首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Robust design optimisation using multi-objective evolutionary algorithms   总被引:1,自引:0,他引:1  
In this paper, a new robust design method is investigated with a hierarchical asynchronous parallel multi-objective evolutionary algorithms in an optimisation framework environment to solve single and multi-point design optimisation problems in aerodynamics. The single design techniques produce solutions that perform well for the selected design point but have poor off-design performance. Here, it is shown how the approach can provide robust solutions using game theory in the sense that they are less sensitive to little changes of input parameters. Starting from a statistical definition of stability, the method captures, simultaneously Pareto non-dominated solutions with respect to performance and stability criteria, offering alternative choices to the designer.  相似文献   

2.
Multimedia Tools and Applications - Business intelligence, as one of the branches of information technology, is increasingly considered by managers in today’s business world. In order to make...  相似文献   

3.
使用多种机器学习算法对宋词的风格进行了分类研究,通过比较测试结果选择了较优算法和较优的参数配置。同时,对实验的结果进行了回溯分析,定量分析了哪些单字对宋词风格的判定起到更大的作用。这种分析方法可以推广,用来作为作者写作风格的特征进行更进一步的研究分析。  相似文献   

4.
This paper presents a focused and comprehensive literature survey on the use of machine learning (ML) in antenna design and optimization. An overview of the conventional computational electromagnetics and numerical methods used to gain physical insight into the design of the antennas is first presented. The major aspects of ML are then presented, with a study of its different learning categories and frameworks. An overview and mathematical briefing of regression models built with ML algorithms is then illustrated, with a focus on those applied in antenna synthesis and analysis. An in‐depth overview on the different research papers discussing the design and optimization of antennas using ML is then reported, covering the different techniques and algorithms applied to generate antenna parameters based on desired radiation characteristics and other antenna specifications. Various investigated antennas are sorted based on antenna type and configuration to assist the readers who wish to work with a specific type of antennas using ML.  相似文献   

5.
Accurate identification of precipitating clouds is a challenging task. In the present work, Support Vector Machines (SVMs), Decision Trees (DT), and Random Forests (RD) algorithms were applied to extract and track mesoscale convective precipitating clouds from a series of 22 Geostationary Operational Environmental Satellite-13 meteorological image sub-scenes over the continental territory of Colombia. This study’s aims are twofold: (i) to establish whether the use of five meteorological spectral channels, rather than a single infrared (IR) channel, improves rainfall objects detection and (ii) to evaluate the potential of machine learning algorithms to locate precipitation clouds. Results show that while the SVM algorithm provides more accurate classification of rainfall cloud objects than the traditional IR brightness temperature threshold method, such improvement is not statistically significant. Accuracy assessment was performed using STEP (shape (S), theme (T), edge (E), and position (P)) object-based similarity matrix method, taking as reference precipitation satellite images from the Tropical Rainfall Measuring Mission. Best thematic and geometric accuracies were obtained applying the SVM algorithm.  相似文献   

6.
Multimedia Tools and Applications - Breast cancer is one of the most common types of cancer among Jordanian women. Recently, healthcare organizations in Jordan have adopted electronic health...  相似文献   

7.
This paper proposes the construction of a centralized hybrid metaheuristic cooperative strategy to solve optimization problems. Knowledge (intelligence) is incorporated into the coordinator to improve performance. This knowledge is incorporated through a set of rules and models obtained from a knowledge extraction process applied to the records of the results returned by individual metaheuristics. The effectiveness of the approach is tested in several computational experiments in which we compare the results obtained by the individual metaheuristics, by several non-cooperative and cooperative strategies and by the strategy proposed in this paper.  相似文献   

8.
使用机器学习算法分类P2P流量的方法*   总被引:4,自引:0,他引:4  
P2P应用的快速增长,带来网络拥塞等诸多问题,而传统的基于端口与有效载荷的P2P流量分类方法存在着很多缺陷。以抽取独立于端口、协议和有效载荷的P2P流的信息作为特征,用提出的基于ReliefF-CFS的方法选择流的特征子集,研究使用机器学习算法对P2P流量进行分类的方法,也研究了利用流的前向N个报文的统计信息作为特征,分类P2P流量的方法。实验结果显示提出的方法取得了较好的分类准确率。  相似文献   

