Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "A* algorithm" wg kryterium: Temat


Tytuł:
An Application of Probabilistic Grammars to Efficient Machne Translation
Autorzy:
Skórzewski, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/1037598.pdf
Data publikacji:
2010-09-15
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
a* algorithm
machine translation
natural language parsing
pcfg
probabilistic grammars
Opis:
In this paper we present one of the algorithms used to parse probabilistic context-free grammars: the A* parsing algorithm, which is based on the A* graph search method. We show an example of application of the algorithm in an existing machine translation system. The existing CYK-based parser used in the Translatica system was modified by applying the A* parsing algorithm in order to examine the possibilities of improving its performance. This paper presents the results of applying the A* algorithm with different heuristic functions and their impact on the performance of the parser.
Źródło:
Investigationes Linguisticae; 2010, 21; 90-98
1426-188X
1733-1757
Pojawia się w:
Investigationes Linguisticae
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The idea of using the A* algorithm for route planning an unmanned vehicle “Edredon”
Autorzy:
Naus, K.
Wąż, M.
Powiązania:
https://bibliotekanauki.pl/articles/359690.pdf
Data publikacji:
2013
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
A* algorithm
navigation system
route planning
electronic chart
vehicle „Edredon”
Opis:
This article presents the concept of algorithm A* functioning in a navigation system equipped with electronic navigational chart for autonomous planning the shortest and safest route crossing an offshore unmanned vehicle “Edredon”. The first part describes the general technical architecture and functionality of the vehicle's navigation system. In the second part shows in detail the modules of the system responsible for the planning of the road and how to implement them in the A* algorithm. The third part describes the proper operation of testing whether the A* algorithm in the navigation system, while the task of planning the route of the autonomous vehicle. Final part is a discussion of the results obtained from tests carried out in order to evaluate the applicability of the A* algorithm for route planning in autonomous navigation systems.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2013, 36 (108) z. 2; 143-147
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Artificial intelligence in solving collision problem in restricted area
Autorzy:
Mąka, M.
Dramski, M.
Powiązania:
https://bibliotekanauki.pl/articles/359349.pdf
Data publikacji:
2013
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
shortest path
safe route
restricted area
trapezoidal grid
area discretization
simplified ant algorithm
A* algorithm
Opis:
This paper presents one of the approaches to solve the collision problem in restricted area for two moving objects using artificial intelligence (SACO algorithm). Although AI should be used only when the classic methods fail, a simple comparison between them is very interesting. As we know the main task of navigation is to conduct safely an object from the point of departure to destination. This problem does not seem easy, especially if we consider the movement in restricted areas such narrow passages, ports etc.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2013, 36 (108) z. 2; 118-122
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Dynamic Key Generation During a Communication Instance Over GSM
Autorzy:
Zalaket, J.
Challita, K.
Powiązania:
https://bibliotekanauki.pl/articles/108666.pdf
Data publikacji:
2013
Wydawca:
Społeczna Akademia Nauk w Łodzi
Tematy:
mobile communication
encryption
GSM
A5 algorithm
Opis:
Mobile phone may become the protagonist of the new electronic technology. If we compare it with that of other technologies, the infiltration rate of mobile phones in the world is extremely high, both in cities than rural communities of the most of the countries. According to estimates made by the International Telecommunication Union the access to mobile networks is growing much faster than the access to Internet. This emergence has led many companies to allow new activities which were previously running strictly over the Internet to run over the mobile network such as the electronic payment. These circumstances make the security of mobile communication a priority to preserve the authentication, confidentiality and integrity of data sent between subscribers and mobile network. In this paper, we propose a dynamic key generation for the A5 GSM encryption algorithm to enforce the security and protect the transferred data. Our algorithm can be implemented over any GSM generation GSM/3G/4G.
Źródło:
Journal of Applied Computer Science Methods; 2013, 5 No. 1; 47-57
1689-9636
Pojawia się w:
Journal of Applied Computer Science Methods
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Task allocation algorithms for maximizing reliability of heterogeneous distributed computing systems
Autorzy:
Mahmood, A.
Powiązania:
https://bibliotekanauki.pl/articles/205582.pdf
Data publikacji:
2001
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
heurystyka
niezawodność
obliczenie zdecentralizowane
przetwarzanie rozproszone
A* algorithm
branch-and-bound
distributed computing
heuristics
reliability
task allocation
Opis:
The rapid progress of microprocessor and communication technologies has made the distributed computing system economically attractive for many computer applications. One of the first problems encountered in the operation of a distributed system is the problem of allocating the tasks among the processing nodes. The task allocation problem is known to be computationally intractable for large task sets. In this paper, we consider the task allocation problem with the goal of maximizing reliability of heterogeneous distributed systems. After presenting a quantitative task allocation model, we present a least-cost branch-and-bound algorithm to find optimal task allocations. We also present two heuristic algorithms to obtain suboptimal allocations for realistic size large problems in a reasonable amount of computational time. Simulation was used to study the performance of the proposed algorithms for a large number of problems. Also, performance of the proposed algorithms has been compared with a well-known heuristics available in the literature.
Źródło:
Control and Cybernetics; 2001, 30, 1; 115-130
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analiza i implementacja algorytmów odnajdywania ścieżki do zastosowania w grach przeglądarkowych
Analysis and implementation of pathfinding algorithms for use in browser games
Autorzy:
Laszkiewicz, Beata
Sobczak, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/2146697.pdf
Data publikacji:
2022
Wydawca:
Wrocławska Wyższa Szkoła Informatyki Stosowanej Horyzont
Tematy:
gra przeglądarkowa
graf
algorytm Bellmana-Forda
algorytm Dijkstry
algorytm A-star
browser game
graph
Bellman-Ford algorithm
Dijkstra algorithm
A-star algorithm
Opis:
Celem tego artykułu jest przedstawienie, porównanie oraz implementacja algorytmów odnajdywania ścieżki do zastosowania w grach przeglądarkowych z wykorzystaniem ogólnodostępnych, darmowych technologii internetowych. Pokazano również możliwość wykorzystania najlepszego algorytmu w grze przeglądarkowej
The goal of this article is to present, compare and implement path finding algorithms for use in browser games, using public, free internet technologies. The possibility of using the best algorithm in a browser game is also shown.
Źródło:
Biuletyn Naukowy Wrocławskiej Wyższej Szkoły Informatyki Stosowanej. Informatyka; 2022, 9, 1; 16--24
2082-9892
Pojawia się w:
Biuletyn Naukowy Wrocławskiej Wyższej Szkoły Informatyki Stosowanej. Informatyka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Metoda zarządzania niezawodnością i procesami obsługi linii produkcyjnej wspomagana statystyczną analizą danych
Method for reliability and production line processes management aided by statistical analysis of reliability data
Autorzy:
Piesik, J.
Powiązania:
https://bibliotekanauki.pl/articles/268652.pdf
Data publikacji:
2016
Wydawca:
Politechnika Gdańska. Wydział Elektrotechniki i Automatyki
Tematy:
algorytm a priori
predykcja uszkodzeń
algorithm a priori
defects prediction
Opis:
W referacie zostanie przedstawiona metoda zarządzania niezawodnością i procesem obsługi linii produkcyjnej wraz z implementacją wspomaganych komputerowo narzędzi statystycznych na linii produkcji półfabrykatów do produkcji opon. Referat ma na celu pokazanie skutecznych, relatywnie tanich oraz łatwych w implementacji w różnych środowiskach przemysłowych narzędzi do poprawy niezawodności maszyn, oraz pośrednio poprawy wyników jakościowych produkowanych wyrobów.
The paper presents the management method of reliability and service process of production line with the implementation of computer-aided statistical tool on the production line of semi-finished products for tire production. Author proposed the complex strategy of reliability management composed of three elements: Total Productive Maintenance (TPM), Reliability Centered Maintenance (RCM) and computer-aided statistical tool with prediction of potential defects and failures (CAST-P). Important issue is to obey the order of deployments of those techniques (TPM-RCM-CAST-P). CAST-P tool using Apriori algorithm analyze the historical data gathered by the supervising production system to find the rules. Created set of rules is used for filtering current data from the production line and find potential defects and failures. Rapport with potential defects is send at web page version to maintenance breakdown worker. The final step is the reaction of maintenance personnel for predicted symptoms. The paper aims to show effective, relatively cheap and easy to implement in a variety of industrial environments tools to improve machine reliability and indirectly improve the quality of produced goods.
Źródło:
Zeszyty Naukowe Wydziału Elektrotechniki i Automatyki Politechniki Gdańskiej; 2016, 51; 151-154
1425-5766
2353-1290
Pojawia się w:
Zeszyty Naukowe Wydziału Elektrotechniki i Automatyki Politechniki Gdańskiej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Minimal Decision Rules Based on the Apriori Algorithm
Autorzy:
Fernandez, M. C.
Menasalvas, E.
Marban, O.
Pena, J. M.
Millan, S.
