In this paper we calculate a synthetic medium surface displacement response that is consistent with real measurement data by applying the least-square principle and a niche genetic algorithm to the parameters inversio...In this paper we calculate a synthetic medium surface displacement response that is consistent with real measurement data by applying the least-square principle and a niche genetic algorithm to the parameters inversion problem of the wave equation in a two-phase medium. We propose a niche genetic multi-parameter (including porosity, solid phase density and fluid phase density) joint inversion algorithm based on a two-phase fractured medium in the BISQ model. We take the two-phase fractured medium of the BISQ model in a two- dimensional half space as an example, and carry out the numerical reservoir parameters inversion. Results show that this method is very convenient for solving the parameters inversion problem for the wave equation in a two-phase medium, and has the advantage of strong noise rejection. Relative to conventional genetic algorithms, the niche genetic algorithm based on a sharing function can not only significantly speed up the convergence, but also improve the inversion precision.展开更多
Minimax algorithm and machine learning technologies have been studied for decades to reach an ideal optimization in game areas such as chess and backgammon. In these fields, several generations try to optimize the cod...Minimax algorithm and machine learning technologies have been studied for decades to reach an ideal optimization in game areas such as chess and backgammon. In these fields, several generations try to optimize the code for pruning and effectiveness of evaluation function. Thus, there are well-armed algorithms to deal with various sophisticated situations in gaming occasion. However, as a traditional zero-sum game, Connect-4 receives less attention compared with the other members of its zero-sum family using traditional minimax algorithm. In recent years, new generation of heuristics is created to address this problem based on research conclusions, expertise and gaming experiences. However, this paper mainly introduced a self-developed heuristics supported by well-demonstrated result from researches and our own experiences which fighting against the available version of Connect-4 system online. While most previous works focused on winning algorithms and knowledge based approaches, we complement these works with analysis of heuristics. We have conducted three experiments on the relationship among functionality, depth of searching and number of features and doing contrastive test with sample online. Different from the sample based on summarized experience and generalized features, our heuristics have a basic concentration on detailed connection between pieces on board. By analysing the winning percentages when our version fights against the online sample with different searching depths, we find that our heuristics with minimax algorithm is perfect on the early stages of the zero-sum game playing. Because some nodes in the game tree have no influence on the final decision of minimax algorithm, we use alpha-beta pruning to decrease the number of meaningless node which greatly increases the minimax efficiency. During the contrastive experiment with the online sample, this paper also verifies basic characters of the minimax algorithm including depths and quantity of features. According to the experiment, these two characters can both effect the decision for each step and none of them can be absolutely in charge. Besides, we also explore some potential future issues in Connect-4 game optimization such as precise adjustment on heuristic values and inefficiency pruning on the search tree.展开更多
The Cross-domain Heuristic Search Challenge(CHeSC)is a competition focused on creating efficient search algorithms adaptable to diverse problem domains.Selection hyper-heuristics are a class of algorithms that dynamic...The Cross-domain Heuristic Search Challenge(CHeSC)is a competition focused on creating efficient search algorithms adaptable to diverse problem domains.Selection hyper-heuristics are a class of algorithms that dynamically choose heuristics during the search process.Numerous selection hyper-heuristics have different imple-mentation strategies.However,comparisons between them are lacking in the literature,and previous works have not highlighted the beneficial and detrimental implementation methods of different components.The question is how to effectively employ them to produce an efficient search heuristic.Furthermore,the algorithms that competed in the inaugural CHeSC have not been collectively reviewed.This work conducts a review analysis of the top twenty competitors from this competition to identify effective and ineffective strategies influencing algorithmic performance.A summary of the main characteristics and classification of the algorithms is presented.The analysis underlines efficient and inefficient methods in eight key components,including search points,search phases,heuristic selection,move acceptance,feedback,Tabu mechanism,restart mechanism,and low-level heuristic parameter control.This review analyzes the components referencing the competition’s final leaderboard and discusses future research directions for these components.The effective approaches,identified as having the highest quality index,are mixed search point,iterated search phases,relay hybridization selection,threshold acceptance,mixed learning,Tabu heuristics,stochastic restart,and dynamic parameters.Findings are also compared with recent trends in hyper-heuristics.This work enhances the understanding of selection hyper-heuristics,offering valuable insights for researchers and practitioners aiming to develop effective search algorithms for diverse problem domains.展开更多
A well-designed production schedule for cold rolling can enhance steel enterprises'operational efficiency and profitability.Nevertheless,the intricate constraints and numerous steps involved in cold rolling pose c...A well-designed production schedule for cold rolling can enhance steel enterprises'operational efficiency and profitability.Nevertheless,the intricate constraints and numerous steps involved in cold rolling pose challenges to devising a rational scheduling plan.Therefore,considering the practical production constraints,this paper investigates a cold rolling scheduling problem for processing jobs with specific due dates and batch attributions on parallel heterogeneous machines with continuous production requirements.Firstly,the scheduling problem is formulated as a mixed integer linear program(MILP)model with an economic objective.Then,a modified genetic algorithm(GA)is proposed to search for the optimal solution to the MILP problem.Specifically,this method includes a heuristic initialization mechanism to generate feasible initial solutions,three heuristic mutation operators to generate promising candidate solutions,and a parallel computing mechanism to accelerate the evaluation process of the GA.The simulation results demonstrate that the proposed method can be effectively implemented to generate optimized scheduling schemes in the cold rolling process.展开更多
