首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
徐峥  炎士涛 《微计算机信息》2006,22(31):313-314
遗传算法作为一种模仿生物自然进化过程的随机优化算法,其群体规模对算法的性能影响很大,群体规模越大,越有利于提高算法的寻优能力,但随着群体规模增大,计算量也显著增加。该文在传统自适应遗传算法整个进化过程中,分阶段对一些适应度较差的父个体进行更新,增大了搜索空间,提高了算法的寻优能力且未增加群体规模。仿真实验表明,与传统自适应遗传算法相比,该算法能显著提高解的质量和鲁棒性。  相似文献   

2.
该文将遗传算法和牛顿算法相结合,提出一种非线性智能集成算法解决信息网络拥塞问题,弥补了牛顿算法求率低、可靠性差以及遗传算法收敛速度慢的缺陷。用于网络拥塞控制的仿真结果表明,该算法能够高速可靠地拥塞模型的全局解,能有效解决网络拥塞问题,并使信元丢失率保持在CCITT要求的最优水平。  相似文献   

3.
实施遗传算法的多Agent系统的构建与实现   总被引:1,自引:1,他引:1  
针对常规遗传算法的不足,该文引入智能体技术实施遗传算法,所构建的多Agent系统能从进化环境中获取表征目前进化状态的有用信息,动态地调整进化参数,监控并调度进化操作,以期快速高效地搜索到全局最优,从而提升GA的优化性能。多个实例试验表明该算法能改善常规遗传算法的欠缺,显示出超越常规遗传算法的优良性能。  相似文献   

4.
基于混合蚁群算法的WTA问题求解   总被引:3,自引:0,他引:3  
武器-目标分配问题(Weapon-TargetAssignmentProblem)是一种典型的NP问题。该文提出了一种基于遗传算法和蚁群算法的混合算法(GAACO)以解决武器-目标分配问题。首先,使用遗传算法对火力分配问题形成初始解;然后,将遗传算法的结果传递给改进的蚁群算法,对问题求精确解。实验结果表明该算法求精度优于遗传算法,时间性能优于传统蚁群算法。  相似文献   

5.
自适应遗传神经算法及故障识别   总被引:5,自引:0,他引:5  
该文在改进遗传算法和神经网络反向传播算法的基础上,探讨了一种自适应遗传神经算法与结合模型,并将其应用于变压器故障识别。实验数据表明:该算法收敛速度快,能有效地识别故障,对类似电气设备的故障识别有参考价值。  相似文献   

6.
穆艳玲 《数字社区&智能家居》2009,5(4):2652-2653,2658
该文对串行遗传算法进行了并行设计,加入对当前通用消息传递接口MPI的支持,形成了一个主从式并行遗传算法。针对该算法用经典的测遗传算法效率的OliverTSP问题进行测试,得出并行遗传算法可以更好的提高遗传算法的收敛性。  相似文献   

7.
分布式实时多媒体的大量应用对能有效支持服务质量(QoS)的组播路由算法提出了迫切的要求,由于其NP-Complete特性,只能采用启发式算法。该文提出了一种基于PBIL(Population-BasedIncrementalLearning)进化算法的时延受限组播路由算法,该算法有效结合了遗传算法的进化特性与竞争学习算法的特点,实施简单,仿真表明它不但显著提高了收敛速度,而且能以较大概率收敛到最优解。  相似文献   

8.
针对传统的遗传算法容易导致算法的过早收敛而陷于局部最优困境,或收敛时间过长而消耗大量的搜索时间的缺陷,该文提出了一种改进的遗传算法,该算法采用一种自适应变异率和改进的个体选择方法,并且将这种改进遗传算法应用于关联规则的挖掘,实验结果证明这种算法是有效的。  相似文献   

9.
该文通过分析通信网络中的拓扑优化问题,抽象出数学模型,并利用遗传算法对该模型进行求解。最后通过实例验证用遗传算法求解该问题明显优于一些传统的算法,文中所建立的数学模型和算法能够正确地解决通信网络拓扑优化问题。  相似文献   

10.
一种整数编码的改进遗传算法   总被引:13,自引:1,他引:13  
遗传算法作为一种优秀的寻优算法,编码策略是其基础。因二进制编码和实数编码均存在一定的不足,该文提出一种整数编码的最优化遗传算法。为了提高收敛效率和避免算法的早熟收敛,该文采用了截断选择机制和混合杂交、邻近变异等操作算子,并引入邻域搜索技术来提高算法的局部搜索能力。仿真计算表明了该算法具有令人满意的全局最优性能和统计稳定性。  相似文献   

11.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

12.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

13.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

14.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

15.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

16.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and  相似文献   

17.
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control  相似文献   

18.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

19.
20.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号