Powiązania:
https://bibliotekanauki.pl/articles/908364.pdf
Data publikacji:
2001
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
baza danych
algorytmy
rough sets
rough dependencies
association rules
a priori algorithm
minimal decision rules
Opis:
Based on rough set theory many algorithms for rules extraction from data have been proposed. Decision rules can be obtained directly from a database. Some condition values may be unnecessary in a decision rule produced directly from the database. Such values can then be eliminated to create a more comprehensible (minimal) rule. Most of the algorithms that have been proposed to calculate minimal rules are based on rough set theory or machine learning. In our approach, in a post-processing stage, we apply the Apriori algorithm to reduce the decision rules obtained through rough sets. The set of dependencies thus obtained will help us discover irrelevant attribute values.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2001, 11, 3; 691-704
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Modyfikacje algorytmów planowania trasy uwzględniające ograniczenia czasowe i odległościowe
Modification of path-finding algorithms introducing time and distance limitations
Autorzy:
Wolanin, Mateusz
Korniszuk, Klaudia
Smołka, Jakub
Powiązania:
https://bibliotekanauki.pl/articles/98100.pdf
Data publikacji:
2019
Wydawca:
Politechnika Lubelska. Instytut Informatyki
Tematy:
wyznaczanie trasy
rower miejski
algorytm A*
algorytm BFS
route planning
bike sharing system
algorithm A*
algorithm BFS
Opis:
Artykuł przedstawia modyfikacje algorytmów wyszukiwania ścieżki w grafie mające na celu wprowadzenie ograniczeń: czasowych lub odległościowych do znalezionej trasy. Zmodyfikowane zostały dwa algorytmy: A* oraz BFS. Zaproponowana została również modyfikacja algorytmu A*, która łączy atuty tych dwóch algorytmów – wygenerowanie najkrótszych tras o jak najmniejszej liczbie wierzchołków. Zmodyfikowane algorytmy umożliwią stworzenie aplikacji pozwalającej na łatwiejsze i bardziej oszczędne poruszanie się z wykorzystaniem usług typu rowerem miejski.
This paper describes modifications of path-finding algorithms. The modifications add time and distance constraints to generated paths. A* and BFS algorithms are modified. Additionally, A* algorithm modification which combines the advantages (generating the shortest routes with the smallest number of vertices) of A* and BFS is presented.. This allows for creating a route planning app that enables users of bike sharing services to travel more easily and economically.
Źródło:
Journal of Computer Sciences Institute; 2019, 10; 18-23
2544-0764
Pojawia się w:
Journal of Computer Sciences Institute
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Method for location of an external dump in surface mining using the A-star algorithm
Metoda lokalizacji zwałowiska zewnętrznego w górnictwie odkrywkowym z wykorzystaniem algorytmu A-star
Autorzy:
Zajączkowski, M.
Kasztelewicz, Z.
Sikora, M.
Powiązania:
https://bibliotekanauki.pl/articles/219312.pdf
Data publikacji:
2014
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
górnictwo odkrywkowe
zwałowisko zewnętrzne
wkop udostępniający
teoria grafów
algorytm A-star
surface mining
dump
excavation site
graph theory
A-star algorithm
Opis:
The construction of a surface mine always involves the necessity of accessing deposits through the removal of the residual overburden above. In the beginning phase of exploitation, the masses of overburden are located outside the perimeters of the excavation site, on the external dump, until the moment of internal dumping. In the case of lignite surface mines, these dumps can cover a ground surface of several dozen to a few thousand hectares. This results from a high concentration of lignite extraction, counted in millions of Mg per year, and the relatively large depth of its residual deposits. Determining the best place for the location of an external dump requires a detailed analysis of existing options, followed by a choice of the most favorable one. This article, using the case study of an open-cast lignite mine, presents the selection method for an external dump location based on graph theory and the A-star algorithm. This algorithm, based on the spatial distribution of individual intersections on the graph, seeks specified graph states, continually expanding them with additional elementary fields until the required surface area for the external dump - defined by the lowest value of the occupied site - is achieved. To do this, it is necessary to accurately identify the factors affecting the choice of dump location. On such a basis, it is then possible to specify the target function, which reflects the individual costs of dump construction on a given site. This is discussed further in chapter 3. The area of potential dump location has been divided into elementary fields, each represented by a corresponding geometrical locus. Ascribed to this locus, in addition to its geodesic coordinates, are the appropriate attributes reflecting the degree of development of its elementary field. These tasks can be carried out automatically thanks to the integration of the method with the system of geospatial data management for the given area. The collection of loci, together with geodesic coordinates, constitutes the points on the graph used during exploration. This is done using the A-star algorithm, which uses a heuristic function, allowing it to identify the optimal solution; therefore, the collection of elementary fields, which occupy the potential construction area of a dump, characterized by the lowest value representing the cost of occupation and dumping of overburden in the area. The precision of the boundary, generated by the algorithm, is dependent on the established size of the elementary field, and should be refined each time by the designer of the surface mine. This article presents the application of the above method of dump location using the example of “Tomisławice,” a lignite surface mine owned by PAK KWB Konin S. A. The method made it possible to identify the most favorable dump location on the northeast side of the initial pit, within 2 kilometers of its surrounding area (discussed further in chapter 3). This method is universal in nature and, after certain modifications, can be implemented for other surface mines as well.
Budowa kopalni odkrywkowej wiąże się zawsze z koniecznością udostępnienia złoża poprzez zdjęcie zalegającego nad nim nadkładu. W początkowej fazie eksploatacji masy nadkładowe lokalizowane są poza granicami wyrobiska odkrywkowego na zwałowisku zewnętrznym, aż do momentu przejścia do zwałowania wewnętrznego. W przypadku kopalń odkrywkowych węgla brunatnego zwałowiska te osiągają powierzchnię od kilkudziesięciu do nawet kilku tysięcy hektarów. Spowodowane jest to dużą koncentracją wydobycia węgla brunatnego liczoną w milionach Mg na rok oraz stosunkowo dużą głębokością zalegania tych złóż. W celu wyboru najkorzystniejszej jego lokalizacji powinno się przeprowadzić szczegółową analizę alternatywnych wariantów, a następnie wybrać wariant najkorzystniejszy. W artykule przedstawiono metodę wyboru lokalizacji zwałowiska zewnętrznego na przykładzie wieloodkrywkowej kopalni węgla brunatnego opartą na teorii grafów i algorytmie A-star. Algorytm ten na podstawie przestrzennego rozmieszczenia poszczególnych węzłów w grafie przeszukuje określone stany grafu, rozbudowując je o kolejne pola elementarne, aż do uzyskania wymaganej wielkości powierzchni przeznaczonej pod budowę zwałowiska zewnętrznego charakteryzującej się przy tym najmniejszą wartością zajętego terenu. Aby to osiągnąć konieczne jest dokładne zidentyfikowanie czynników mających wpływ na wybór lokalizacji zwałowiska zewnętrznego. Na ich podstawie można określić funkcję celu odzwierciedlającą wielkość poszczególnych kosztów budowy zwałowiska zewnętrznego na danym terenie, co zostało szczegółowo opisane w rozdziale 3. Obszar potencjalnej lokalizacji zwałowiska zewnętrznego podzielono na pola elementarne, którego reprezentantem jest centrodia. Centroidzie tej, oprócz jej współrzędnych geodezyjnych, przypisano odpowiednie atrybuty odzwierciedlające stopień zagospodarowania jej pola elementarnego. Czynności te mogła zostać przeprowadzone automatycznie dzięki zintegrowaniu opracowanej metody z systemem zarządzania danymi geoprzestrzennymi o terenie. Zbiór centroid wraz z jej współrzędnymi geodezyjnymi i przydzielonymi atrybutami stanowił wierzchołki grafu do przeszukiwania, którego użyto algorytmu A-star. Algorytm ten wykorzystuje funkcję heurystyczną, dzięki której jest w stanie za każdym razem wskazywać optymalne rozwiązanie, a więc taki zbiór pól elementarnych, których zajęcie pod budowę zwałowiska zewnętrznego będzie charakteryzowało się najmniejszą wartością reprezentującą koszty zajęcia i zwałowania mas nadkładowych na tym obszarze. Dokładność przebiegu granicy wygenerowanej przez algorytm uzależniona jest od przyjętej wielkości pola elementarnego i za każdym razem powinna być ona uszczegółowiona przez projektanta kopalni odkrywkowej. W artykule przedstawiono zastosowanie powyższej metody lokalizacji zwałowiska zewnętrznego na przykładzie kopalni odkrywkowej węgla brunatnego „Tomisławice” należącej do PAK KWB Konin S.A. Dzięki niej możliwe było wskazanie najkorzystniejszej lokalizacji zwałowiska po północno-wschodniej stronie wkopu udostępniającego i oddalonego od niego o ok. 2 km, co zostało opisane w rozdziale 3. Opracowana metoda ma charakter uniwersalny i po pewnych modyfikacjach może być zaimplementowana także dla kopalń odkrywkowych innych kopalin.
Źródło:
Archives of Mining Sciences; 2014, 59, 3; 721-730
0860-7001
Pojawia się w:
Archives of Mining Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Algorithm CFP-SFPwith parallel processing
Autorzy:
Kujawiak, M.