9.
A novel and generic multi-objective design paradigm is proposed which utilizes quantum-behaved PSO (QPSO) for deciding the optimal configuration of the LQR controller for a given problem considering a set of competing objectives. There are three main contributions introduced in this paper as follows. (1) The standard QPSO algorithm is reinforced with an informed initialization scheme based on the simulated annealing algorithm and Gaussian neighborhood selection mechanism. (2) It is also augmented with a local search strategy which integrates the advantages of memetic algorithm into conventional QPSO. (3) An aggregated dynamic weighting criterion is introduced that dynamically combines the soft and hard constraints with control objectives to provide the designer with a set of Pareto optimal solutions and lets her to decide the target solution based on practical preferences. The proposed method is compared against a gradient-based method, seven meta-heuristics, and the trial-and-error method on two control benchmarks using sensitivity analysis and full factorial parameter selection and the results are validated using one-tailed T-test. The experimental results suggest that the proposed method outperforms opponent methods in terms of controller effort, measures associated with transient response and criteria related to steady-state.  相似文献   

10.
Chia-Feng  I-Fang   《Neurocomputing》2007,70(16-18):3001
This paper proposes a recurrent fuzzy network design using the hybridization of a multigroup genetic algorithm and particle swarm optimization (R-MGAPSO). The recurrent fuzzy network designed here is the Takagi–Sugeno–Kang (TSK)-type recurrent fuzzy network (TRFN), in which each fuzzy rule comprises spatial and temporal sub-rules. Both the number of fuzzy rules and the parameters in a TRFN are designed simultaneously by R-MGAPSO. In R-MGAPSO, the techniques of variable-length individuals and the local version of particle swarm optimization are incorporated into a genetic algorithm, where individuals with the same length constitute the same group, and there are multigroups in a population. Population evolution consists of three major operations: elite enhancement by particle swarm optimization, sub-rule alignment-based crossover, and mutation. To verify the performance of R-MGAPSO, dynamic plant and a continuous-stirred tank reactor controls are simulated. R-MGAPSO performance is also compared with genetic algorithms in these simulations.  相似文献   

11.
12.
Multimedia Tools and Applications - This paper suggests an IoT based smart farming system along with an efficient prediction method called WPART based on machine learning techniques to predict crop...  相似文献   

13.
Distribution over the blood-brain barrier (BBB) is an important parameter to consider for compounds that will be synthesized in a drug discovery project. Drugs that aim at targets in the central nervous system (CNS) must pass the BBB. In contrast, drugs that act peripherally are often optimised to minimize the risk of CNS side effects by restricting their potential to reach the brain. Historically, most prediction methods have focused on the total compound distribution between the blood plasma and the brain. However, recently it has been proposed that the unbound brain-to-plasma concentration ratio (K(p,uu,brain)) is more relevant. In the current study, quantitative K(p,uu,brain) prediction models have been built on a set of 173 in-house compounds by using various machine learning algorithms. The best model was shown to be reasonably predictive for the test set of 73 compounds (R(2)=0.58). When used for qualitative prediction the model shows an accuracy of 0.85 (Kappa=0.68). An additional external test set containing 111 marketed CNS active drugs was also classified with the model and 89% of these drugs were correctly predicted as having high brain exposure.  相似文献   

14.
Designing a story is widely considered a crafty yet critical task that requires deep specific human knowledge in order to reach a minimum quality and originality. This includes designing at a high level different elements of the film; these high-level elements are called tropes when they become patterns. The present paper proposes and evaluates a methodology to automatically synthesize sets of tropes in a way that they maximize the potential rating of a film that conforms to them. We use machine learning to create a surrogate model that maps film ratings from tropes, trained with the data extracted and processed from huge film databases in Internet, and then we use a genetic algorithm that uses that surrogate model as evaluator to optimize the combination of tropes in a film. In order to evaluate the methodology, we analyse the nature of the tropes and their distributions in existing films, the performance of the models and the quality of the sets of tropes synthesized. The results of this proof of concept show that the methodology works and is able to build sets of tropes that maximize the rating and that these sets are genuine. The work has revealed that the methodology and tools developed are directly suitable for assisting in the plots generation as an authoring tool and, ultimately, for supporting the automatic generation of stories, for example, in massively populated videogames.  相似文献   

