首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Grid empowered calculations are becoming an important advanced tool indispensable for scientific advances. The possibility of simplifying and harmonizing the work carried out by computational scientists using a Web Service approach is considered here. To this end, a new Collaborative Grid Framework has been developed and tested. As a study case a three dimensional reactive scattering code dealing with atom-diatom systems has been considered. To this end an extended study of the energy dependence of the electronically adiabatic reactivity of N+N2 has been performed on the EGEE Grid.  相似文献   

2.
In this paper, we present a Knowledge Based Genetic Algorithm (KBGA) for the network optimization of Supply Chain (SC). The proposed algorithm integrates the knowledge base for generating the initial population, selecting the individuals for reproduction and reproducing new individuals. From the literature, it has been seen that simple genetic-algorithm-based heuristics for this problem lead to and large number of generations. This paper extends the simple genetic algorithm (SGA) and proposes a new methodology to handle a complex variety of variables in a typical SC problem. To achieve this aim, three new genetic operators—knowledge based: initialization, selection, crossover, and mutation are introduced. The methodology developed here helps to improve the performance of classical GA by obtaining the results in fewer generations. To show the efficacy of the algorithm, KBGA also tested on the numerical example which is taken from the literature. It has also been tested on more complex problems.  相似文献   

3.
目前,已经有很多文献阐述了不同的手写汉字识别算法,但是绝大多数算法都是针对单个汉字进行识别的,所以对于比较容易混淆的字,它们的识别效果都不好。该文针对这个问题,在单个汉字识别的基础上,结合汉语字典,加入了对前后汉字的语义考虑,大大地提高了这些容易混淆的汉字的识别率。  相似文献   

4.
针对传统的检测维修设备存在操作复杂、不利于部队野战使用等缺点,应用成熟的虚拟仪器技术,设计了适合部队使用的高性能的炮控系统检测维修设备;介绍了炮控系统检测维修设备的硬件和软件设计;采用虚拟仪器技术研制的炮控系统检测维修设备性能好、具有很强的兼容性和扩展性,简化了检测维修过程,真正实现了炮控系统检测维修的自动化和智能化。  相似文献   

5.
随着面向对象和软件复用技术的发展。产生了一种新的基于构件的软件开发方法,被广大软件开发人员普遍看好,发展很快。为了解决基于构件的软件开发成本估算的问题。结合构件的复用成本公式。在分析基于构件的软件开发方法特点的基础上提出了一种基于构件仿真的软件成本估算方法。利用分解法的思想,以传统开发方法的成本为基础,将基于构件的软件开发过程分成若干阶段,分别估算各阶段的成本,最终得到估算结果,为基于构件的软件开发成本估算提供了一个较好方法。最后给出了对该估算方法的评价,指出了今后研究的重点。  相似文献   

6.
In this paper a new zero order method of structural shape optimization, in which material shrinks or grows perpendicular to the design boundary, has been proposed in order to satisfy fully stressed design criteria. To avoid mesh distortion that results in undesirable shape, design element concept and for nodal movement and convergence checking, fuzzy set theory have been used. To accelerate the convergence, artificial neural networks are employed. The proposed approach, named as GSN technique, has been incorporated in a FORTRAN software GSOANN. Using this software shape optimization of four structures are carried out. It is demonstrated that proposed technique overcomes most of the shortcomings of mundane zero order methods.  相似文献   

7.
陶洋  孙涛  王坚 《计算机应用》2008,28(9):2210-2212
为了提高源路由协议(DSR)的性能,平衡整个网络的能量,减少拥塞,提高伸缩性和延长网络生存时间,对发送的RREP和RREQ包结构做了改进,加入了新的延迟发送机制,提出了一种新的协议IDSR,并用仿真对改进后的IDSR路由协议进行了性能评估。  相似文献   

8.
基于总空闲时间增量的无等待流水调度混合遗传算法   总被引:1,自引:0,他引:1  
将NP-难的最小化最大完工时间无等待流水调度问题等价转化为最小化总空闲时间的问题,改变传统求解调度序列目标函数的模式,通过目标函数变化量判断新解的优劣,大大降低算法所需计算时间.分析启发式算法基本操作和进化算子的总空闲时间增量性质,设计基本总空闲时间增量法以快速评估新产生解的质量.提出混合遗传算法IHGA(increment based hybrid genetic algorithm)求解该问题,构造相应初始种群生成方法和进化算子,提出进化概率动态更新策略和种群收敛判断与再生机制;算法混合了迭代改进局部搜索以进一步提高解的质量,基于120个经典Benchmark实例,将IHGA与目前求解该问题的有效算法RAJ,GR,SA2,TSM和FCH进行比较,实验结果表明:IHGA在性能方面优于其他,计算效率方面优于SA2和TSM,略逊于GR,RAJ和FCH.  相似文献   

