共查询到20条相似文献,搜索用时 15 毫秒
1.
基于云模型的信任评估研究 总被引:3,自引:0,他引:3
讨论了信任关系的随机性和模糊性共存以及相互融合问题。分析云模型描述不确定性概念的方法和实现定性语意与定量数值相互转换的算法,提出了基于云理论的信任评估模型—信任云。该模型提出云特征参数表达的信任传递和合并算法,在精确描述信任期望值的同时,通过熵和超熵刻画了信任的不确定性。相对于传统的信任评估策略,该模型获取的信任值包含更多的语意信息,更适合作为信任决策的依据。 相似文献
2.
3.
三级倒立摆的云控制方法及动平衡模式 总被引:18,自引:2,他引:18
文章提出了定性和定量之间转换的云模型的形式化表示方法,用来反映语言值中蕴涵的模糊性和随机性,给出云发生器的生成算法,解释多条定性推理规则同时被激活时的不确定性推理机制。利用这种智能控制方法有效地实现了单电机控制的一、二、三级倒立摆的多种不同动平衡姿态,显示其鲁棒性,并给出了详细试验结果。研究成果不仅可用于对太空飞行器以及机器人控制,而且对揭示定性定量转换规律和策略具有普遍意义。 相似文献
4.
5.
目的 针对校园共享图书柜综合评价过程中存在的模糊性和随机性问题,引入了博弈论云模型理论对校园共享图书柜进行综合评价。方法 首先,对海选的评价指标进行变异系数筛选,建立了以运营方、产品设计、用户使用不同维度的综合评价指标;其次,利用博弈论算法将改进层次分析法确定的主观赋值权重和熵权法确定的客观计算权重进行组合赋权,在此基础上引入云模型理论将定性描述转化成定量值,通过数据分析和比较实现其综合评价和排序;最后,以三个校园共享图书柜样本的综合评价为例验证了该方法的可行性,综合云指标参数及云图对比分析样本优化方向。结论 该方法能够客观真实地对产品方案进行综合评价,其在处理评价模糊和随机问题有一定的优越性,能够有效的为校园共享图书柜后期优化提供量化分析参考。 相似文献
6.
针对当前不具备专业知识的用户难以从海量云服务中选择满足其偏好的云服务商的问题,构建了满足用户需求偏好的云服务商推荐模型。该模型包括以下3部分:首先,从用户角度,通过模糊评价的方法确定并衡量用户对云服务的需求偏好;其次,从云服务商角度,通过模糊评价法和熵权法确定并衡量其满足用户需求的能力;最后,利用相似距离公式,将用户与候选服务商的相似性程度进行排序,向用户推荐最匹配的云服务商。算例结果表明,与传统的推荐方法相比,该模型能够更好地针对用户对云服务各项指标的偏好进行推荐,提高了用户选择云服务商的准确性。 相似文献
7.
针对城市三维环境下LiDAR点云数据密度大、离群噪点多、分布散乱不利于后期点云帧间匹配的问题, 提出一种应用于城市环境下大规模三维LiDAR点云帧间匹配的预处理方法。首先, 将点云数据转化为均值高程图, 利用网格之间的高度梯度对点云进行地面分割处理; 然后, 通过三维体素栅格划分的方法改进了DBSCAN聚类算法, 用改进后的VG-DBSCAN对点云进行聚类, 聚类后目标点云与离群点分离, 从而剔除点云中的离群噪点; 最后, 采用Voxel Grid滤波器对点云降采样。实验结果表明, 所提方法可以对点云数据进行实时的预处理, 平均耗时为132.1 ms; 预处理之后点云帧间匹配的精确度提高了2倍, 平均耗时也仅为预处理前的1/6。 相似文献
8.