Heuristic optimization algorithms have been widely used in solving complex optimization problems in various fields such as engineering,economics,and computer science.These algorithms are designed to find high-quality ...Heuristic optimization algorithms have been widely used in solving complex optimization problems in various fields such as engineering,economics,and computer science.These algorithms are designed to find high-quality solutions efficiently by balancing exploration of the search space and exploitation of promising solutions.While heuristic optimization algorithms vary in their specific details,they often exhibit common patterns that are essential to their effectiveness.This paper aims to analyze and explore common patterns in heuristic optimization algorithms.Through a comprehensive review of the literature,we identify the patterns that are commonly observed in these algorithms,including initialization,local search,diversity maintenance,adaptation,and stochasticity.For each pattern,we describe the motivation behind it,its implementation,and its impact on the search process.To demonstrate the utility of our analysis,we identify these patterns in multiple heuristic optimization algorithms.For each case study,we analyze how the patterns are implemented in the algorithm and how they contribute to its performance.Through these case studies,we show how our analysis can be used to understand the behavior of heuristic optimization algorithms and guide the design of new algorithms.Our analysis reveals that patterns in heuristic optimization algorithms are essential to their effectiveness.By understanding and incorporating these patterns into the design of new algorithms,researchers can develop more efficient and effective optimization algorithms.展开更多
Vulnerability assessment is a systematic process to identify security gaps in the design and evaluation of physical protection systems.Adversarial path planning is a widely used method for identifying potential vulner...Vulnerability assessment is a systematic process to identify security gaps in the design and evaluation of physical protection systems.Adversarial path planning is a widely used method for identifying potential vulnerabilities and threats to the security and resilience of critical infrastructures.However,achieving efficient path optimization in complex large-scale three-dimensional(3D)scenes remains a significant challenge for vulnerability assessment.This paper introduces a novel A^(*)-algorithmic framework for 3D security modeling and vulnerability assessment.Within this framework,the 3D facility models were first developed in 3ds Max and then incorporated into Unity for A^(*)heuristic pathfinding.The A^(*)-heuristic pathfinding algorithm was implemented with a geometric probability model to refine the detection and distance fields and achieve a rational approximation of the cost to reach the goal.An admissible heuristic is ensured by incorporating the minimum probability of detection(P_(D)^(min))and diagonal distance to estimate the heuristic function.The 3D A^(*)heuristic search was demonstrated using a hypothetical laboratory facility,where a comparison was also carried out between the A^(*)and Dijkstra algorithms for optimal path identification.Comparative results indicate that the proposed A^(*)-heuristic algorithm effectively identifies the most vulnerable adversarial pathfinding with high efficiency.Finally,the paper discusses hidden phenomena and open issues in efficient 3D pathfinding for security applications.展开更多
The execution process of satellite-ground clock synchronization and ephemeris uploading in the system is analyzed,as well as their characterized operation and their relationship.Based on the analysis of the scheduling...The execution process of satellite-ground clock synchronization and ephemeris uploading in the system is analyzed,as well as their characterized operation and their relationship.Based on the analysis of the scheduling goal and constraint character,a heuristics rule-based multi-stage link scheduling algorithm was put forward.The algorithm distinguishes the on-off-frontier satellites from the others and schedules them by turns.The paper presented the main flow as well as the detailed design of the rule.Finally based on the current COMPASS global system,some typical resources and constraints are selected to generate an instance.Then the comparison analysis between the heuristics scheduling algorithm and three other traditional scheduling strategies are carried out.The result shows the validity and reasonability of the multi-stage strategy.展开更多
The exponential use of artificial intelligence(AI)to solve and automated complex tasks has catapulted its popularity generating some challenges that need to be addressed.While AI is a powerfulmeans to discover interes...The exponential use of artificial intelligence(AI)to solve and automated complex tasks has catapulted its popularity generating some challenges that need to be addressed.While AI is a powerfulmeans to discover interesting patterns and obtain predictive models,the use of these algorithms comes with a great responsibility,as an incomplete or unbalanced set of training data or an unproper interpretation of the models’outcomes could result in misleading conclusions that ultimately could become very dangerous.For these reasons,it is important to rely on expert knowledge when applying these methods.However,not every user can count on this specific expertise;non-AIexpert users could also benefit from applying these powerful algorithms to their domain problems,but they need basic guidelines to obtain themost out of AI models.The goal of this work is to present a systematic review of the literature to analyze studies whose outcomes are explainable rules and heuristics to select suitable AI algorithms given a set of input features.The systematic review follows the methodology proposed by Kitchenham and other authors in the field of software engineering.As a result,9 papers that tackle AI algorithmrecommendation through tangible and traceable rules and heuristics were collected.The reduced number of retrieved papers suggests a lack of reporting explicit rules and heuristics when testing the suitability and performance of AI algorithms.展开更多
In this paper,the relaxation algorithm and two Uzawa type algorithms for solving discretized variational inequalities arising from the two-phase Stefan type problem are proposed.An analysis of their convergence is pre...In this paper,the relaxation algorithm and two Uzawa type algorithms for solving discretized variational inequalities arising from the two-phase Stefan type problem are proposed.An analysis of their convergence is presented and the upper bounds of the convergence rates are derived.Some numerical experiments are shown to demonstrate that for the second Uzawa algorithm which is an improved version of the first Uzawa algorithm,the convergence rate is uniformly bounded away from 1 if τh^-2 is kept bounded,where τ is the time step size and h the space mesh size.展开更多