Powiązania:
https://bibliotekanauki.pl/articles/92930.pdf
Data publikacji:
2008
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
association rules
data mining
web logs
a priori
a priori TID
a priori hybrid algorithm
FP-Tree
Opis:
Existing algorithms for finding association rules do not implement parallel processing. This paper proposes CFP-SFP (Creating Frequent Patterns with Set from Frequent Patterns) algorithm with parallel processing. The research involves running CEP-SEP algorithm with one thread and a dozen or so threads that are executed simultaneously. The research was conducted on a computer with one processor and dual-core processor.
Źródło:
Studia Informatica : systems and information technology; 2008, 1(10); 87-93
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Multi-population-based algorithm with an exchange of training plans based on population evaluation
Autorzy:
Łapa, Krystian
Cpałka, Krzysztof
Kisiel-Dorohinicki, Marek
Paszkowski, Józef
Dębski, Maciej
Le, Van-Hung
Powiązania:
https://bibliotekanauki.pl/articles/2147148.pdf
Data publikacji:
2022
Wydawca:
Społeczna Akademia Nauk w Łodzi. Polskie Towarzystwo Sieci Neuronowych
Tematy:
population-based algorithm
multi-population algorithm
hybrid algorithm
island algorithm
subpopulation evaluation
training plan
Opis:
Population Based Algorithms (PBAs) are excellent search tools that allow searching space of parameters defined by problems under consideration. They are especially useful when it is difficult to define a differentiable evaluation criterion. This applies, for example, to problems that are a combination of continuous and discrete (combinatorial) problems. In such problems, it is often necessary to select a certain structure of the solution (e.g. a neural network or other systems with a structure usually selected by the trial and error method) and to determine the parameters of such structure. As PBAs have great application possibilities, the aim is to develop more and more effective search formulas used in them. An interesting approach is to use multiple populations and process them with separate PBAs (in a different way). In this paper, we propose a new multi-population-based algorithm with: (a) subpopulation evaluation and (b) replacement of the associated PBAs subpopulation formulas used for their processing. In the simulations, we used a set of typical CEC2013 benchmark functions. The obtained results confirm the validity of the proposed concept.
Źródło:
Journal of Artificial Intelligence and Soft Computing Research; 2022, 12, 4; 239--253
2083-2567
2449-6499
Pojawia się w:
Journal of Artificial Intelligence and Soft Computing Research
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On Some Aspects of Genetic and Evolutionary Methods for Optimization Purposes
Autorzy:
Woźniak, M.
Połap, D.
Powiązania:
https://bibliotekanauki.pl/articles/227353.pdf
Data publikacji:
2015
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
computational intelligence
genetic algorithm
heuristic algorithm
optimization
Opis:
In this paper, the idea of applying some hybrid genetic algorithms with gradient local search and evolutionary optimization techniques is formulated. For two different test functions the proposed versions of the algorithms have been examined. Research results are presented and discussed to show potential efficiency in optimization purposes.
Źródło:
International Journal of Electronics and Telecommunications; 2015, 61, 1; 7-16
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Parallel PBIL applied to power system controller design
Autorzy:
Folly, K.
Powiązania:
https://bibliotekanauki.pl/articles/91747.pdf
Data publikacji:
2013
Wydawca:
Społeczna Akademia Nauk w Łodzi. Polskie Towarzystwo Sieci Neuronowych
Tematy:
Population-Based Incremental Learning algorithm
PBIL algorithm
Opis:
Population-Based Incremental Learning (PBIL) algorithm is a combination of evolutionary optimization and competitive learning derived from artificial neural networks. PBIL has recently received increasing attention in various engineering fields due to its effectiveness, easy implementation and robustness. Despite these strengths, it was reported in the last few years that PBIL suffers from issues of loss of diversity in the population. To deal with this shortcoming, this paper uses parallel PBIL based on multi-population. In parallel PBIL, two populations are used where both probability vectors (PVs) are initialized to 0.5. It is believed that by introducing two populations, the diversity in the population can be increased and better results can be obtained. The approach is applied to power system controller design. Simulations results show that the parallel PBIL approach performs better than the standard PBIL and is as effective as another diversity increasing PBIL called adaptive PBIL.
Źródło:
Journal of Artificial Intelligence and Soft Computing Research; 2013, 3, 3; 215-223
2083-2567
2449-6499
Pojawia się w:
Journal of Artificial Intelligence and Soft Computing Research
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Selection of the heat transfer coefficient using swarming algorithms
Autorzy:
Gawrońska, Elżbieta
Dyja, Robert
Zych, Maria
Domek, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/2204686.pdf
Data publikacji:
2022
Wydawca:
Politechnika Białostocka. Oficyna Wydawnicza Politechniki Białostockiej
Tematy:
swarm algorithm
ABC algorithm
ACO algorithm
heat transfer coefficient
computer simulation
numerical modelling
Opis:
The article presents the use of swarming algorithms in selecting the heat transfer coefficient, taking into account the boundary condition of the IV types. Numerical calculations were made using the proprietary TalyFEM program and classic form of swarming algorithms. A function was also used for the calculations, which, during the calculation, determined the error of the approximate solution and was minimalised using a pair of individually employed algorithms, namely artificial bee colony (ABC) and ant colony optimisation (ACO). The tests were carried out to select the heat transfer coefficient from one range. Describing the geometry for a mesh of 408 fine elements with 214 nodes, the research carried out presents two squares (one on top of the other) separated by a heat transfer layer with a κ coefficient. A type III boundary condition was established on the right and left of both edges. The upper and lower edges were isolated, and a type IV boundary condition with imperfect contact was established between the squares. Calculations were made for ABC and ACO, respectively, for populations equal to 20, 40 and 60 individuals and 2, 6 and 12 iterations. In addition, in each case, 0%, 1%, 2% and 5% noise of the reference values were also considered. The obtained results are satisfactory and very close to the reference values of the κ parameter. The obtained results demonstrate the possibility of using artificial intelligence (AI) algorithms to reconstruct the IV type boundary condition value during heat conduction modelling.
Źródło:
Acta Mechanica et Automatica; 2022, 16, 4; 325--339
1898-4088
2300-5319
Pojawia się w:
Acta Mechanica et Automatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Minig rules of concept drift using genetic algorithm
Autorzy:
Vivekanandan, P.
Nedunchezhian, R.
Powiązania:
https://bibliotekanauki.pl/articles/91705.pdf
Data publikacji:
2011
Wydawca:
Społeczna Akademia Nauk w Łodzi. Polskie Towarzystwo Sieci Neuronowych
Tematy:
genetic algorithm
CDR-tree algorithm
rules
data mining
Opis:
In a database the data concepts changes over time and this phenomenon is called as concept drift. Rules of concept drift describe how the concept changes and sometimes they are interesting and mining those rules becomes more important. CDR tree algorithm is currently used to identify the rules of concept drift. Building a CDR tree becomes a complex process when the domain values of the attributes get increased. Genetic Algorithms are traditionally used for data mining tasks. In this paper, a Genetic Algorithm based approach is proposed for mining the rules of concept drift, which makes the mining task simpler and accurate when compared with the CDR-tree algorithm.
Źródło:
Journal of Artificial Intelligence and Soft Computing Research; 2011, 1, 2; 135-145
2083-2567
2449-6499
Pojawia się w:
Journal of Artificial Intelligence and Soft Computing Research
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Learning from heterogeneously distributed data sets using artificial neural networks and genetic algorithms
Autorzy:
Peteiro-Barral, D.
Guijarro-Berdiñas, B.
Pérez-Sánchez, B.
Powiązania:
https://bibliotekanauki.pl/articles/91888.pdf
Data publikacji:
2012
Wydawca:
Społeczna Akademia Nauk w Łodzi. Polskie Towarzystwo Sieci Neuronowych
Tematy:
artificial neural networks
genetic algorithm
Devonet algorithm
Opis:
It is a fact that traditional algorithms cannot look at a very large data set and plausibly find a good solution with reasonable requirements of computation (memory, time and communications). In this situation, distributed learning seems to be a promising line of research. It represents a natural manner for scaling up algorithms inasmuch as an increase of the amount of data can be compensated by an increase of the number of distributed locations in which the data is processed. Our contribution in this field is the algorithm Devonet, based on neural networks and genetic algorithms. It achieves fairly good performance but several limitations were reported in connection with its degradation in accuracy when working with heterogeneous data, i.e. the distribution of data is different among the locations. In this paper, we take into account this heterogeneity in order to propose several improvements of the algorithm, based on distributing the computation of the genetic algorithm. Results show a significative improvement of the performance of Devonet in terms of accuracy.
Źródło:
Journal of Artificial Intelligence and Soft Computing Research; 2012, 2, 1; 5-20
2083-2567
2449-6499
Pojawia się w:
Journal of Artificial Intelligence and Soft Computing Research
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Profesor Tadeusz Łobos i jego algorytm A4
Professor Tadeusz Llobos and his A4 algorithm
Autorzy:
Chrzan, K. L.