知识表示中的不确定性 总被引:33,自引:1,他引:32
知识表示一直是人工智能研究中的一个瓶颈,其难点在于知识中隐含有不确定性,即模糊性和随机性。意提出用云模型3个数字特征(期望值,熵,超熵)来描述一个定性概念,用熵来关联模糊性和随机性。代表定性概念的云的某一次定量值,被称为云滴,要以用它对此概念的贡献度来衡量,许许多多云滴构成云,实现实性和定量之间的随时转换,反映了知识表示中的不确定性。论以此对我国农历24个节气进行了新的最化解释。云方法已经用于数据开采、智能控制、跳频电台和大系统效能评估中,取得明显的效果。 相似文献
9.
10.
Sumbal Zahoor Ishtiaq Ahmad Ateeq Ur Rehman Elsayed Tag Eldin Nivin A. Ghamry Muhammad Shafiq 《计算机、材料和连续体(英文)》2023,75(1):311-327
The development of the Next-Generation Wireless Network
(NGWN) is becoming a reality. To conduct specialized processes more, rapid
network deployment has become essential. Methodologies like Network
Function Virtualization (NFV), Software-Defined Networks (SDN), and
cloud computing will be crucial in addressing various challenges that 5G
networks will face, particularly adaptability, scalability, and reliability. The
motivation behind this work is to confirm the function of virtualization
and the capabilities offered by various virtualization platforms, including
hypervisors, clouds, and containers, which will serve as a guide to dealing
with the stimulating environment of 5G. This is particularly crucial when
implementing network operations at the edge of 5G networks, where limited
resources and prompt user responses are mandatory. Experimental results
prove that containers outperform hypervisor-based virtualized infrastructure
and cloud platforms’ latency and network throughput at the expense of higher
virtualized processor use. In contrast to public clouds, where a set of rules is
created to allow only the appropriate traffic, security is still a problem with
containers. 相似文献
11.
12.
13.
为了避免点云在人工去噪时的复杂工作流程,进一步提高点云去噪效率,在相关研究基础上,设计了一种基于混合滤波和空间密度聚类的点云去噪算法。首先,通过直通滤波去除点云的无效点;其次,采用统计滤波删除点云的大尺度噪声点;再次,利用空间密度聚类算法移除点云的小尺度噪声点。最后,通过相关点云测量数据对设计的算法进行仿真实验验证,并与传统点云去噪算法的计算结果进行对比分析。结果表明,所设计的算法去噪效果优于传统点云去噪算法。 相似文献
14.
点云孔洞修补作为点云数据处理中的关键技术,直接影响点云的质量和完整性。利用遗传算法(genetic algorithm,GA)优化的BP(back propagation,反向传播)神经网络(简称GA-BP神经网络)是一种修补效果较好的散乱点云孔洞修补方法。但基于GA-BP神经网络的散乱点云孔洞传统修补方法的多个步骤需借助逆向软件通过人机交互的方式完成,导致修补过程繁琐且耗时较长。为此,提出了一种基于GA-BP神经网络的散乱点云孔洞自动修补方法。通过计算机编程将孔洞识别、孔洞区域插值和孔洞修补相结合,实现从残缺点云模型直接到完整点云模型的自动修补,无须进行复杂的人机交互和数据转换。实验结果表明,所提出的方法可有效避免因数据转换而造成的数据失真,减少了人机交互工作量,方便而高效地修补了散乱点云的孔洞,且得到的修补点云密度均匀,这对提高点云孔洞修补效率和质量具有重要意义。 相似文献
15.
提出一种概率地震需求分析的云图-条带法。该方法通过引入经验地震易损性分析中的数据处理方法,解决传统云图法无法处理海量非线性时程分析结果的局限。为说明该文提出方法,选取100条地震动作为输入,针对23个钢筋混凝土框架结构进行了云图法分析。基于所有结构的云图结果,采用云图-条带法建立了群体结构的概率地震需求模型,并计算得到了群体结构的地震易损性。研究表明:云图-条带法可以有效地处理海量非线性时程分析结果,建立较为合理的概率地震需求模型。在输入地震动的强度范围内,群体结构整体发生严重破坏和完全破坏的概率很低,而主要以发生轻微破坏和中等破坏为主。 相似文献
16.