9.
In this paper, we have proposed a new method of similarity measure associating the geometric distance, area and height of generalized trapezoidal fuzzy numbers. Some properties regarding the proposed new method of similarity measure have been derived. To illustrate the effectiveness of this method, it is compared with existing techniques taking thirty two different sets of generalized trapezoidal fuzzy numbers. Moreover, the proposed method has been used for calculating the fuzzy risk analysis in a production system in which different parameters are represented by linguistic trapezoidal fuzzy numbers.  相似文献   

10.
This paper presents a new causal design knowledge evaluation method and system for future CAD applications. Current product development processes still include unintended feedback due to insufficient product design knowledge. Previous research on design knowledge support system focuses on search by matching keywords and file names, or search by specific indices, which has various drawbacks. Furthermore, current CAD systems need manual input to incorporate the designer’s knowledge. To systematize the knowledge management process for the next-generation CAD systems, a prerequisite is to capture ever-evolving causal design knowledge. In this paper, we present a new causal knowledge network evaluation method, which has not been well addressed in design knowledge support system research. For the network evaluation, we present a degree of causal representation (DCR)-based knowledge network evaluation method. In this method, causality and network connectivity are used for the causal knowledge network with weighted vertices and weighted network connectivity for a network with weighted edges. To validate the proposed method, this evaluation method has been compared with structural measures. Finally, the causal design knowledge evaluation system, KNOES, is implemented and tested with a new valve design scenario.  相似文献   

11.
Fair signature exchange in emerging ubiquitous commerce (u-commerce) poses new security challenges. In particular, its operations are highly distributed and autonomous, and typically run on much open, dynamic and resource-diversified ubiquitous networks. These characteristics make the exchange very vulnerable to security attacks. Some effort has been made to address the challenges. As a result, an approach to autonomous fair exchange has been proposed specifically for u-commerce. Despite a number of novel features offered by the approach, its weaknesses are low efficiency and high complexity.This paper is aimed at proposing a more efficient and simpler solution for allowing the task of signature exchange to be delegated securely to selected devices in order to facilitate autonomous fair signature exchange on ubiquitous networks. To accomplish this aim, we have produced a novel approach to symmetric-key based verifiable proxy encryption to simplify the signature exchange delegation. Based on this approach, we have developed a new protocol for autonomous fair signature exchange in u-commerce. An analysis of the new protocol has been carried out to confirm its security, fairness and performance. A comparison with related work has demonstrated its better efficiency and simplicity.  相似文献   

12.
近年来出现了可以突破网络过滤,访问国外被禁止信息的破网行为。针对破网行为的研究与控制,具有十分重要的现实意义。流量分类技术一直是国内外网络测量方向的研究热点,并在P2P检测领域中取得了很好的效果。本文将流量分类领域中的支持向量机技术应用于破网软件freegate的行为检测。实验结果表明,该方法对于破网行为产生的流量具有较高的检测率,为有效监测破网行为提供了一种新思路。  相似文献   

13.
An editor is described for creating and modifying free-form surfaces. A modular system was developed in order to provide the researchers with a facility for communicating design ideas and new mathematical forms through an interactive graphical interface to a computer-based model. To achieve this it was necessary to invent a new graphical construct called a ‘spider’ for inputting three-dimensional parameters. This experimental system has the essential features of a large-scale implementation, with the capability of utilizing many new surface forms that have not yet been tried in actual applications.  相似文献   

14.
Fuzzy numerical technique for FMEA has been proposed to deal with the drawbacks of crisp FMEA and fuzzy rule based FMEA approaches. Fuzzy numerical approaches based on de-fuzzification also suffer from the drawback of providing arbitrary priority ranks of failure modes even when their membership functions overlap. To overcome this drawback we developed a new methodology integrating the concepts of similarity value measure of fuzzy numbers and possibility theory. Similarity value measure has been applied to group together failure modes having similar amount of risk value. The possibility theory has been used for checking for conformance guidelines. Two case studies have been shown to demonstrate the methodology thus developed. The proposed methodology is more robust in nature as it does not require arbitrary precise operations like de-fuzzification to prioritise the failure modes. Application of possibility theory is new to the domain of risk analysing using FMEA.  相似文献   