Powiązania:
https://bibliotekanauki.pl/articles/1203359.pdf
Data publikacji:
2018
Wydawca:
Sieć Badawcza Łukasiewicz - Instytut Napędów i Maszyn Elektrycznych Komel
Tematy:
cyfrowa ochrona linii
algorytmy identyfikacji zwarć
algorytm Łobosa
algorytm A4
digital line protection
algorithms for distance protection
Lobos’s algorithm A4
Opis:
This document shows cirriculum vitae, scientific work and achievement of Prof. Tadeusz Łobos. The most known his achievement is algorithm A3 and especially algorithm A4. This second one was many times referred and explained in reading books. What is visible in his carrier it is a very intensive co-operation with German scientists. During 48 years scientific activity he spent over 10 years in Germany in the frame of 13 different scholarships and on the 4 years long contract in Darmstadt, Erlangen, Saarbruecken and Dresden. As alone from polish electrical engineers he became the prestigious Humboldt Research Award. Tadeusz Łobos published over 300 articles and conference papers, got 7 patents and was the supervisor of 13 doctor theses.
W pracy opisano życiorys, pracę naukową i osiągnięcia prof. Tadeusza Łobosa. Najbardziej znanym jego osiągnięciem są algorytmy Łobosa A3, a szczególnie algorytm A4 wielokrotnie cytowany i opisany w książkach. Zwraca uwagę niezwykle intensywna współpraca z partnerami niemieckimi. W ciągu swej 48 letniej pracy naukowej, przebywał w sumie ponad 10 lat na co najmniej 13 stypendiach oraz 4-letnim kontrakcie w Darmstadzie, Erlangen, Saarbruecken i Dreźnie. Jako jedyny polski elektrotechnik otrzymał prestiżową Humboldt Research Award, opublikował ponad 300 artykułów i referatów konferencyjnych, otrzymał 7 patentów i był promotorem 13 prac doktorskich.
Źródło:
Maszyny Elektryczne: zeszyty problemowe; 2018, 4, 120; 143-147
0239-3646
2084-5618
Pojawia się w:
Maszyny Elektryczne: zeszyty problemowe
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Application of the Rasch model in categorical pedigree analysis using MCEM: I binary data
Autorzy:
Qian, G.
Huggins, R.
Loesch, D.
Powiązania:
https://bibliotekanauki.pl/articles/729756.pdf
Data publikacji:
2004
Wydawca:
Uniwersytet Zielonogórski. Wydział Matematyki, Informatyki i Ekonometrii
Tematy:
pedigree analysis
binary data
MCEM algorithm
Metropolis-Hastings algorithm
Opis:
An extension of the Rasch model with correlated latent variables is proposed to model correlated binary data within families. The latent variables have the classical correlation structure of Fisher (1918) and the model parameters thus have genetic interpretations. The proposed model is fitted to data using a hybrid of the Metropolis-Hastings algorithm and the MCEM modification of the EM-algorithm and is illustrated using genotype-phenotype data on a psychological subtest in families where some members are affected by the genetic disorder fragile X. In addition, hypothesis testing and model selection methods based on the Wald statistic are discussed.
Źródło:
Discussiones Mathematicae Probability and Statistics; 2004, 24, 2; 255-280
1509-9423
Pojawia się w:
Discussiones Mathematicae Probability and Statistics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Combinatorial Properties and Defragmentation Algorithms in WSW1 Switching Fabrics
Autorzy:
Rajewski, Remigiusz
Kabaciński, Wojciech
Al-Tameemi, Atyaf
Powiązania:
https://bibliotekanauki.pl/articles/227184.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
elastic optical network
switching networks
rearrenging algorithm
defragmentation algorithm
Opis:
A spectrum defragmentation problem in elastic optical networks was considered under the assumption that all connections can be realized in switching nodes. But this assumption is true only when the switching fabric has appropriate combinatorial properties. In this paper, we consider a defragmentation problem in one architecture of wavelength-space-wavelength switching fabrics. First, we discuss the requirements for this switching fabric, below which defragmentation does not always end with success. Then, we propose defragmentation algorithms and evaluate them by simulation. The results show that proposed algorithms can increase the number of connections realized in the switching fabric and reduce the loss probability.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 1; 99-105
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Parallel MCNN (PMCNN) with application to prototype selection on large and streaming data
Autorzy:
Devi, V. S.
Meena, L.
Powiązania:
https://bibliotekanauki.pl/articles/91686.pdf
Data publikacji:
2017
Wydawca:
Społeczna Akademia Nauk w Łodzi. Polskie Towarzystwo Sieci Neuronowych
Tematy:
prototype selection
one-pass algorithm
streaming data
distributed algorithm
Opis:
The Modified Condensed Nearest Neighbour (MCNN) algorithm for prototype selection is order-independent, unlike the Condensed Nearest Neighbour (CNN) algorithm. Though MCNN gives better performance, the time requirement is much higher than for CNN. To mitigate this, we propose a distributed approach called Parallel MCNN (pMCNN) which cuts down the time drastically while maintaining good performance. We have proposed two incremental algorithms using MCNN to carry out prototype selection on large and streaming data. The results of these algorithms using MCNN and pMCNN have been compared with an existing algorithm for streaming data.
Źródło:
Journal of Artificial Intelligence and Soft Computing Research; 2017, 7, 3; 155-169
2083-2567
2449-6499
Pojawia się w:
Journal of Artificial Intelligence and Soft Computing Research
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Teoria i metody algorytmu ewolucyjnego w uczeniu jednowarstwowej sieci neuronowej
Implementation of the Evolutionary Algorithm Theory and Methods in the Learning Process of One-Layer ANN
Autorzy:
Płaczek, Stanisław
Powiązania:
https://bibliotekanauki.pl/articles/509173.pdf
Data publikacji:
2016
Wydawca:
Akademia Finansów i Biznesu Vistula
Tematy:
algorytmy genetyczne
algorytmy ewolucyjne
sztuczne sieci neuronowe
algorytmy uczenia sieci
algorytmy selekcji
algorytmy krzyżowania
algorytmy mutacji
genetic algorithm
evolutionary algorithm
artificial neural network
learning algorithm
selection algorithm
crossover algorithm
mutation algorithm
Opis:
Rozwój teorii sztucznych sieci neuronowych, a także pojawienie się nowych, efektywnych narzędzi programistycznych (systemy wieloprocesorowe, programowanie wielowątkowe) umożliwia zastosowanie algorytmów genetycznych oraz ewolucyjnych do uczenia sztucznych sieci neuronowych (SSN). W literaturze dotyczącej zasad działania SSN podkreśla się ich atrakcyjne własności, takie jak: aproksymacja dowolnych nieliniowych odwzorowań, równolegle i rozproszone przetwarzanie, adaptacja i uczenie. Szczególnie równoległe i rozproszone przetwarzanie koresponduje ze strukturą algorytmu genetycznego i ewolucyjnego. Klasyczne algorytmy genetyczne operują na ciągach binarnych o stałej długości. Natomiast algorytmy ewolucyjne można interpretować jako uogólnienie algorytmów genetycznych. W algorytmach tych stosuje się zasady ewolucji i dziedziczenia oraz wykorzystuje się właściwą strukturę danych do reprezentacji chromosomów (liczby rzeczywiste, macierze, grafy). Definiuje się również inne operatory krzyżowania i mutacji. Tak więc struktura algorytmu ewolucyjnego jest prawie taka sama jak genetycznego. Różnice ukryte są na niższych poziomach przetwarzania – w strukturach danych. W artykule przedstawiono próbę implementacji algorytmu ewolucyjnego do uczenia jednowarstwowej sieci neuronowej. Sieć opisuje się w postaci macierzy połączeń między wektorami – wejściowym X oraz wyjściowym Y. Funkcja uczenia SSN zdefiniowana jest jako nieliniowa funkcja wag sieci oraz nieliniowej funkcji aktywacji minimalizującej błąd średniokwadratowy między wektorem wyjściowym Y a wektorem uczącym Z, dla całej paczki uczącej. Pojawienie się nieliniowości utrudnia zastosowanie algorytmu uczenia opartego na wstecznej propagacji błędu. Funkcja celu, oprócz minimum globalnego, może zawierać wiele minimów lokalnych, w których algorytm oparty na badaniu gradientu funkcji celu może się zatrzymać. Oczywiście stosuje się różne techniki i metody umożliwiające wyjście algorytmu z tego typu pułapek. Tym niemniej dla sprawdzenia poprawności otrzymanych wyników uruchamia się proces uczenia SSN dla różnych danych początkowych. W zaproponowanym algorytmie ewolucyjnym tworzy się zbiór osobników. Każdy z osobników przedstawia możliwe rozwiązanie zadania minimalizacji funkcji celu i jest reprezentowany przez macierzową strukturę danych. Każde rozwiązanie cząstkowe ocenia się na podstawie dopasowania funkcji celu, a następnie tworzy się nową populację (potomków) przez selekcję osobników o najlepszych dopasowaniach oraz dwa algorytmy krzyżowania i mutacji. W artykule omówiono zaproponowaną strukturę osobników, przyjęte algorytmy selekcji z ich wadami i zaletami oraz różne algorytmu krzyżowania i mutacji. Na wstępie zdefiniowano takie podstawowe pojęcia, jak gen, chromosom oraz najogólniejszą strukturę algorytmu ewolucyjnego. Artykuł ma charakter koncepcyjny.