In recent times among the multitude of attacks present in network system, DDoS attacks have emerged to be the attacks with the most devastating effects. The main objective of this paper is to propose a system that eff...In recent times among the multitude of attacks present in network system, DDoS attacks have emerged to be the attacks with the most devastating effects. The main objective of this paper is to propose a system that effectively detects DDoS attacks appearing in any networked system using the clustering technique of data mining followed by classification. This method uses a Heuristics Clustering Algorithm (HCA) to cluster the available data and Na?ve Bayes (NB) classification to classify the data and detect the attacks created in the system based on some network attributes of the data packet. The clustering algorithm is based in unsupervised learning technique and is sometimes unable to detect some of the attack instances and few normal instances, therefore classification techniques are also used along with clustering to overcome this classification problem and to enhance the accuracy. Na?ve Bayes classifiers are based on very strong independence assumptions with fairly simple construction to derive the conditional probability for each relationship. A series of experiment is performed using “The CAIDA UCSD DDoS Attack 2007 Dataset” and “DARPA 2000 Dataset” and the efficiency of the proposed system has been tested based on the following performance parameters: Accuracy, Detection Rate and False Positive Rate and the result obtained from the proposed system has been found that it has enhanced accuracy and detection rate with low false positive rate.展开更多
Combining the heuristic algorithm (HA) developed based on the specific knowledge of the cooperative multiple target attack (CMTA) tactics and the particle swarm optimization (PSO), a heuristic particle swarm opt...Combining the heuristic algorithm (HA) developed based on the specific knowledge of the cooperative multiple target attack (CMTA) tactics and the particle swarm optimization (PSO), a heuristic particle swarm optimization (HPSO) algorithm is proposed to solve the decision-making (DM) problem. HA facilitates to search the local optimum in the neighborhood of a solution, while the PSO algorithm tends to explore the search space for possible solutions. Combining the advantages of HA and PSO, HPSO algorithms can find out the global optimum quickly and efficiently. It obtains the DM solution by seeking for the optimal assignment of missiles of friendly fighter aircrafts (FAs) to hostile FAs. Simulation results show that the proposed algorithm is superior to the general PSO algorithm and two GA based algorithms in searching for the best solution to the DM problem.展开更多
In this paper,the berth scheduling problem is transformed into a special two-dimensional packing problem with some constraints.A nonlinear programming model for the problem is established,and a heuristic algorithm is ...In this paper,the berth scheduling problem is transformed into a special two-dimensional packing problem with some constraints.A nonlinear programming model for the problem is established,and a heuristic algorithm is proposed to solve the model.Simulation results show that the algorithm can improve the utilization of berths on discrete berth scheduling in the container port.展开更多
Resource-constrained project scheduling problem(RCPSP) is an important problem in research on project management. But there has been little attention paid to the objective of minimizing activities' cost with the re...Resource-constrained project scheduling problem(RCPSP) is an important problem in research on project management. But there has been little attention paid to the objective of minimizing activities' cost with the resource constraints that is a critical sub-problem in partner selection of construction supply chain management because the capacities of the renewable resources supplied by the partners will effect on the project scheduling. Its mathematic model is presented firstly, and analysis on the characteristic of the problem shows that the objective function is non-regular and the problem is NP-complete following which the basic idea for solution is clarified. Based on a definition of preposing activity cost matrix, a heuristic algorithm is brought forward. Analyses on the complexity of the heuristics and the result of numerical studies show that the heuristic algorithm is feasible and relatively effective.展开更多
We study the fabric spreading and cutting problem in apparel factories.For the sake of saving the material costs,the cutting requirement should be met exactly without producing additional garment components.For reduci...We study the fabric spreading and cutting problem in apparel factories.For the sake of saving the material costs,the cutting requirement should be met exactly without producing additional garment components.For reducing the production costs,the number of lays that corresponds to the frequency of using the cutting beds should be minimized.We propose an iterated greedy algorithm for solving the fabric spreading and cutting problem.This algorithm contains a constructive procedure and an improving loop.Firstly the constructive procedure creates a set of lays in sequence,and then the improving loop tries to pick each lay from the lay set and rearrange the remaining lays into a smaller lay set.The improving loop will run until it cannot obtain any smaller lay set or the time limit is due.The experiment results on 500 cases show that the proposed algorithm is effective and efficient.展开更多
An improved heuristic recursive strategy combining with genetic algorithm is presented in this paper.Firstly,this method searches some rectangles,which have the same length or width,to form some layers without waste s...An improved heuristic recursive strategy combining with genetic algorithm is presented in this paper.Firstly,this method searches some rectangles,which have the same length or width,to form some layers without waste space,then it uses the heuristic recursive strategies to calculate the height of the remaining packing order and uses the evolutionary capability of genetic algorithm to reduce the height.The computational results on several classes of benchmark problems have shown that the presented algorithm can compete with known evolutionary heuristics.It performs better especially for large test problems.展开更多
