首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
One of the undesirable phenomena in the surface mines, which results in various hazards for human and facilities, is flyrock. It seems that the careful study of the subject and its effects on the environment can affect the control of flyrock hazards in the studied area. Therefore, the use of intelligent models and methods which are capable of predicting and simulating the risk of flyrock can be considered as an appropriate solution in this regard. The current research was conducted using nonlinear models and Monte Carlo (MC) simulation. The data used in this study consist of 260 samples of rock thrown from a mine in Malaysia. The parameters used in these models include hole’s diameter (D), hole’s depth (HD), burden to spacing (BS), stemming (ST), maximum charge per delay (MC), and powder factor (PF). At first, multiple regression analysis (MRA) and artificial neural network (ANN) models were used in order to develop a non-linear relationship between dependent and independent parameters. The ANN model was an appropriate predictor of flyrock in the mine. Then using the best implemented model of ANN, the flyrock environmental phenomenon was simulated using MC technique. MC simulation showed a proper level of accuracy of flyrock ranges in the mine. Using this simulation, it can be concluded with 90% accuracy that the Flyrock phenomenon does not exceed 331 m. Under these conditions, this simulation can be used for various areas requiring risk assessment. Finally, a sensitive analysis was carried out on data. This analysis showed MC has the greatest effect on flyrock.  相似文献   

2.
PSO与捕鱼策略相结合的优化方法   总被引:1,自引:2,他引:1       下载免费PDF全文
在分析粒子群优化算法(PSO)和采用捕鱼策略的优化方法(FSOA)存在不足的基础上,提出一种将PSO融入捕鱼策略中的优化算法。该算法要求渔夫在打渔活动中采用灵活机动的多点随机抛投鱼网策略。将该优化算法用于解决三个典型的带约束的函数优化问题,优化实验仿真结果表明,该方法具有收敛速度快、优化精度高、稳定性好的特点,具有较好的全局寻优能力。  相似文献   

3.
Many variants of Particle Swarm Optimization (PSO) algorithm have been proposed in literature in the past two decades. The two research major topics, namely particle movement trajectory analysis and parameter selection, have also been intensively explored. Focused on the two issues, this paper transforms the velocity updating strategy in PSO algorithm to an incremental PID controller and thus develops a new incremental PID controlled search strategy. To endow this new PID-controlled deterministic search strategy with a stochastic nature, a mutation operation is applied on the particles and their exemplars. Based on such learning concepts, a novel incremental PID-controlled PSO, called IPID-PSO in short, algorithm is proposed. The proposed IPID-PSO algorithm is applied to eight benchmark problems of function optimization widely considered in literature. Compare with other two PSO variants, the IPID-PSO algorithm outperforms them on most of the eight functions. This superiority shows the usefulness of the proposed search strategy. Finally, the IPID-PSO is employed to estimate the parameters of the Jiles–Atherton (J–A) model, which is usually adopted to describe the hysteresis loop of magnetic materials. The results demonstrate that the proposed IPID-PSO is also effective for the J–A model parameter estimation. Therefore it can be concluded that the IPID-PSO algorithm provides a promising and satisfactory solution to real-world applications.  相似文献   

4.
This paper presents results on a new hybrid optimization method which combines the best features of four traditional optimization methods together with an intelligent adjustment algorithm to speed convergence on unconstrained and constrained optimization problems. It is believed that this is the first time that such a broad array of methods has been employed to facilitate synergistic enhancement of convergence. Particle swarm optimization is based on swarm intelligence inspired by the social behavior and movement dynamics of bird flocking, fish schooling, and swarming theory. This method has been applied for structural damage identification, neural network training, and reactive power optimization. It is also believed that this is the first time an intelligent parameter adjustment algorithm has been applied to maximize the effectiveness of individual component algorithms within the hybrid method. A comprehensive sensitivity analysis of the traditional optimization methods within the hybrid group is used to demonstrate how the relationship among the design variables in a given problem can be used to adjust algorithm parameters. The new method is benchmarked using 11 classical test functions and the results show that the new method outperforms eight of the most recently published search methodologies.  相似文献   