The article proposes implementation of a modified version of genetic algorithms in neural networks, what in literature is known as “evolutionary algorithm” or “evolutionary programming”. An evolutionary algorithm is a probabilistic algorithm that works in a set of weight variability of neurons and seeks the optimal value solution within a population of individuals, avoiding the local maximum. For chromosomes, the real value variables and matrix structure are proposed. In the article, this decision is widely elaborated and discussed. In the original versions of genetic algorithms, all variables’ values are transformed into binary versions. The chromosomes bit sequences could include thousands of positions. It does not simplify the crossover and mutation operations. Processes could be very time-consuming and the algorithm convergence could also be slow. For a single-layer neural network matrix data structure is used. A particular emphasis is put on mutation and crossover algorithms. What is also important in both genetic and evolutionary algorithms is the selection process. The primary population, known as the parent population, is employed to build a new set of individuals using the selection process. These individuals are known as the children population. The selection algorithm should converge on the two very important issues: population diversity and selective pressure. Selective pressure can manifest in the overrepresentation of the best individuals in the new population. The area, in which the optimal solution is sought, is reduced too fast. Premature convergence is not desirable due to the high probability of achieving the local maximum. Reducing the selective pressure may result in increasing the time it takes to search for the solution.
Źródło:
Zeszyty Naukowe Uczelni Vistula; 2016, 49(4) Informatyka; 23-39
2353-2688
Pojawia się w:
Zeszyty Naukowe Uczelni Vistula
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Community Clustering on Fraud Transactions Applied the Louvain-Coloring Algorithm
Autorzy:
Mardiansyah, Heru
Suwilo, Saib
Nababan, Erna Budiarti
Efendi, Syahril
Powiązania:
https://bibliotekanauki.pl/articles/27311927.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
fraud Money Transfer
Louvain Coloring algorithm
Louvain Algorithm
Opis:
The contribution main from this research is modularity and better processing time in detecting community by using K-1 coloring. Testing performed on transaction datasets remittance on P2P platforms where the Louvain Coloring algorithm is better in comparison to Louvain Algorithm Data used is data transfer transactions made by customers on the P2P Online platform. The data is the User data that has information transfer transactions, Card data that has information card, IP data that has IP information, and Device data that has information device. Every user owns unique 128-bit identification, and other nodes representing card, device, and IP are assigned a random UUID. The Device node has the guide, and device properties. IP nodes only have property guide and node User has property fraud Money Transfer, guide, money Transfer Error Cancel Amount, first Charge back Date. Each node has a unique 128-bit guide, with the amount whole of as many as 789,856 nodes. Application technique K-1 staining on Louvain algorithm shows enhancement value modularity and better processing time for detecting community on the network large scale. Through a series of exercises and tests carried out in various scenarios, it shows that the experiments carried out in this paper, namely the Louvain Coloring algorithm, are more effective and efficient than the Louvain algorithm in scenario 1,3, and 5 meanwhile For Scenarios 2 and 4 Louvain Algorithm is better.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 3; 593-598
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Znaczenie algorytmu dydaktycznego w projektowaniu multimedialnych programów dydaktycznych
The importance of the algorithm in the design of multimedia teaching programs
Autorzy:
LIB, Waldemar
Powiązania:
https://bibliotekanauki.pl/articles/456222.pdf
Data publikacji:
2010
Wydawca:
Uniwersytet Rzeszowski
Tematy:
algorytm
algorytm dydaktyczny
multimedialny program
algorithm
didactic algorithm
multimedia program
Opis:
Komputerowe programy prezentacyjne oraz łatwe w obsłudze edytory języków programowania stworzyły nauczycielom nieograniczone moŜliwości projektowania i wykonywania własnych opracowań metodycznych opartych na technologiach informatycznych i informacyjnych. Jak wielkie znaczenie cywilizacyjne wywarło upowszechnienie się hiperteksu wyjaśnia szerzej W. Furmanek w opracowaniu Cywilizacyjne i osobowe znaczenie hipertekstu [2008]. W artykule poruszana jest problematyka związana z projektowaniem multimedialnych programów dydaktycznych. To na etapie projektowania podejmowane są decyzje dotyczące struktury programu dydaktycznego, sposobu prezentowania treści kształcenia, ich układu metodycznego, doboru mediów słuŜących do przekazywania i sprawdzania nowo nabytych wiadomości. Często konsekwencją ustalenia struktury multimedialnego programu dydaktycznego i zastosowania określonych mediów jest wybór technologii informatycznych słuŜących do jego realizacji.
Presentation computer programs and easy to use word processors for programming language have offered teachers inexhaustible possibilities of designing and performing their own methodological studies based on information technology. W. Furmanek broadly explains the civilisation significance of popularising a hypertext in the study Civilisation and personal significance of hypertext (2008). The article presents the issues connected with designing multimedia didactic programmes. During the designing stage, there are decisions taken on the structure of a didactic programme, the way of presenting its educational contents, their methodological layout as well as the adjustment of media needed to pass and check newly acquired knowledge. In most cases, the creation of the structure of a multimedia didactic programme and application of specific media relies on the selection of information technologies that allow for its implementation.
Źródło:
Edukacja-Technika-Informatyka; 2012, 3, 2; 173-181
2080-9069
Pojawia się w:
Edukacja-Technika-Informatyka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Methods for imputation of missing values and their influence on the results of segmentation research
Metody uzupełniania braków danych i ich wpływ na wyniki badań segmentacyjnych.
Autorzy:
Gąsior, Marcin
Skowron, Łukasz
Powiązania:
https://bibliotekanauki.pl/articles/425241.pdf
Data publikacji:
2016
Wydawca:
Wydawnictwo Uniwersytetu Ekonomicznego we Wrocławiu
Tematy:
missing values
cluster analysis
k-means algorithm
k-medoids algorithm
Opis:
The lack of answers is a common problem in all types of research, especially in the field of social sciences. Hence a number of solutions were developed, including the analysis of complete cases or imputations that supplement the missing value with a value calculated according to different algorithms. This paper evaluates the influence of the adopted method for the supplementation of missing answers regarding the result of segmentation conducted with the use of cluster analysis. In order to achieve this we used a set of data from an actual consumer research in which the cases with missing values were deleted or supplemented with the use of various methods. Cluster analyses were then performed on those sets of data, both with the assumption of ordinal and ratio level of measurement, and then the grouping quality, as expressed by different indicators, was evaluated. This research proved the advantage of imputation over the analysis of complete cases, it also proved the validity of using more complex approaches than the simple supplementation with an average or median value.
Źródło:
Econometrics. Ekonometria. Advances in Applied Data Analytics; 2016, 4 (54); 61-71
1507-3866
Pojawia się w:
Econometrics. Ekonometria. Advances in Applied Data Analytics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Nash-lambda algorithm with applications in safety and reliability
Autorzy:
Cui, Y.
Guo, R.
Powiązania:
https://bibliotekanauki.pl/articles/2069567.pdf
Data publikacji:
2011
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
lambda algorithm
Nash equilibrium
genetic algorithm
safety
reliability
terrorist threa
Opis:
In this paper, a new algorithm, named as Nash-lambda algorithm by merging Nash equilibrium solution and the lambda algorithm, is proposed. The lambda algorithm, a new global optimization algorithm, is created by imitating ancient Chinese human body system model, which has already demonstrated its simplicity in searching scheme, codes and efficiency in computation comparing to the genetic algorithm. The noncorporative game environments determine the optimization problems which are different from those of the traditional safety and reliability optimizations because of the engagement of the Nash equilibrium for seeking the best strategy. The lambda algorithm serves the searching the Nash equilibrium solution efficiently. In other worlds, the Nash-lambda algorithm is just developed to address the optimization problems of the multiple objective functions representing non-corporative players’ interests.
Źródło:
Journal of Polish Safety and Reliability Association; 2011, 2, 1; 51--58
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Lambda algorithm and maximum likelihood estimation
Autorzy:
Cui, Y.
Guo, R.
Guo, D.
Powiązania:
https://bibliotekanauki.pl/articles/2069616.pdf
Data publikacji:
2011
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
lambda algorithm
genetic algorithm
reliability
repairable system
likelihood-lambda procedure
Opis:
In this paper, a new global optimization algorithm by imitating ancient Chinese human body system model, named as lambda algorithm, is introduced. The lambda algorithm utilizes five-element multi-segment string to represent the n-dimensional Euclidean point and hence the string based operation rules for expansion, comparison and sorting candidate strings. The algorithm enjoys the simplest mathematical operations but generates highest searching speed and accuracy. We furthermore explore to merge the lambda algorithm with maximum likelihood procedure for creating a non-derivative scheme – likelihood- lambda procedure. A illustrative example is given.
Źródło:
Journal of Polish Safety and Reliability Association; 2011, 2, 1; 59--72
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Parallel constructing of the shortest coverings of large Boolean matrices
Autorzy:
Novikov, S.
Powiązania:
https://bibliotekanauki.pl/articles/92853.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
Boolean matrix
shortest covering
decomposition
sequential algorithm
parallel algorithm
cluster
Opis:
The paper presents two options of the parallel algorithm for finding the shortest covering of a large Boolean matrix, where the decomposition of the initial matrix into matrices of smaller sizes is based on the partitioning of rows. The parallel algorithm COVMB contains sequential algorithms for partitioning of initial m × n Boolean matrix on submatrices, building special matrices, summering of the shortest coverings of special Boolean matrices with smaller sizes as well as the sequential algorithm SECNOP for finding the shortest coverings of smaller Boolean matrices.