Inter-satellite link(ISL)scheduling is required by the BeiDou Navigation Satellite System(BDS)to guarantee the system ranging and communication performance.In the BDS,a great number of ISL scheduling instances must be...Inter-satellite link(ISL)scheduling is required by the BeiDou Navigation Satellite System(BDS)to guarantee the system ranging and communication performance.In the BDS,a great number of ISL scheduling instances must be addressed every day,which will certainly spend a lot of time via normal metaheuristics and hardly meet the quick-response requirements that often occur in real-world applications.To address the dual requirements of normal and quick-response ISL schedulings,a data-driven heuristic assisted memetic algorithm(DHMA)is proposed in this paper,which includes a high-performance memetic algorithm(MA)and a data-driven heuristic.In normal situations,the high-performance MA that hybridizes parallelism,competition,and evolution strategies is performed for high-quality ISL scheduling solutions over time.When in quick-response situations,the data-driven heuristic is performed to quickly schedule high-probability ISLs according to a prediction model,which is trained from the high-quality MA solutions.The main idea of the DHMA is to address normal and quick-response schedulings separately,while high-quality normal scheduling data are trained for quick-response use.In addition,this paper also presents an easy-to-understand ISL scheduling model and its NP-completeness.A seven-day experimental study with 10080 one-minute ISL scheduling instances shows the efficient performance of the DHMA in addressing the ISL scheduling in normal(in 84 hours)and quick-response(in 0.62 hour)situations,which can well meet the dual scheduling requirements in real-world BDS applications.展开更多
A new method for the voidage measurement of gas-oil two-phase flow was proposed.The voidage measurement was implemented by the identification of flow pattern and a flow pattern specific voidage measure- ment model.The...A new method for the voidage measurement of gas-oil two-phase flow was proposed.The voidage measurement was implemented by the identification of flow pattern and a flow pattern specific voidage measure- ment model.The flow pattern identification was achieved by combining the fuzzy pattern recognition technique and the crude cross-sectional image reconstructed by the simple back projection algorithm.The genetic algorithm and the partial least square method were applied to develop the voidage measurement models.Experimental results show that the proposed method is effective.It can overcome the influence of flow pattern on the voidage measure- ment,and also has the advantages of simplicity and speediness.展开更多
We present a new algorithm for nesting problems.Many equally spaced points are set on a sheet,and a piece is moved to one of the points and rotated by an angle.Both the point and the rotation angle constitute the pack...We present a new algorithm for nesting problems.Many equally spaced points are set on a sheet,and a piece is moved to one of the points and rotated by an angle.Both the point and the rotation angle constitute the packing attitude of the piece.We propose a new algorithm named HAPE(Heuristic Algorithm based on the principle of minimum total Potential Energy) to find the optimal packing attitude at which the piece has the lowest center of gravity.In addition,a new technique for polygon overlap testing is proposed which avoids the time-consuming calculation of no-fit-polygon(NFP).The detailed implementation of HAPE is presented and two computational experiments are described.The first experiment is based on a real industrial problem and the second on 11 published benchmark problems.Using a hill-climbing(HC) search method,the proposed algorithm performs well in comparison with other published solutions.展开更多
In this paper, a consistent projection-based streamline upwind/pressure stabilizing Petrov-Galerkin (SUPG/PSPG) extended finite element method (XFEM) is presented to model incompressible immiscible two-phase flows...In this paper, a consistent projection-based streamline upwind/pressure stabilizing Petrov-Galerkin (SUPG/PSPG) extended finite element method (XFEM) is presented to model incompressible immiscible two-phase flows. As the application of linear elements in SUPG/PSPG schemes gives rise to inconsistency in stabilization terms due to the inability to regenerate the diffusive term from viscous stresses, the numerical accuracy would deteriorate dramatically. To address this issue, projections of convection and pressure gradient terms are constructed and incorporated into the stabilization formulation in our method. This would substantially recover the consistency and free the practitioner from burdensome computations of most items in the residual. Moreover, the XFEM is employed to consider in a convenient way the fluid properties that have interfacial jumps leading to discontinuities in the velocity and pressure fields as well as the projections. A number of numerical examples are analyzed to demonstrate the complete recovery of consistency, the reproduction of interfacial discontinuities and the ability of the proposed projection-based SUPG/PSPG XFEM to model two-phase flows with open and closed interfaces.展开更多
Themodeling and risk assessment of a pandemic phenomenon such as COVID-19 is an important and complicated issue in epidemiology,and such an attempt is of great interest for public health decision-making.To this end,in...Themodeling and risk assessment of a pandemic phenomenon such as COVID-19 is an important and complicated issue in epidemiology,and such an attempt is of great interest for public health decision-making.To this end,in the present study,based on a recent heuristic algorithm proposed by the authors,the time evolution of COVID-19 is investigated for six different countries/states,namely New York,California,USA,Iran,Sweden and UK.The number of COVID-19-related deaths is used to develop the proposed heuristic model as it is believed that the predicted number of daily deaths in each country/state includes information about the quality of the health system in each area,the age distribution of population,geographical and environmental factors as well as other conditions.Based on derived predicted epidemic curves,a new 3D-epidemic surface is proposed to assess the epidemic phenomenon at any time of its evolution.This research highlights the potential of the proposed model as a tool which can assist in the risk assessment of the COVID-19.Mapping its development through 3D-epidemic surface can assist in revealing its dynamic nature as well as differences and similarities among different districts.展开更多
基金sponsored by the National Science and Technology Major Project(Grant No.2011ZX05025-001-07)
文摘In this paper we calculate a synthetic medium surface displacement response that is consistent with real measurement data by applying the least-square principle and a niche genetic algorithm to the parameters inversion problem of the wave equation in a two-phase medium. We propose a niche genetic multi-parameter (including porosity, solid phase density and fluid phase density) joint inversion algorithm based on a two-phase fractured medium in the BISQ model. We take the two-phase fractured medium of the BISQ model in a two- dimensional half space as an example, and carry out the numerical reservoir parameters inversion. Results show that this method is very convenient for solving the parameters inversion problem for the wave equation in a two-phase medium, and has the advantage of strong noise rejection. Relative to conventional genetic algorithms, the niche genetic algorithm based on a sharing function can not only significantly speed up the convergence, but also improve the inversion precision.
