗的迭代优化算法。最后,设计仿真教学实验,通过MATLAB软件,验证了所提出的联合优化算法通过改变电磁波传播环境,有效地提高了信号传输的速率和能量效率;并分析了实验中导致算法性能发生变化的机理,这也有利于帮助学生提高科研创新能力和工程实践能力。 展开更多
关键词 非线性优化问题 贪婪算法 可重构智能表面 实验设计
下载PDF
上一页 1 2 90 下一页 到第
使用帮助 返回顶部