Źródło:
Studia Informatica : systems and information technology; 2016, 1-2(20); 27-37
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Evolutionary computing in operational research for two-layer neural networks
Autorzy:
Płaczek, S.
Powiązania:
https://bibliotekanauki.pl/articles/94935.pdf
Data publikacji:
2017
Wydawca:
Szkoła Główna Gospodarstwa Wiejskiego w Warszawie. Wydawnictwo Szkoły Głównej Gospodarstwa Wiejskiego w Warszawie
Tematy:
evolutionary algorithm
neural network
optimization algorithm
mutation operator
crossover operator
Opis:
Considering the non-linear characteristics of the activation functions, the entire task is multidimensional and non-linear with a multimodal target function. Implementing evolutionary computing in the multimodal optimization tasks gives developers new and effective tools for seeking the global minimum. A developer has to find the optimal and simple transformation between the realization of a phenotype and a genotype. In the article, a two-layer neural network is analysed. In the first step, the population is created. In the main algorithm loop, a parent selection mechanism is used together with the fitness function. To evaluate the quality of evolutionary computing process different measured characteristics are used. The final results are depicted using charts and tables.
Źródło:
Information Systems in Management; 2017, 6, 2; 119-130
2084-5537
2544-1728
Pojawia się w:
Information Systems in Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Implementing evolutionary algorithm into training single-layer artificial neural network in classification task
Autorzy:
Płaczek, S.
Powiązania:
https://bibliotekanauki.pl/articles/95001.pdf
Data publikacji:
2016
Wydawca:
Szkoła Główna Gospodarstwa Wiejskiego w Warszawie. Wydawnictwo Szkoły Głównej Gospodarstwa Wiejskiego w Warszawie
Tematy:
genetic algorithm
evolutionary algorithm
selection process
mutation
recombination
replacement
Opis:
The article proposes implementing a modified version of genetic algorithm in a neural network, what in literature is known as “evolutionary algorithm” or “evolutionary programming”. An Evolutionary Algorithm is a probabilistic algorithm that works in a set of weight variability of neurons and seeks the optimal value solution within a population of individuals, avoiding the local maximum. For chromosomes the real value variables and matrix structure are proposed to a single-layer neural network. Particular emphasis is put on mutation and crossover algorithms. What is also important in both genetic and evolutionary algorithms is the selection process. In the calculation example, the implementation of theoretical considerations to a classification task is demonstrated.
Źródło:
Information Systems in Management; 2016, 5, 3; 377-388
2084-5537
2544-1728
Pojawia się w:
Information Systems in Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Real-time interpolation of streaming data
Autorzy:
Dębski, Roman
Powiązania:
https://bibliotekanauki.pl/articles/1839246.pdf
Data publikacji:
2020
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
streaming algorithm
online algorithm
spline interpolation
cubic Hermite spline
Opis:
One of the key elements of the real-time C 1 -continuous cubic spline interpolation of streaming data is an estimator of the first derivative of the interpolated function that is more accurate than those based on finite difference schemas. Two such greedy look-ahead heuristic estimators, based on the calculus of variations (denoted as MinBE and MinAJ2), are formally defined (in closed form), along with the corresponding cubic splines that they generate. They are then comparatively evaluated in a series of numerical experiments involving different types of performance measures. The presented results show that the cubic Hermite splines generated by heuristic MinAJ2 significantly outperformed those that were based on finite difference schemas in terms of all of the tested performance measures (including convergence). The proposed approach is quite general. It can be directly applied to streams of univariate functional data like time-series. Multi-dimensional curves that are defined parametrically (after splitting) can be handled as well. The streaming character of the algorithm means that it can also be useful in processing data sets that are too large to fit in the memory (e.g., edge computing devices, embedded time-series databases).
Źródło:
Computer Science; 2020, 21 (4); 513-532
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Empirical Evaluation of Oclus and Genrandomclust Algorithms of Generating Cluster Structures
Autorzy:
Korzeniewski, Jerzy
Powiązania:
https://bibliotekanauki.pl/articles/973546.pdf
Data publikacji:
2014
Wydawca:
Główny Urząd Statystyczny
Tematy:
cluster analysis
cluster structure generation
OCLUS algorithm
genRandomClust algorithm
Opis:
The OCLUS algorithm and genRandomClust algorithm are newest proposals of generating multivariate cluster structures. Both methods have the capacity of controlling cluster overlap, but both do it quite differently. It seems that OCLUS method has much easier, intuitive interpretation. In order to verify this opinion a comparative assessment of both algorithms was carried out. For both methods multiple cluster structures were generated and each of them was grouped into the proper number of clusters using k-means. The groupings were assessed by means of divisions similarity index (modified Rand index) referring to the classification resulting from the generation. The comparison criterion is the behaviour of the overlap parameters of structures. The monotonicity of the overlap parameters with respect to the similarity index is assessed as well as the variability of the similarity index for the fixed value of overlap parameters. Moreover, particular attention is given to checking the existence of an overlap parameter limit for the classical grouping procedures as well as uniform nature of overlap control with respect to all clusters.
Źródło:
Statistics in Transition new series; 2014, 15, 3; 487-494
1234-7655
Pojawia się w:
Statistics in Transition new series
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wykorzystanie algorytmów genetycznych i mrówkowych w problemach transportowych
Using genetic and ant algorithms to solve transport problems
Autorzy:
Zduńczuk, J.
Przystupa, W.
Powiązania:
https://bibliotekanauki.pl/articles/287396.pdf
Data publikacji:
2008
Wydawca:
Polskie Towarzystwo Inżynierii Rolniczej
Tematy:
transport
algorytm genetyczny
algorytm mrówkowy
metaheurystyka
genetic algorithm
ant algorithm
metaheuristics
Opis:
W pracy przedstawiono możliwości zastosowania metaheurystyk w transporcie. Przy użyciu algorytmu genetycznego i mrówkowego dokonano optymalizacji długości trasy przejazdu, a rezultaty porównano ze znanymi wynikami. Przedstawiono również próbę optymalizacji tras ze względu na czas trwania przejazdu.
The paper presents possibilities to employ metaheuristics in transport. The research involved using genetic and ant algorithm to optimise drive/ride route length, and obtained results were compared to known results. Moreover, the paper presents an effort to optimise routes with regard to drive duration.
Źródło:
Inżynieria Rolnicza; 2008, R. 12, nr 7(105), 7(105); 237-243
1429-7264
Pojawia się w:
Inżynieria Rolnicza
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Timber wolf optimization algorithm for real power loss diminution
Autorzy:
Lenin, Kanagasabai
Powiązania:
https://bibliotekanauki.pl/articles/950973.pdf
Data publikacji:
2020
Wydawca:
Sieć Badawcza Łukasiewicz - Przemysłowy Instytut Automatyki i Pomiarów
Tematy:
TWO algorithm
optimal reactive power
transmission loss
Timber Wolf optimization algorithm
Opis:
In this paper Timber Wolf optimization (TWO) algorithm is proposed to solve optimal reactive power problem. Timber Wolf optimization (TWO) algorithm is modeled based on the social hierarchy and hunting habits of Timber wolf towards finding prey. Based on their fitness values social hierarchy has been replicated by classifying the population of exploration agents. Exploration procedure has been modeled by imitating the hunting actions of timber wolf by using searching, encircling, and attacking the prey. There are three fittest candidate solutions embedded as α, β and γ to lead the population toward capable regions of the exploration space in each iteration of Timber Wolf optimization. Proposed Timber Wolf optimization (TWO) algorithm has been tested in standard IEEE 14, 30 bus test systems and simulation results show the projected algorithm reduced the real power loss efficiently.
Źródło:
Journal of Automation Mobile Robotics and Intelligent Systems; 2020, 14, 1; 24-28
1897-8649
2080-2145
Pojawia się w:
Journal of Automation Mobile Robotics and Intelligent Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Improved Method of Searching the Associative Rules while Developing the Software
Autorzy:
Savchuk, Tamara O.
Pryimak, Natalia V.
Slyusarenko, Nina V.
Smolarz, Andrzej
Smailova, Saule
Amirgaliyev, Yedilkhan
Powiązania:
https://bibliotekanauki.pl/articles/226118.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
software development
classification
C4.5 algorithm
associated rules
FPG-algorithm
Opis:
As the delivery of good quality software in time is a very important part of the software development process, it's a very important task to organize this process very accurately. For this, a new method of the searching associative rules were proposed. It is based on the classification of all tasks on three different groups, depending on their difficulty, and after this, searching associative rules among them, which will help to define the time necessary to perform a specific task by the specific developer.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 3; 425-430
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
New Methods for Designing and Reduction of Neuro-Fuzzy Systems
Autorzy:
Cpałka, K.