文摘Minimax algorithm and machine learning technologies have been studied for decades to reach an ideal optimization in game areas such as chess and backgammon. In these fields, several generations try to optimize the code for pruning and effectiveness of evaluation function. Thus, there are well-armed algorithms to deal with various sophisticated situations in gaming occasion. However, as a traditional zero-sum game, Connect-4 receives less attention compared with the other members of its zero-sum family using traditional minimax algorithm. In recent years, new generation of heuristics is created to address this problem based on research conclusions, expertise and gaming experiences. However, this paper mainly introduced a self-developed heuristics supported by well-demonstrated result from researches and our own experiences which fighting against the available version of Connect-4 system online. While most previous works focused on winning algorithms and knowledge based approaches, we complement these works with analysis of heuristics. We have conducted three experiments on the relationship among functionality, depth of searching and number of features and doing contrastive test with sample online. Different from the sample based on summarized experience and generalized features, our heuristics have a basic concentration on detailed connection between pieces on board. By analysing the winning percentages when our version fights against the online sample with different searching depths, we find that our heuristics with minimax algorithm is perfect on the early stages of the zero-sum game playing. Because some nodes in the game tree have no influence on the final decision of minimax algorithm, we use alpha-beta pruning to decrease the number of meaningless node which greatly increases the minimax efficiency. During the contrastive experiment with the online sample, this paper also verifies basic characters of the minimax algorithm including depths and quantity of features. According to the experiment, these two characters can both effect the decision for each step and none of them can be absolutely in charge. Besides, we also explore some potential future issues in Connect-4 game optimization such as precise adjustment on heuristic values and inefficiency pruning on the search tree.
基金funded by Ministry of Higher Education(MoHE)Malaysia,under Transdisciplinary Research Grant Scheme(TRGS/1/2019/UKM/01/4/2).
文摘The Cross-domain Heuristic Search Challenge(CHeSC)is a competition focused on creating efficient search algorithms adaptable to diverse problem domains.Selection hyper-heuristics are a class of algorithms that dynamically choose heuristics during the search process.Numerous selection hyper-heuristics have different imple-mentation strategies.However,comparisons between them are lacking in the literature,and previous works have not highlighted the beneficial and detrimental implementation methods of different components.The question is how to effectively employ them to produce an efficient search heuristic.Furthermore,the algorithms that competed in the inaugural CHeSC have not been collectively reviewed.This work conducts a review analysis of the top twenty competitors from this competition to identify effective and ineffective strategies influencing algorithmic performance.A summary of the main characteristics and classification of the algorithms is presented.The analysis underlines efficient and inefficient methods in eight key components,including search points,search phases,heuristic selection,move acceptance,feedback,Tabu mechanism,restart mechanism,and low-level heuristic parameter control.This review analyzes the components referencing the competition’s final leaderboard and discusses future research directions for these components.The effective approaches,identified as having the highest quality index,are mixed search point,iterated search phases,relay hybridization selection,threshold acceptance,mixed learning,Tabu heuristics,stochastic restart,and dynamic parameters.Findings are also compared with recent trends in hyper-heuristics.This work enhances the understanding of selection hyper-heuristics,offering valuable insights for researchers and practitioners aiming to develop effective search algorithms for diverse problem domains.
基金Supported by National Natural Science Foundation of China(Grant No.62273362)National Key Research and Development Program of China(Grant No.2024YFB3312100)。
文摘A well-designed production schedule for cold rolling can enhance steel enterprises'operational efficiency and profitability.Nevertheless,the intricate constraints and numerous steps involved in cold rolling pose challenges to devising a rational scheduling plan.Therefore,considering the practical production constraints,this paper investigates a cold rolling scheduling problem for processing jobs with specific due dates and batch attributions on parallel heterogeneous machines with continuous production requirements.Firstly,the scheduling problem is formulated as a mixed integer linear program(MILP)model with an economic objective.Then,a modified genetic algorithm(GA)is proposed to search for the optimal solution to the MILP problem.Specifically,this method includes a heuristic initialization mechanism to generate feasible initial solutions,three heuristic mutation operators to generate promising candidate solutions,and a parallel computing mechanism to accelerate the evaluation process of the GA.The simulation results demonstrate that the proposed method can be effectively implemented to generate optimized scheduling schemes in the cold rolling process.