5.
基于MPI的并行PSO混合K均值聚类算法   总被引:2,自引:0,他引:2  
传统的串行聚类算法在对海量数据进行聚类时性能往往不尽如人意,为了适应海量数据聚类分析的性能要求,针对传统聚类算法的不足,提出一种基于消息传递接口(MPI)集群的并行PSO混合K均值聚类算法。首先将改进的粒子群与K均值结合,提高该算法的全局搜索能力,然后利用该算法提出一种新的并行聚类策略,并将该算法与K均值聚类算法、粒子群优化(PSO)聚类算法进行比较。实验结果表明,该算法不仅具有较好的全局收敛性,而且具有较高的加速比。  相似文献   

6.
基于PSO求解随机期望值模型的混合智能算法   总被引:2,自引:1,他引:1       下载免费PDF全文
随机期望值模型是一类有着广泛应用背景的随机规划问题,为了寻找更为高效的求解随机期望值模型的算法,采用随机仿真产生样本训练BP网络以逼近随机函数,然后应用微粒群算法并以逼近随机函数的神经元网络作为适应值估计和实现为了检验解的可行性,从而提出了一种求解随机期望值模型的混合智能算法。最后通过两个实例的仿真结果说明了算法的正确性和有效性。  相似文献   

7.
Yu  Zhi  Shi  Xiuzhi  Zhou  Jian  Rao  Dijun  Chen  Xin  Dong  Wenming  Miao  Xiaohu  Ipangelwa  Timo 《Engineering with Computers》2021,37(2):991-1006
Engineering with Computers - The indirect and accurate determination of blast-induced rock movement has important significance in the reduction of ore loss and dilution and in the protection of...  相似文献   

8.
基于证据可信度的证据合成新方法   总被引:7,自引:1,他引:6  
Dempster-Shafer理论合成高冲突证据时结果不合常理, 许多改进方法能较好地解决这一问题, 但证据比较一致时, 这些方法性能相对于Dempster-Shafer合成规则较差. 鉴于此, 提出了一种基于证据可信度的证据合成方法.首先建立一个证据距离矩阵, 之后求出系统中各证据到证据集的均方欧式距离, 通过引入可信度函数来获得证据源的可信度因子"并对证据源进行修正, 最后使用Dempster-Shafer合成公式对修正后的证据加以合成. 数值实验结果 表明, 改进后的方法不仅适用于证据高冲突情况, 而且也适用于证据比较一致的情况.  相似文献   

9.
为进一步提高组合预测的预测精度,有必要对预测模型的权重分配进行研究。将粒子群算法用于求解组合预测中模型的权重,并在研究过程中针对基本粒子群算法的不足,对粒子群算法的参数惯性权重和加速度因子进行了改进,构造了基于改进粒子群算法的组合预测模型。以重庆市物流需求的预测为背景,以四种方法为参照对象,对比验证了该改进模型的有效性以及预测的准确性。  相似文献   

10.
Multimedia Tools and Applications - Automatic human fall detection plays a significant role in monitoring senior citizens. Detecting fall events in an intelligent indoor condition can be used as a...  相似文献   

11.
利用丝光沸石(MOR)和方沸石(ANA)的晶体学数据建立它们的三维骨架模型,并用HyperChem提供的脚本语言,编写Tcl—Hcl的混合脚本程序从拓扑学角度对MOR到ANA的转晶过程进行计算机模拟。简要地介绍了分子建模与计算机模拟的基本方法并给出了数据读人、移动原子、数据输出三部分的具体实现代码。  相似文献   

12.
13.
This paper presents a novel approach to feature selection based on analysis of class regions which are generated by a fuzzy classifier. A measure for feature evaluation is proposed and is defined as the exception ratio. The exception ratio represents the degree of overlaps in the class regions, in other words, the degree of having exceptions inside of fuzzy rules generated by the fuzzy classifier. It is shown that for a given set of features, a subset of features that has the lowest sum of the exception ratios has the tendency to contain the most relevant features, compared to the other subsets with the same number of features. An algorithm is then proposed that performs elimination of irrelevant features. Given a set of remaining features, the algorithm eliminates the next feature, the elimination of which minimizes the sum of the exception ratios. Next, a terminating criterion is given. Based on this criterion, the proposed algorithm terminates when a significant increase in the sum of the exception ratios occurs due to the next elimination. Experiments show that the proposed algorithm performs well in eliminating irrelevant features while constraining the increase in recognition error rates for unknown data of the classifiers in use.  相似文献   