Powiązania:
https://bibliotekanauki.pl/articles/108790.pdf
Data publikacji:
2010
Wydawca:
Społeczna Akademia Nauk w Łodzi
Tematy:
algorithm of best global eliminations
algorithm of best local eliminations
consecutive eliminations algorithm
consecutive mergings algorithm
interpretability
logical approach
neuro-fuzzy system
Opis:
In the paper, we propose novel methods for designing and reduction of neuro-fuzzy systems without the deterioration of their accuracy. The reduction and merging algorithms gradually eliminate inputs, rules, antecedents, and the number of discretization points of integrals in the center of area defuzzification method. Our algorithms have been tested using well known classification benchmark.
Źródło:
Journal of Applied Computer Science Methods; 2010, 2 No. 2; 113-126
1689-9636
Pojawia się w:
Journal of Applied Computer Science Methods
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A lower bound on the independence number of a graph in terms of degrees
Autorzy:
Harant, Jochen
Schiermeyer, Ingo
Powiązania:
https://bibliotekanauki.pl/articles/743603.pdf
Data publikacji:
2006
Wydawca:
Uniwersytet Zielonogórski. Wydział Matematyki, Informatyki i Ekonometrii
Tematy:
independence
stability
algorithm
Opis:
For a connected and non-complete graph, a new lower bound on its independence number is proved. It is shown that this bound is realizable by the well known efficient algorithm MIN.
Źródło:
Discussiones Mathematicae Graph Theory; 2006, 26, 3; 431-437
2083-5892
Pojawia się w:
Discussiones Mathematicae Graph Theory
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Clustering large-scale data based on modified affinity propagation algorithm
Autorzy:
Serdah, A. M.
Ashour, W. M.
Powiązania:
https://bibliotekanauki.pl/articles/91694.pdf
Data publikacji:
2016
Wydawca:
Społeczna Akademia Nauk w Łodzi. Polskie Towarzystwo Sieci Neuronowych
Tematy:
clustering
clustering algorithm
data clustering algorithm
propagation algorithm
Affinity Propagation
AP
klasteryzacja
algorytm klastrowania
algorytm propagacji
Opis:
Traditional clustering algorithms are no longer suitable for use in data mining applications that make use of large-scale data. There have been many large-scale data clustering algorithms proposed in recent years, but most of them do not achieve clustering with high quality. Despite that Affinity Propagation (AP) is effective and accurate in normal data clustering, but it is not effective for large-scale data. This paper proposes two methods for large-scale data clustering that depend on a modified version of AP algorithm. The proposed methods are set to ensure both low time complexity and good accuracy of the clustering method. Firstly, a data set is divided into several subsets using one of two methods random fragmentation or K-means. Secondly, subsets are clustered into K clusters using K-Affinity Propagation (KAP) algorithm to select local cluster exemplars in each subset. Thirdly, the inverse weighted clustering algorithm is performed on all local cluster exemplars to select well-suited global exemplars of the whole data set. Finally, all the data points are clustered by the similarity between all global exemplars and each data point. Results show that the proposed clustering method can significantly reduce the clustering time and produce better clustering result in a way that is more effective and accurate than AP, KAP, and HAP algorithms.
Źródło:
Journal of Artificial Intelligence and Soft Computing Research; 2016, 6, 1; 23-33
2083-2567
2449-6499
Pojawia się w:
Journal of Artificial Intelligence and Soft Computing Research
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On the application of elastic band method to repeatable inverse kinematics in robot manipulators
Autorzy:
Duleba, I.
Opalka, M.
Powiązania:
https://bibliotekanauki.pl/articles/384535.pdf
Data publikacji:
2013
Wydawca:
Sieć Badawcza Łukasiewicz - Przemysłowy Instytut Automatyki i Pomiarów
Tematy:
inverse kinematics
repeatability
algorithm
Opis:
In this paper an idea of the elastic band method was exploited to design a repeatable inverse kinematics algorithm for robot manipulators. The method incorporates an optimization process at many stages of its performance and admits some extensions. Performance of the algorithm was illustrated on models of the three DOF planar pendulum and the PUMA robot. A comparison with a standard pseudo-inverse Jacobian algorithm, which does not preserve repeatability of inverse kinematics, is also provided.
Źródło:
Journal of Automation Mobile Robotics and Intelligent Systems; 2013, 7, 4; 5-12
1897-8649
2080-2145
Pojawia się w:
Journal of Automation Mobile Robotics and Intelligent Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Real-Time Cloud-based Game Management System via Cuckoo Search Algorithm
Autorzy:
Połap, D.
Woźniak, M.
Napoli, C.
Tramontana, E.
Powiązania:
https://bibliotekanauki.pl/articles/226816.pdf
Data publikacji:
2015
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
computational intelligence
heuristic algorithm
Opis:
This paper analyses the idea of applying Swarm Intelligence in the process of managing the entire 2D board game in a real-time environment. For the proposed solution Game Management System is used as a cloud resource with a dedicated intelligent control agent. The described approach has been analysed on the basis of board games like mazes. The model and the control algorithm of the system is described and examined. The results of the experiments are presented and discussed to show possible advantages and isadvantages of the proposed method.
Źródło:
International Journal of Electronics and Telecommunications; 2015, 61, 4; 333-338
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The concept of using evolutionary algorithms as tools for optimal planning of multimodal composition in the didactic texts
Autorzy:
Jakubowski, M. A.
Charlak, M.
Gryniewicz-Jaworska, M.
Powiązania:
https://bibliotekanauki.pl/articles/102285.pdf
Data publikacji:
2014
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
algorithm
didactic text
connectivism
Opis:
At the beginning we would like to provide a short description of the new theory of learning in the digital age called connectivism. It is the integration of principles explored by the following theories: chaos, network, complexity and self-organization. Next, we describe in short new visual solutions for the teaching of writing so called multimodal literacy 5–11. We define and describe the following notions: multimodal text and original theory so called NOS (non-optimum systems methodology) as a basis for new methods of visual solutions at the classes and audiovisual texts applications. Especially, we would like to emphasize the tremendous usefulness of evolutionary algorithms VEGA and NSGA as tools for optimal planning of multimodal composition in teaching texts. Finally, we give some examples of didactic texts for classrooms, which provide a deep insight into learning skills and tasks needed in the Internet age.
Źródło:
Advances in Science and Technology. Research Journal; 2014, 8, 24; 83-89
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Performance investigation and element optimization of 2D array transducer using Bat Algorithm
Autorzy:
Tantawy, Dina Mohamed
Eladawy, Mohamed
Hassan, Mohamed Alimaher
Mubarak, Roaa
Powiązania:
https://bibliotekanauki.pl/articles/140685.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
2D ultrasound arrays
Binary Bat Algorithm
Genetic Algorithm
Optimization
Opis:
One of the least expensive and safest diagnostic modalities routinely used is ultrasound imaging. An attractive development in this field is a two-dimensional (2D) matrix probe with three-dimensional (3D) imaging. The main problems to implement this probe come from a large number of elements they need to use. When the number of elements is reduced the side lobes arising from the transducer change along with the grating lobes that are linked to the periodic disposition of the elements. The grating lobes are reduced by placing the elements without any consideration of the grid. In this study, the Binary Bat Algorithm (BBA) is used to optimize the number of active elements in order to lower the side lobe level. The results are compared to other optimization methods to validate the proposed algorithm.
Źródło:
Archives of Electrical Engineering; 2020, 69, 3; 561-579
1427-4221
2300-2506
Pojawia się w:
Archives of Electrical Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Multilevel inverter with optimal THD through the firefly algorithm
Autorzy:
El Mehdi Belkacem, R.
Benzid, R.
Bouguechal, N.
Powiązania:
https://bibliotekanauki.pl/articles/141495.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
firefly algorithm (FFA)
genetic algorithm (GA)
inverter
multilevel
optimized THD
Opis:
Reduction of the Total Harmonic Distortion (THD) in multilevel inverters requires resolution of complex nonlinear transcendental equations; in this paper we propose a combination of one of the best existing optimized hardware structures with the recent firefly algorithm, which was used to optimize the THD, through finding the best switching angles and guaranteeing the minimization of harmonics within a user defined bandwidth. The obtained THD through the simulation of the thirteen-level symmetric inverter has been reduced down to 5% (FFT of 60 harmonics). In order to validate the simulation results, a thirteen-level symmetric inverter prototype has been made, and practically experimented and tested with different loads. Consequently, the measured THD with resistive load was 4.7% on a bandwidth of 3 kHz. The main advantage of the achieved work is the reduction of the THD.
Źródło:
Archives of Electrical Engineering; 2017, 66, 1; 141-154
1427-4221
2300-2506
Pojawia się w:
Archives of Electrical Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Quantum Factorization of Integers 21 and 91 using Shor’s Algorithm
Autorzy:
Ardhyamath, Poornima
Naghabhushana, N. M.
Ujjinimatad, Rohitha
Powiązania:
https://bibliotekanauki.pl/articles/1070857.pdf
Data publikacji:
2019
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Euclidean Algorithm
Factorization
GCD
Quantum Fourier Transform
Shor’s Algorithm
Opis:
In this paper we focused on the factorization of integer in detail using well known Shor’s algorithm and its quantum part realization. The algorithm finds prime factors any integer more efficiently than any known classical algorithm. It is based on prior knowledge of the answer to the factorization problem. Algorithm includes finding gcd using polynomial time Euclidean algorithm, determination of unknown period from quantum computer and continued fraction expansion approach. Factorization of two integers 21 and 91 are shown in this paper with all steps. Quantum part of the factorization described mathematically.