文摘Heuristic optimization algorithms have been widely used in solving complex optimization problems in various fields such as engineering,economics,and computer science.These algorithms are designed to find high-quality solutions efficiently by balancing exploration of the search space and exploitation of promising solutions.While heuristic optimization algorithms vary in their specific details,they often exhibit common patterns that are essential to their effectiveness.This paper aims to analyze and explore common patterns in heuristic optimization algorithms.Through a comprehensive review of the literature,we identify the patterns that are commonly observed in these algorithms,including initialization,local search,diversity maintenance,adaptation,and stochasticity.For each pattern,we describe the motivation behind it,its implementation,and its impact on the search process.To demonstrate the utility of our analysis,we identify these patterns in multiple heuristic optimization algorithms.For each case study,we analyze how the patterns are implemented in the algorithm and how they contribute to its performance.Through these case studies,we show how our analysis can be used to understand the behavior of heuristic optimization algorithms and guide the design of new algorithms.Our analysis reveals that patterns in heuristic optimization algorithms are essential to their effectiveness.By understanding and incorporating these patterns into the design of new algorithms,researchers can develop more efficient and effective optimization algorithms.
基金supported by the fundings from 2024 Young Talents Program for Science and Technology Thinking Tanks(No.XMSB20240711041)2024 Student Research Program on Dynamic Simulation and Force-on-Force Exercise of Nuclear Security in 3D Interactive Environment Using Reinforcement Learning,Natural Science Foundation of Top Talent of SZTU(No.GDRC202407)+2 种基金Shenzhen Science and Technology Program(No.KCXFZ20240903092603005)Shenzhen Science and Technology Program(No.JCYJ20241202124703004)Shenzhen Science and Technology Program(No.KJZD20230923114117032)。
文摘Vulnerability assessment is a systematic process to identify security gaps in the design and evaluation of physical protection systems.Adversarial path planning is a widely used method for identifying potential vulnerabilities and threats to the security and resilience of critical infrastructures.However,achieving efficient path optimization in complex large-scale three-dimensional(3D)scenes remains a significant challenge for vulnerability assessment.This paper introduces a novel A^(*)-algorithmic framework for 3D security modeling and vulnerability assessment.Within this framework,the 3D facility models were first developed in 3ds Max and then incorporated into Unity for A^(*)heuristic pathfinding.The A^(*)-heuristic pathfinding algorithm was implemented with a geometric probability model to refine the detection and distance fields and achieve a rational approximation of the cost to reach the goal.An admissible heuristic is ensured by incorporating the minimum probability of detection(P_(D)^(min))and diagonal distance to estimate the heuristic function.The 3D A^(*)heuristic search was demonstrated using a hypothetical laboratory facility,where a comparison was also carried out between the A^(*)and Dijkstra algorithms for optimal path identification.Comparative results indicate that the proposed A^(*)-heuristic algorithm effectively identifies the most vulnerable adversarial pathfinding with high efficiency.Finally,the paper discusses hidden phenomena and open issues in efficient 3D pathfinding for security applications.
基金National Natural Science Foundations of China(Nos.71201171,71501179)
文摘The execution process of satellite-ground clock synchronization and ephemeris uploading in the system is analyzed,as well as their characterized operation and their relationship.Based on the analysis of the scheduling goal and constraint character,a heuristics rule-based multi-stage link scheduling algorithm was put forward.The algorithm distinguishes the on-off-frontier satellites from the others and schedules them by turns.The paper presented the main flow as well as the detailed design of the rule.Finally based on the current COMPASS global system,some typical resources and constraints are selected to generate an instance.Then the comparison analysis between the heuristics scheduling algorithm and three other traditional scheduling strategies are carried out.The result shows the validity and reasonability of the multi-stage strategy.
基金funded by the Spanish Government Ministry of Economy and Competitiveness through the DEFINES Project Grant No. (TIN2016-80172-R)the Ministry of Science and Innovation through the AVisSA Project Grant No. (PID2020-118345RBI00)supported by the Spanish Ministry of Education and Vocational Training under an FPU Fellowship (FPU17/03276).
文摘The exponential use of artificial intelligence(AI)to solve and automated complex tasks has catapulted its popularity generating some challenges that need to be addressed.While AI is a powerfulmeans to discover interesting patterns and obtain predictive models,the use of these algorithms comes with a great responsibility,as an incomplete or unbalanced set of training data or an unproper interpretation of the models’outcomes could result in misleading conclusions that ultimately could become very dangerous.For these reasons,it is important to rely on expert knowledge when applying these methods.However,not every user can count on this specific expertise;non-AIexpert users could also benefit from applying these powerful algorithms to their domain problems,but they need basic guidelines to obtain themost out of AI models.The goal of this work is to present a systematic review of the literature to analyze studies whose outcomes are explainable rules and heuristics to select suitable AI algorithms given a set of input features.The systematic review follows the methodology proposed by Kitchenham and other authors in the field of software engineering.As a result,9 papers that tackle AI algorithmrecommendation through tangible and traceable rules and heuristics were collected.The reduced number of retrieved papers suggests a lack of reporting explicit rules and heuristics when testing the suitability and performance of AI algorithms.