15.
Individual human travel patterns captured by mobile phone data have been quantitatively characterized by mathematical models, but the underlying activities which initiate the movement are still in a less-explored stage. As a result of the nature of how activity and related travel decisions are made in daily life, human activity-travel behavior exhibits a high degree of spatial and temporal regularities as well as sequential ordering. In this study, we investigate to what extent the behavioral routines could reveal the activities being performed at mobile phone call locations that are captured when users initiate or receive a voice call or message.Our exploration consists of four steps. First, we define a set of comprehensive temporal variables characterizing each call location. Feature selection techniques are then applied to choose the most effective variables in the second step. Next, a set of state-of-the-art machine learning algorithms including Support Vector Machines, Logistic Regression, Decision Trees and Random Forests are employed to build classification models. Alongside, an ensemble of the results of the above models is also tested. Finally, the inference performance is further enhanced by a post-processing algorithm.Using data collected from natural mobile phone communication patterns of 80 users over a period of more than one year, we evaluated our approach via a set of extensive experiments. Based on the ensemble of the models, we achieved prediction accuracy of 69.7%. Furthermore, using the post processing algorithm, the performance obtained a 7.6% improvement. The experiment results demonstrate the potential to annotate mobile phone locations based on the integration of data mining techniques with the characteristics of underlying activity-travel behavior, contributing towards the semantic comprehension and further application of the massive data.  相似文献   

16.
This paper investigates a multiple-vacation M/M/1 warm-standby machine repair problem with an unreliable repairman. We first apply a matrix-analytic method to obtain the steady-state probabilities. Next, we construct the total expected profit per unit time and formulate an optimisation problem to find the maximum profit. The particle swarm optimisation (PSO) algorithm is implemented to determine the optimal number of warm standbys S* and the service rate μ* as well as vacation rate ν* simultaneously at the optimal maximum profit. We compare the searching results of the PSO algorithm with those of exhaustive search method to ensure the searching quality of the PSO algorithm. Sensitivity analysis with numerical illustrations is also provided.  相似文献   

17.
The suitability of an optimisation algorithm selected from within an algorithm portfolio depends upon the features of the particular instance to be solved. Understanding the relative strengths and weaknesses of different algorithms in the portfolio is crucial for effective performance prediction, automated algorithm selection, and to generate knowledge about the ideal conditions for each algorithm to influence better algorithm design. Relying on well-studied benchmark instances, or randomly generated instances, limits our ability to truly challenge each of the algorithms in a portfolio and determine these ideal conditions. Instead we use an evolutionary algorithm to evolve instances that are uniquely easy or hard for each algorithm, thus providing a more direct method for studying the relative strengths and weaknesses of each algorithm. The proposed methodology ensures that the meta-data is sufficient to be able to learn the features of the instances that uniquely characterise the ideal conditions for each algorithm. A case study is presented based on a comprehensive study of the performance of two heuristics on the Travelling Salesman Problem. The results show that prediction of search effort as well as the best performing algorithm for a given instance can be achieved with high accuracy.  相似文献   

18.
19.
ABSTRACT

Machine learning (ML) problems are often posed as highly nonlinear and nonconvex unconstrained optimization problems. Methods for solving ML problems based on stochastic gradient descent are easily scaled for very large problems but may involve fine-tuning many hyper-parameters. Quasi-Newton approaches based on the limited-memory Broyden-Fletcher-Goldfarb-Shanno (BFGS) update typically do not require manually tuning hyper-parameters but suffer from approximating a potentially indefinite Hessian with a positive-definite matrix. Hessian-free methods leverage the ability to perform Hessian-vector multiplication without needing the entire Hessian matrix, but each iteration's complexity is significantly greater than quasi-Newton methods. In this paper we propose an alternative approach for solving ML problems based on a quasi-Newton trust-region framework for solving large-scale optimization problems that allow for indefinite Hessian approximations. Numerical experiments on a standard testing data set show that with a fixed computational time budget, the proposed methods achieve better results than the traditional limited-memory BFGS and the Hessian-free methods.  相似文献   

20.
Bo Yu  Zong-ben Xu   《Knowledge》2008,21(4):355-362
The growth of email users has resulted in the dramatic increasing of the spam emails during the past few years. In this paper, four machine learning algorithms, which are Naïve Bayesian (NB), neural network (NN), support vector machine (SVM) and relevance vector machine (RVM), are proposed for spam classification. An empirical evaluation for them on the benchmark spam filtering corpora is presented. The experiments are performed based on different training set size and extracted feature size. Experimental results show that NN classifier is unsuitable for using alone as a spam rejection tool. Generally, the performances of SVM and RVM classifiers are obviously superior to NB classifier. Compared with SVM, RVM is shown to provide the similar classification result with less relevance vectors and much faster testing time. Despite the slower learning procedure, RVM is more suitable than SVM for spam classification in terms of the applications that require low complexity.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号