The traditional multi-access edge computing (MEC) capacity is overwhelmed by the increasing demand for vehicles, leading to acute degradation in task offloading performance. There is a tremendous number of resource-rich and idle mobile connected vehicles (CVs) in the traffic network, and vehicles are created as opportunistic ad-hoc edge clouds to alleviate the resource limitation of MEC by providing opportunistic computing services. On this basis, a novel scalable system framework is proposed in this paper for computation task offloading in opportunistic CV-assisted MEC. In this framework, opportunistic ad-hoc edge cloud and fixed edge cloud cooperate to form a novel hybrid cloud. Meanwhile, offloading decision and resource allocation of the user CVs must be ascertained. Furthermore, the joint offloading decision and resource allocation problem is described as a Mixed Integer Nonlinear Programming (MINLP) problem, which optimizes the task response latency of user CVs under various constraints. The original problem is decomposed into two subproblems. First, the Lagrange dual method is used to acquire the best resource allocation with the fixed offloading decision. Then, the satisfaction-driven method based on trial and error (TE) learning is adopted to optimize the offloading decision. Finally, a comprehensive series of experiments are conducted to demonstrate that our suggested scheme is more effective than other comparison schemes. 相似文献
17.
目的提供一种包装企业云服务供应商综合评估的方法。方法从应用和管理2个视域审视云服务供应商,建立包装企业云服务供应商综合评估指标框架。考虑不同专家经验水平、知识水平等的差异,通过BP神经网络从历史样本中求解各专家的权重。用基于专家权重改进的模糊层次分析法来对各评估指标进行主观赋权,用CRITIC法来对各评估指标进行客观赋权,基于主客观权重求解最终的合成权重。通过TOPSIS对候选的云服务供应商进行综合评估并排序。结果在某包装企业的应用算例证明了该方法的可行性和有效性。结论在包装产业与云计算的深度融合的背景下,所提出的云服务供应商综合评估方法能够为包装企业云制造模式的实施提供支持。 相似文献
18.
J. Stanly Jayaprakash Kishore Balasubramanian Rossilawati Sulaiman Mohammad Kamrul Hasan B. D. Parameshachari Celestine Iwendi 《计算机、材料和连续体(英文)》2022,72(1):519-534
Many organizations apply cloud computing to store and effectively process data for various applications. The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity. In this research, an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data. Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data. Merkle Hash tree provides the efficient mapping of data and easily identifies the changes made in the data due to proper structure. The developed model supports privacy-preserving public auditing to provide a secure cloud storage system. The data owners upload the data in the cloud and edit the data using the private key. An enhanced Merkle hash tree method stores the data in the cloud server and splits it into batches. The data files requested by the data owner are audit by a third-party auditor and the multi-owner authentication method is applied during the modification process to authenticate the user. The result shows that the proposed method reduces the encryption and decryption time for cloud data storage by 2–167 ms when compared to the existing Advanced Encryption Standard and Blowfish. 相似文献
19.
20.
Lili He Dantong Ouyang Meng Wang Hongtao Bai Qianlong Yang Yaqing Liu Yu Jiang 《计算机、材料和连续体(英文)》2018,57(3):549-570
In this paper, the clustering analysis is applied to the satellite image segmentation, and a cloud-based thunderstorm cloud recognition method is proposed in combination with the strong cloud computing power. The method firstly adopts the fuzzy C-means clustering (FCM) to obtain the satellite cloud image segmentation. Secondly, in the cloud image, we dispose the ‘high-density connected’ pixels in the same cloud clusters and the ‘low-density connected’ pixels in different cloud clusters. Therefore, we apply the DBSCAN algorithm to the cloud image obtained in the first step to realize cloud cluster knowledge. Finally, using the method of spectral threshold recognition and texture feature recognition in the steps of cloud clusters, thunderstorm cloud clusters are quickly and accurately identified. The experimental results show that cluster analysis has high research and application value in the segmentation processing of meteorological satellite cloud images. 相似文献