基金supported by the National Natural Science Foundation (10871179) of China
文摘In this paper,the relaxation algorithm and two Uzawa type algorithms for solving discretized variational inequalities arising from the two-phase Stefan type problem are proposed.An analysis of their convergence is presented and the upper bounds of the convergence rates are derived.Some numerical experiments are shown to demonstrate that for the second Uzawa algorithm which is an improved version of the first Uzawa algorithm,the convergence rate is uniformly bounded away from 1 if τh^-2 is kept bounded,where τ is the time step size and h the space mesh size.
基金The authors would like to extend their gratitude to Department of Graduate StudiesNepal College of Information Technology for its constant support and motivationWe would also like to thank the Journal of Information Security for its feedbacks and reviews
文摘In recent times among the multitude of attacks present in network system, DDoS attacks have emerged to be the attacks with the most devastating effects. The main objective of this paper is to propose a system that effectively detects DDoS attacks appearing in any networked system using the clustering technique of data mining followed by classification. This method uses a Heuristics Clustering Algorithm (HCA) to cluster the available data and Na?ve Bayes (NB) classification to classify the data and detect the attacks created in the system based on some network attributes of the data packet. The clustering algorithm is based in unsupervised learning technique and is sometimes unable to detect some of the attack instances and few normal instances, therefore classification techniques are also used along with clustering to overcome this classification problem and to enhance the accuracy. Na?ve Bayes classifiers are based on very strong independence assumptions with fairly simple construction to derive the conditional probability for each relationship. A series of experiment is performed using “The CAIDA UCSD DDoS Attack 2007 Dataset” and “DARPA 2000 Dataset” and the efficiency of the proposed system has been tested based on the following performance parameters: Accuracy, Detection Rate and False Positive Rate and the result obtained from the proposed system has been found that it has enhanced accuracy and detection rate with low false positive rate.
文摘Combining the heuristic algorithm (HA) developed based on the specific knowledge of the cooperative multiple target attack (CMTA) tactics and the particle swarm optimization (PSO), a heuristic particle swarm optimization (HPSO) algorithm is proposed to solve the decision-making (DM) problem. HA facilitates to search the local optimum in the neighborhood of a solution, while the PSO algorithm tends to explore the search space for possible solutions. Combining the advantages of HA and PSO, HPSO algorithms can find out the global optimum quickly and efficiently. It obtains the DM solution by seeking for the optimal assignment of missiles of friendly fighter aircrafts (FAs) to hostile FAs. Simulation results show that the proposed algorithm is superior to the general PSO algorithm and two GA based algorithms in searching for the best solution to the DM problem.
文摘In this paper,the berth scheduling problem is transformed into a special two-dimensional packing problem with some constraints.A nonlinear programming model for the problem is established,and a heuristic algorithm is proposed to solve the model.Simulation results show that the algorithm can improve the utilization of berths on discrete berth scheduling in the container port.
文摘Resource-constrained project scheduling problem(RCPSP) is an important problem in research on project management. But there has been little attention paid to the objective of minimizing activities' cost with the resource constraints that is a critical sub-problem in partner selection of construction supply chain management because the capacities of the renewable resources supplied by the partners will effect on the project scheduling. Its mathematic model is presented firstly, and analysis on the characteristic of the problem shows that the objective function is non-regular and the problem is NP-complete following which the basic idea for solution is clarified. Based on a definition of preposing activity cost matrix, a heuristic algorithm is brought forward. Analyses on the complexity of the heuristics and the result of numerical studies show that the heuristic algorithm is feasible and relatively effective.
基金supported in part by the National Key Research and Development Program of China(2018YFB1702701)the National Natural Science Foundation of China(61773381,61773382,61533019,61702519)+3 种基金Dongguan’s Innovation Talents Project(Gang Xiong)Guangdong’s Science and Technology Project(2017B090912001)Beijing Natural Science Foundation(4182065)Chinese Hunan’s Science and Technology Project(20181040)
文摘We study the fabric spreading and cutting problem in apparel factories.For the sake of saving the material costs,the cutting requirement should be met exactly without producing additional garment components.For reducing the production costs,the number of lays that corresponds to the frequency of using the cutting beds should be minimized.We propose an iterated greedy algorithm for solving the fabric spreading and cutting problem.This algorithm contains a constructive procedure and an improving loop.Firstly the constructive procedure creates a set of lays in sequence,and then the improving loop tries to pick each lay from the lay set and rearrange the remaining lays into a smaller lay set.The improving loop will run until it cannot obtain any smaller lay set or the time limit is due.The experiment results on 500 cases show that the proposed algorithm is effective and efficient.
基金Supported by Academician Start-up Fund(X01109)985 Information Technology Fund(0000-X07204)in Xiamen University
文摘An improved heuristic recursive strategy combining with genetic algorithm is presented in this paper.Firstly,this method searches some rectangles,which have the same length or width,to form some layers without waste space,then it uses the heuristic recursive strategies to calculate the height of the remaining packing order and uses the evolutionary capability of genetic algorithm to reduce the height.The computational results on several classes of benchmark problems have shown that the presented algorithm can compete with known evolutionary heuristics.It performs better especially for large test problems.