Źródło:
World Scientific News; 2019, 123; 102-113
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Software Systems Clustering Using Estimation of Distribution Approach
Autorzy:
Tajgardan, M.
Izadkhah, H.
Lotfi, S.
Powiązania:
https://bibliotekanauki.pl/articles/108635.pdf
Data publikacji:
2016
Wydawca:
Społeczna Akademia Nauk w Łodzi
Tematy:
Software System
Clustering, Genetic Algorithm
Estimation of Distribution Algorithm (EDA)
Probability Model
Opis:
Software clustering is usually used for program understanding. Since the software clustering is a NP-complete problem, a number of Genetic Algorithms (GAs) are proposed for solving this problem. In literature, there are two wellknown GAs for software clustering, namely, Bunch and DAGC, that use the genetic operators such as crossover and mutation to better search the solution space and generating better solutions during genetic algorithm evolutionary process. The major drawbacks of these operators are (1) the difficulty of defining operators, (2) the difficulty of determining the probability rate of these operators, and (3) do not guarantee to maintain building blocks. Estimation of Distribution (EDA) based approaches, by removing crossover and mutation operators and maintaining building blocks, can be used to solve the problems of genetic algorithms. This approach creates the probabilistic models from individuals to generate new population during evolutionary process, aiming to achieve more success in solving the problems. The aim of this paper is to recast EDA for software clustering problems, which can overcome the existing genetic operators’ limitations. For achieving this aim, we propose a new distribution probability function and a new EDA based algorithm for software clustering. To the best knowledge of the authors, EDA has not been investigated to solve the software clustering problem. The proposed EDA has been compared with two well-known genetic algorithms on twelve benchmarks. Experimental results show that the proposed approach provides more accurate results, improves the speed of convergence and provides better stability when compared against existing genetic algorithms such as Bunch and DAGC.
Źródło:
Journal of Applied Computer Science Methods; 2016, 8 No. 2; 99-113
1689-9636
Pojawia się w:
Journal of Applied Computer Science Methods
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Heuristic algorithms applied to the problems of servicing actors in supply chains
Autorzy:
Izdebski, M.
Jacyna-Gołda, I.
Markowska, K.
Murawski, J.
Powiązania:
https://bibliotekanauki.pl/articles/224087.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
supply chain
genetic algorithm
ant algorithm
łańcuchy dostaw
algorytm genetyczny
algorytm mrówkowy
Opis:
The paper discusses main decision problems analysed in the subject matter of servicing actors operating in the supply chains, i.e. the vehicle routing problem, vehicles-to-task assignment problem and the problem of entities’ localization in the supply chain. The input data used to describe supply chains is given as well as the basic constraints and the criterion functions used in the development of mathematical models describing the supply chains. Servicing actors in supply chains is the complex decision making problem. Operators in the supply chains are constrained by: production capacity of the suppliers, the demand of the customers in particular working days, storage capacities of warehouses, handling capacities of warehouses, suppliers’ and warehouses’ time windows and other. The efficiency of supply chain is described by cost of transport between operators, costs of passing cargoes through warehouses and delivery time to the recipient. The heuristic algorithms, like genetic and ant algorithms are detailed and used to identify issues related to the operation of actors operating in the supply chains are described. These algorithms are used for solving localization problems in supply chains, vehicle routing problems, and assignment problems. The complexity of presented issues (TSP is known as NP-hard problem) limits the use of precise algorithms and implies the need to use heuristic algorithms. It should be noted that solutions generated by these algorithms for complex decision instances are sub-optimal solutions, but nonetheless it is accepted from the practical point of view.
Źródło:
Archives of Transport; 2017, 44, 4; 25-34
0866-9546
2300-8830
Pojawia się w:
Archives of Transport
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Optimization of electric and magnetic field intensities in proximity of power lines using genetic and particle swarm algorithms
Autorzy:
Król, K.
Machczyński, W.
Powiązania:
https://bibliotekanauki.pl/articles/141588.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
power line
electric field
magnetic field
optimization
genetic algorithm
particle swarm algorithm
Opis:
The paper presents optimization of power line geometrical parameters aimed to reduce the intensity of the electric field and magnetic field intensity under an overhead power line with the use of a genetic algorithm (AG) and particle swarm optimization (PSO). The variation of charge distribution along the conductors as well as the sag of the overhead line and induced currents in earth wires were taken into account. The conductor sag was approximated by a chain curve. The charge simulation method (CSM) and the method of images were used in the simulations of an electric field, while a magnetic field were calculated using the Biot–Savart law. Sample calculations in a three-dimensional system were made for a 220 kV single – circuit power line. A comparison of the used optimization algorithms was made.
Źródło:
Archives of Electrical Engineering; 2018, 67, 4; 829-843
1427-4221
2300-2506
Pojawia się w:
Archives of Electrical Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Meta-heuristic approach based on genetic and greedy algorithms to solve flexible job-shop scheduling problem
Autorzy:
Rezaeipanah, Amin
Sarhangnia, Fariba
Abdollahi, Mohammad Javad
Powiązania:
https://bibliotekanauki.pl/articles/2097966.pdf
Data publikacji:
2021
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
job-shop scheduling
meta-heuristic method
genetic algorithm
greedy algorithm
jobs priority
Opis:
Job-shop scheduling systems are one of the applications of group technology in industry, the purpose of which is to take advantage of the physical or operational similarities of products in their various aspects of construction and design. Additionally, these systems are identified as cellular manufacturing systems (CMS). In this paper, a meta-heuristic method that is based on combining genetic and greedy algorithms has been used in order to optimize and evaluate the performance criteria of the flexible job-shop scheduling problem. In order to improve the efficiency of the genetic algorithm, the initial population is generated by the greedy algorithm, and several elitist operators are used to improve the solutions. The greedy algorithm that is used to improve the generation of the initial population prioritizes the cells and the job in each cell and, thus, offers quality solutions. The proposed algorithm is tested over the P-FJSP dataset and compared with the state-of-the-art techniques of this literature. To evaluate the performance of the diversity, spacing, quality, and run-time criteria were used in a multi-objective function. The results of the simulation indicate the better performance of the proposed method as compared to the NRGA and NSGA-II methods.
Źródło:
Computer Science; 2021, 22 (4); 463--488
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Evolutionary algorithm with a configurable search mechanism
Autorzy:
Łapa, Krystian
Cpałka, Krzysztof
Laskowski, Łukasz
Cader, Andrzej
Zeng, Zhigang
Powiązania:
https://bibliotekanauki.pl/articles/1837536.pdf
Data publikacji:
2020
Wydawca:
Społeczna Akademia Nauk w Łodzi. Polskie Towarzystwo Sieci Neuronowych
Tematy:
evolutionary algorithm
population-based algorithm
optimization
operator pool
operator selection
individual selection
Opis:
In this paper, we propose a new population-based evolutionary algorithm that automatically configures the used search mechanism during its operation, which consists in choosing for each individual of the population a single evolutionary operator from the pool. The pool of operators comes from various evolutionary algorithms. With this idea, a flexible balance between exploration and exploitation of the problem domain can be achieved. The approach proposed in this paper might offer an inspirational alternative in creating evolutionary algorithms and their modifications. Moreover, different strategies for mutating those parts of individuals that encode the used search operators are also taken into account. The effectiveness of the proposed algorithm has been tested using typical benchmarks used to test evolutionary algorithms.
Źródło:
Journal of Artificial Intelligence and Soft Computing Research; 2020, 10, 3; 151-171
2083-2567
2449-6499
Pojawia się w:
Journal of Artificial Intelligence and Soft Computing Research
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
FPGA-based secure and noiseless image transmission using lea and optimized bilateral filter
Autorzy:
Hebbale, Sunil B.
Akula, V.S. Giridhar
Baraki, Parashuram
Powiązania:
https://bibliotekanauki.pl/articles/27312891.pdf
Data publikacji:
2022
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
lightweight encryption algorithm
bilateral filter
whale optimization algorithm
discrete wavelet transform
Opis:
In today’s world, the transmission of secured and noiseless images is a difficult task. Therefore, effective strategies are important for securing data or secret images from attackers. Besides, denoising approaches are important for obtaining noise-free images. For this, an effective crypto-steganography method that is based on a lightweight encryption algorithm (LEA) and the modified least significant bit (MLSB) method for secured transmission is proposed. Moreover, a bilateral filter-based whale optimization algorithm (WOA) is used for image denoising. Before the image transmission, a secret image is encrypted by the LEA algorithm and embedded into the cover image using discrete wavelet transform (DWT) and MLSB techniques. After the image transmission, an extraction process is performed in order to recover the secret image. Finally, a bilateral WOA filter is used to remove the noise from the secret image. The Verilog code for the proposed model is designed and simulated in Xilinx software. Finally, the simulation results show that the proposed filtering technique results in performance that is superior to conventional bilateral and Gaussian filters in terms of the peak signal-to-noise ratio (PSNR) and structural similarity index measure (SSIM).
Źródło:
Computer Science; 2022, 23 (4); 451--466
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies