首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 531 毫秒
1.
针对电梯群控系统的特点,设计出一种更适合的梯群控制的遗传算法.本算法中采用了整数编码和可进行种群竞争的双种群机制,设计了以候梯时间、乘梯时间、系统能耗为群控目标的多目标适应度函数.并在选择操作中引入个体最优选择策略,在交叉操作中构造了与遗传代的数目、预交叉个体本身特点相结合的交叉方式,在变异操作中应用了两点对换和位点变异相结合的变异方法,并设计了从最优解集合中选择最优解的评价函数.经过模拟仿真,运行实验结果表明了此方案的可行性和优越性.  相似文献   

2.
提出一种基于共轭梯度对数分解的大数据分类数学仿真模型。构建基于K-means算法的数据分类目标数据生成模型,采用共轭梯度对数分解方法对大数据集进行规范化处理,构建数据融合适应度矩阵,基于Lagrange定理,全局搜索性寻找聚类中心的最佳值求得聚类目标函数,确定边界隶属度特征的一个初始值,实现对大数据分类模型优化设计。仿真实验表明,采用该分类模型,数据分类寻优性能较好,各类数据的特征分类准确,收敛性较高。  相似文献   

3.
针对高斯混合模型算法(GMM)对初始参数敏感、易陷入局部最优的问题,提出一种基于改进海洋捕食者算法优化的GMM算法(MMPA-GMM)。首先基于混沌序列和伪对立学习策略初始化种群,引入非线性收敛因子平衡MPA算法的全局与局部搜索,同时提出融入社会等级制度的位置更新策略;然后从搜索能力和收敛速度对改进的MPA进行分析;最后以S_Dbw指标作为算法的适应度函数,利用改进的MPA优化GMM算法的初始参数。实验结果表明,改进的MPA在4种测试函数上表现良好,并且MMPA-GMM算法对4个数据集的聚类效果均有改善,有效避免了GMM算法陷入局部最优的问题。  相似文献   

4.
自动组卷系统是计算机辅助教学的重要组成部分,而遗传算法以其全局寻优和智能搜索的特性,得到了广泛的运用。根据自动组卷系统的特点,将遗传算法合理应用于自动组卷中,在遗传算法中,设计了双种群机制,并以试卷难度、试卷区分度、试卷的估计用时、知识点分布为基础构造适应度函数,通过轮盘赌选择方法、多点交叉和变异,较好地解决了自动组卷的多重目标寻优问题。  相似文献   

5.
对混合遗传算法解决单目标旅行商问题进行研究,提出了一种基于对应连通子图交叉的混合遗传算法。本算法还包括初始种群的生成、适应度函数的计算、选择、变异、LK局部搜索和小生境操作。最后通过具体算例的实验和对比表明算法是有效的,在计算精度和速度上有较大提高。  相似文献   

6.
基于混沌搜索的LS-SVM预测算法   总被引:1,自引:0,他引:1  
为利用最小二乘支持向量机(LS-SVM)来进行预测,首先要确定影响LS-SVM模型的两个主要参数γ和σ,针对该问题提出了采用混沌搜索算法来搜索该模型的最优参数组合。混沌搜索的运动轨迹具有遍历性,随机性,可以进行全局和局部寻优,利用该算法搜索最优参数来确定预测模型,然后将该预测模型用于预测实践。实验结果表明,该模型具有较精确的预测精度和适用性。  相似文献   

7.
对云计算虚拟机拓扑结构的任务调度算法进行研究。首先应该提出新的虚拟机模型和任务模型,此模型的建立必须以虚拟拓扑结构作为条件,然后建立虚拟机-任务适应度评价函数FEF。在资源调度时,应该协调好虚拟机之间拓扑距离与虚拟机处理性能之间的关系。当资源分配至相应的任务时,利用FEF函数对目标虚拟机与任务之间的适应度值进行准确地计算,通过计算出的结果来选取具有最高评价值的虚拟机。实验结果表明,采用此方法可以有效减少任务集合完成的总时间,从而保证调度的性能。  相似文献   

8.
针对传统遗传算法在食品二维码识别和追溯的应用中表现出识别准确性不高的问题,本文提出了一种基于算子和适应度函数优化遗传算法的食品二维码识别追溯模型,首先在遗传算法运行中依据种群的特点来动态调整交叉概率和变异概率的数值,然后采用一种将海明距离测度与适应度距离相结合的方法,将个体的目标适应度降低,最后将食品二维码识别追溯模型转化为图像识别模型,并采用改进的遗传算法对其进行二维码识别和追溯。仿真试验结果表明,本文提出的基于算子和适应度函数优化遗传算法的食品二维码识别追溯模型相比较标准遗传算法,具有更高的识别精度。  相似文献   

9.
王延中 《科技通报》2013,29(2):184-185,188
研究了基于遗传算法和差分进化计算的入侵检测系统中的特征选择技术,差分进化计算在变异过程中并未考虑到适应度大的个体,同时存在过早收敛问题,而遗传算法需要很多的迭代次数才能收敛.针对以上缺点,结合模拟退火算法对差分进化的变异过程进行改进,同时设计合理的适应度函数,使得该算法收敛于最优特征子集.经过Lincoln实验室入侵检测系统评估数据集合MIT' 1998测试,改进算法与差分进化算法和遗传算法相比,具有良好的收敛性能,并且收敛特性稳定.  相似文献   

10.
王玮 《金秋科苑》2011,(6):180-181
提出了基于量子进化算法的人体跟踪方法。量子进化算法借鉴了量子计算的思想,具有较强的寻优能力和较快的运算速度,在基于量子进化算法的人体跟踪中,将跟踪置于函数优化框架内,视跟踪为在模型可行域内求解与图像观测特征具有最优匹配的模型的函数优化问题,并对此目标函数使用量子进化算法寻优。模拟场景实验表明,与基于粒子滤波的人体跟踪算法相比,基于量子进化算法的人体跟踪具有较高的跟踪精度和较快的运算速度。  相似文献   

11.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

12.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

13.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

14.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

15.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

16.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

17.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

18.
Long-standing conflict between domain name registrants and trademark holders prompted the Internet Corporation for Assigned Names and Numbers (ICANN) to create a global, mandatory arbitration procedure known as the Uniform Dispute Resolution Policy (UDRP). The UDRP has been used in 2166 cases involving 3938 domain names as of 1 November 2000. The policy gives the initiator of a complaint, generally a trademark holder, the right to choose which ICANN-accredited dispute resolution service provider (RSP) will handle the case. During the preparation of the UDRP,some feared that complainant selection would lead to "forum shopping" that might bias the results. This article performs a statistical assessment of the forum-shopping thesis and finds support for it. There are statistically significant differences in the various RSPs' propensity to take away names from defendants; there are also major differences in the number of cases brought to each RSP. RSPs who take away names have the larger share of cases. The study examines other variables that might explain differences in market share, such as price, the plaintiff's nationality, or the time taken to decide a case. It finds that nationality and time also are correlated with market share. The study concludes that shopping for a favorable outcome is an important factor in the UDRP.  相似文献   

19.
Prof. Raymond C.K. Chen, a neuropsychologist with the CAS Institute of Psychology, has made novel progress in his studies of schizophrenia. His work has been reported by a recent issue of Behavioural Neurology.  相似文献   

20.
The main premise of this article is that in information societies generally, and in virtual social contexts particularly, a distinctive style of interaction to facilitate the communication of difference, heterotopic communication , has emerged. It rests on two cultural foundations: an ideological belief in the positive, socially integrating power of communication, and a prevailing ethic of instrumental rationality, subjective individualism, and strategically practiced self-interest. The former is demonstrated by the use of simulation and spectacle as sources of information; exhibitionism/voyeurism as a communicative style; and the awareness of surveillance. The latter is seen in the competitive use of knowledge as a commodity; a surface globalism masking deep parochialism; lateral as well as vertical information inequity; and the use of public versus private as strategies for engagement rather than as spaces. Those who engage in heterotopic communication resort to their 'own devices' both in the sense of personal agendas, strategies, interests, and interpretations, and in the form of the telecommunication tools that help realize them. These personal and technological devices allow individuals with the right educational and technical resources to avoid exposure to disagreement, difference, or other information that does not serve their direct purposes or reflect their particular views of the world; yet they also help convey the appearance of openness, availability, and cooperation. This style of interaction is used strategically in combination with information and communication technologies to gain social or economic advantages, but it may encourage social separatism and parochialism, inhibit the negotiation of disputes, and emphasize competing interests.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号