15.
基于模糊推理的软件测试度量方法   总被引:2,自引:1,他引:1  
如何形成软件测试有效的成本效益策略一直以来都是软件工程的重要研究内容.许多研究者致力于软件测试的有效性和质量度量的研究并已取得大量成果.但是,软件测试中最重要的问题之一--测试度量中内在的不确定和不相关的关系仍然没有解决.由此,提出一种新的基于模糊逻辑的软件测试质量和测试有效性度量方法,探讨了基于软件质量特性和相似性推理的方法,试图解决不同测试工作任务之间的测试质量和有效性一致的问题.同时提供实验的结果证明提出的方法的可行性.  相似文献   

16.
In the present day business environment, customer satisfaction is a pre-requisite for providing good service to the customer. The present day market is a customer driven market and only those who can fulfill customer demands at minimal rate and in shortest time can share a greater market share. Owing to the aforementioned factors, the problem of customers’ allocation to the vendors is considered to be very important problem and has attracted the attention of a lot of researchers. In this paper, a multiple vendor transportation problem having a variety of products and multiple customers has been taken into consideration. The problem considers two criteria: transportation time and transportation cost, thus making it a multi-criteria problem. To solve this problem, a heuristic based on a new approach, called artificial immune system (AIS) has been proposed. To strengthen AIS, a fuzzy logic controller (FLC) has been incorporated in the AIS heuristic. FLC changes the hyper mutation rate adaptively at iteration. A benchmark problem from the prominent literature review has been taken for showing the efficacy of the proposed algorithm. The supremacy of the problem has been shown by the randomly generated data set with increased complicacy of the problems.  相似文献   

17.
Very few studies have been carried out to test multi-robot task allocation swarm algorithms in real time systems, where each task must be executed before a deadline. This paper presents a comparative study of several swarm-like algorithms and auction based methods for this kind of scenarios. Moreover, a new paradigm called pseudo-probabilistic swarm-like, is proposed, which merges characteristics of deterministic and probabilistic classical swarm approaches. Despite that this new paradigm can not be classified as swarming, it is closely related with swarm methods. Pseudo-probabilistic swarm-like algorithms can reduce the interference between robots and are particularly suitable for real time environments. This work presents two pseudo-probabilistic swarm-like algorithms: distance pseudo-probabilistic and robot pseudo-probabilistic. The experimental results show that the pseudo-probabilistic swarm-like methods significantly improve the number of finished tasks before a deadline, compared to classical swarm algorithms. Furthermore, a very simple but effective learning algorithm has been implemented to fit the parameters of these new methods. To verify the results a foraging task has been used under different configurations.  相似文献   

18.
针对软件动态可信度量方法中准确性和效率存在的问题,提出以行为区间划分软件的结构并以行为轨迹属性刻画软件行为的基于行为轨迹属性的软件动态可信模型SBMDB(Software Behavior Model for Dynamic Trustworthiness Based on Behavior Path Properties)。通过对软件功能进行分析,划分软件的行为轨迹区间,提取区间的行为轨迹属性。同时,针对区间的包含、嵌套问题提出了区间化简算法,建立软件的行为模型。该模型以行为轨迹区间为度量基本单位,降低了度量时的整体消耗,提高了度量的效率。实验分析表明,该模型能够精确获取软件的行为信息,有效地检测攻击行为。与其它模型相比,SBMDB可以在保证度量结果准确性基础上提高度量效率。  相似文献   

19.
Machine Intelligence Research - The aim of this work is to model and analyze the behavior of a new smart nano force sensor. To do so, the carbon nanotube has been used as a suspended gate of a...  相似文献   

20.
Flexible robotic demanufacturing using real time tool path generation   总被引:1,自引:0,他引:1  
The need for new demanufacturing technologies exists due to a growing population of end of life electronic products. The demanufacturing method presented in this work is unique from disassembly because destructive methods are employed; thus, eliminating the need to account for precedence relationships. Furthermore, the new demanufacturing method employs cutting operations but differs from traditional machining operations due to the degree of flexibility required. To address this very high scale flexibility, a unique prototype flexible demanufacturing work cell has been established. Unique contributions of this flexible demanufacturing method include a new system model that utilizes a product surface model and a robot tool position model to actively generate real time tool paths. The model uses manifolds to reduce the tool path generation function to navigation of the surface manifold. Tool path generation occurs in three stages: machining operation sequencing, active tool path generation and active product avoidance. A case study of the demanufacture of mobile phones is presented to illustrate the flexible robotic demanufacturing operation. The case study shows that a new flexible robotic demanufacturing process has been achieved that requires no predetermined information on the product surface geometry.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号