基金supported by the National Natural Science Foundation of China(61773120)the National Natural Science Fund for Distinguished Young Scholars of China(61525304)+2 种基金the Foundation for the Author of National Excellent Doctoral Dissertation of China(2014-92)the Hunan Postgraduate Research Innovation Project(CX2018B022)the China Scholarship Council-Leiden University Scholarship。
文摘Inter-satellite link(ISL)scheduling is required by the BeiDou Navigation Satellite System(BDS)to guarantee the system ranging and communication performance.In the BDS,a great number of ISL scheduling instances must be addressed every day,which will certainly spend a lot of time via normal metaheuristics and hardly meet the quick-response requirements that often occur in real-world applications.To address the dual requirements of normal and quick-response ISL schedulings,a data-driven heuristic assisted memetic algorithm(DHMA)is proposed in this paper,which includes a high-performance memetic algorithm(MA)and a data-driven heuristic.In normal situations,the high-performance MA that hybridizes parallelism,competition,and evolution strategies is performed for high-quality ISL scheduling solutions over time.When in quick-response situations,the data-driven heuristic is performed to quickly schedule high-probability ISLs according to a prediction model,which is trained from the high-quality MA solutions.The main idea of the DHMA is to address normal and quick-response schedulings separately,while high-quality normal scheduling data are trained for quick-response use.In addition,this paper also presents an easy-to-understand ISL scheduling model and its NP-completeness.A seven-day experimental study with 10080 one-minute ISL scheduling instances shows the efficient performance of the DHMA in addressing the ISL scheduling in normal(in 84 hours)and quick-response(in 0.62 hour)situations,which can well meet the dual scheduling requirements in real-world BDS applications.
基金Supported by the National lqatural Science Foundation of China (Nos.50576084 and 60532020).
文摘A new method for the voidage measurement of gas-oil two-phase flow was proposed.The voidage measurement was implemented by the identification of flow pattern and a flow pattern specific voidage measure- ment model.The flow pattern identification was achieved by combining the fuzzy pattern recognition technique and the crude cross-sectional image reconstructed by the simple back projection algorithm.The genetic algorithm and the partial least square method were applied to develop the voidage measurement models.Experimental results show that the proposed method is effective.It can overcome the influence of flow pattern on the voidage measure- ment,and also has the advantages of simplicity and speediness.
文摘We present a new algorithm for nesting problems.Many equally spaced points are set on a sheet,and a piece is moved to one of the points and rotated by an angle.Both the point and the rotation angle constitute the packing attitude of the piece.We propose a new algorithm named HAPE(Heuristic Algorithm based on the principle of minimum total Potential Energy) to find the optimal packing attitude at which the piece has the lowest center of gravity.In addition,a new technique for polygon overlap testing is proposed which avoids the time-consuming calculation of no-fit-polygon(NFP).The detailed implementation of HAPE is presented and two computational experiments are described.The first experiment is based on a real industrial problem and the second on 11 published benchmark problems.Using a hill-climbing(HC) search method,the proposed algorithm performs well in comparison with other published solutions.
文摘In this paper, a consistent projection-based streamline upwind/pressure stabilizing Petrov-Galerkin (SUPG/PSPG) extended finite element method (XFEM) is presented to model incompressible immiscible two-phase flows. As the application of linear elements in SUPG/PSPG schemes gives rise to inconsistency in stabilization terms due to the inability to regenerate the diffusive term from viscous stresses, the numerical accuracy would deteriorate dramatically. To address this issue, projections of convection and pressure gradient terms are constructed and incorporated into the stabilization formulation in our method. This would substantially recover the consistency and free the practitioner from burdensome computations of most items in the residual. Moreover, the XFEM is employed to consider in a convenient way the fluid properties that have interfacial jumps leading to discontinuities in the velocity and pressure fields as well as the projections. A number of numerical examples are analyzed to demonstrate the complete recovery of consistency, the reproduction of interfacial discontinuities and the ability of the proposed projection-based SUPG/PSPG XFEM to model two-phase flows with open and closed interfaces.
文摘Themodeling and risk assessment of a pandemic phenomenon such as COVID-19 is an important and complicated issue in epidemiology,and such an attempt is of great interest for public health decision-making.To this end,in the present study,based on a recent heuristic algorithm proposed by the authors,the time evolution of COVID-19 is investigated for six different countries/states,namely New York,California,USA,Iran,Sweden and UK.The number of COVID-19-related deaths is used to develop the proposed heuristic model as it is believed that the predicted number of daily deaths in each country/state includes information about the quality of the health system in each area,the age distribution of population,geographical and environmental factors as well as other conditions.Based on derived predicted epidemic curves,a new 3D-epidemic surface is proposed to assess the epidemic phenomenon at any time of its evolution.This research highlights the potential of the proposed model as a tool which can assist in the risk assessment of the COVID-19.Mapping its development through 3D-epidemic surface can assist in revealing its dynamic nature as well as differences and similarities among different districts.