14.
Radiotherapy planning is a complex problem which requires both expertise and experience of an oncologist. A case based reasoning (CBR) system is developed to generate dose plans for prostate cancer patients. The proposed approach captures the expertise and experience of oncologists in treating previous patients and recommends a dose in phase I and phase II of the treatment of a new patient considering also the success rate of the treatment. The proposed CBR system employs a modified Dempster–Shafer theory to fuse dose plans suggested by the most similar cases retrieved from the case base. In order to mimic the continuous learning characteristic of oncologists, the weights corresponding to each feature used in the retrieval process are updated automatically each time after generating a treatment plan for a new patient. The efficiency of the proposed methodology has been validated using real data sets collected from the Nottingham University Hospitals NHS, City Hospital Campus, UK. Experiments demonstrated that for most of the patients, the dose plan generated by our approach is coherent with the dose plan suggested by an experienced oncologist. This methodology can assist both new and experienced oncologists in the treatment planning.  相似文献   

15.
Block matching motion estimation is a popular method in developing video coding applications. A new algorithm has been proposed for reducing the number of search points using a pattern based particle swarm optimization (PSO) for motion estimation. The conventional particle swarm optimization has been modified to provide accurate solutions in motion estimation problems. This leads to very low computational cost and good estimation accuracy. Due to the center biased nature of the videos, the proposed approach uses an initial pattern to speed up the convergence of the algorithm. Simulation results show that improvements over other fast block matching motion estimation algorithms could be achieved with 31%~63% of search point reduction, without degradation of image quality.  相似文献   

16.
An intelligent verification platform based on a structured analysis model is presented.Using an abstract model mechanism with specific signal interfaces for user callback,the unified structured analysis data,shared by the electronic system level design,functional verification,and performance evaluation,enables efficient management review,auto-generation of code,and modeling in the transaction level.We introduce the class tree,flow parameter diagram,structured flow chart,and event-driven finite state machine as structured analysis models.As a sand table to carry maps from different perspectives and levels via an engine,this highly reusable platform provides the mapping topology to search for unintended consequences and the graph theory for comprehensive coverage and smart test cases.Experimental results show that the engine generates efficient test sequences,with a sharp increase in coverage for the same vector count compared with a random test.  相似文献   

17.
余磊  邓亚平  王江波 《计算机应用》2006,26(7):1557-1559
首先对规则数据库存在冲突的情况进行处理,生成了无冲突的规则数据库。然后基于层次智能切割算法,同时构造无冲突的哈希函数,提出了一种新的IP分类算法,即基于层次智能切割和无冲突哈希算法( HICNCH),并且提出利用最小二乘法改进了层次智能切割树分割域的判定准则,使分割更加高效。通过与经典算法的各项指标的比较,论证了该算法具有较小时间复杂度和空间复杂度,综合性能有了较大提高。  相似文献   

18.
19.
《Information Sciences》2007,177(11):2308-2326
This paper proposes an approach to fuzzy rough sets in the framework of lattice theory. The new model for fuzzy rough sets is based on the concepts of both fuzzy covering and binary fuzzy logical operators (fuzzy conjunction and fuzzy implication). The conjunction and implication are connected by using the complete lattice-based adjunction theory. With this theory, fuzzy rough approximation operators are generalized and fundamental properties of these operators are investigated. Particularly, comparative studies of the generalized fuzzy rough sets to the classical fuzzy rough sets and Pawlak rough set are carried out. It is shown that the generalized fuzzy rough sets are an extension of the classical fuzzy rough sets as well as a fuzzification of the Pawlak rough set within the framework of complete lattices. A link between the generalized fuzzy rough approximation operators and fundamental morphological operators is presented in a translation-invariant additive group.  相似文献   

20.
One of the most common attacks is man-in-the-middle (MitM) which, due to its complex behaviour, is difficult to detect by traditional cyber-attack detection systems. MitM attacks on internet of things systems take advantage of special features of the protocols and cause system disruptions, making them invisible to legitimate elements. In this work, an intrusion detection system (IDS), where intelligent models can be deployed, is the approach to detect this type of attack considering network alterations. Therefore, this paper presents a novel method to develop the intelligent model used by the IDS, being this method based on a hybrid process. The first stage of the process implements a feature extraction method, while the second one applies different supervised classification techniques, both over a message queuing telemetry transport (MQTT) dataset compiled by authors in previous works. The contribution shows excellent performance for any compared classification methods. Likewise, the best results are obtained using the method with the highest computational cost. Thanks to this, a functional IDS will be able to prevent MQTT attacks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号