期刊文献+
共找到354,193篇文章
< 1 2 250 >
每页显示 20 50 100
Efficient Algorithms for Steiner k-eccentricity on Graphs Similar to Trees
1
作者 LI Xingfu 《数学进展》 北大核心 2026年第2期281-291,共11页
The Steiner k-eccentricity of a vertex is the maximum Steiner distance over all k-sets each of which contains the given vertex,where the Steiner distance of a vertex set is the size of a minimum Steiner tree on this s... The Steiner k-eccentricity of a vertex is the maximum Steiner distance over all k-sets each of which contains the given vertex,where the Steiner distance of a vertex set is the size of a minimum Steiner tree on this set.Since the minimum Steiner tree problem is well-known NP-hard,the Steiner k-eccentricity is not so easy to compute.This paper attempts to efficiently solve this problem on block graphs and general graphs with limited cycles.A block graph is a graph in which each block is a clique,and is also called a clique-tree.On block graphs,we propose an O(k(n+m))-time algorithm to compute the Steiner k-eccentricity of a vertex where n and m are respectively the order and size of a block graph.On general graphs with limited cycles,we take the cyclomatic numberν(G)as a parameter which is the minimum number of edges of G whose removal makes G acyclic,and devise an O(n^(ν(G)+1)(n(G)+m(G)+k))-time algorithm. 展开更多
关键词 Steiner eccentricity algorithm COMPLEXITY
原文传递
Research on heuristic approximation algorithm of the densest k-subgraph discovery in large-scale dynamic graphs
2
作者 HAN Tao TIAN Yuxi +1 位作者 ZHAO Jianwei WANG Senzhang 《Journal of Southeast University(English Edition)》 2026年第1期74-79,共6页
To address the issue that static densest subgraph mining algorithms often exhibit low efficiency when handling large scale dynamic graphs,this paper proposes a heuristic approximation algorithm.The algorithm approxima... To address the issue that static densest subgraph mining algorithms often exhibit low efficiency when handling large scale dynamic graphs,this paper proposes a heuristic approximation algorithm.The algorithm approximates the densest k-subgraphs of the entire graph through four steps:partitioning the large-scale dynamic graph,constructing a partial set of the densest k-subgraphs,heuristically merging the subgraph sets,and finally extracting the densest k-subgraphs.This approach significantly reduces the computational time for large-scale dynamic graphs while simultaneously improving the quality of the resulting subgraphs.This algorithm is applicable to various definitions of“density”and can accommodate diverse requirements on the number of edges.When integrated with existing static densest subgraph detection algorithms,it achieves scalability and computational efficiency.Theoretical analysis demonstrates that the optimal density of the densest k-subgraphs extracted by the proposed algorithm reaches 0.9.To evaluate the performance of the algorithm,experiments were conducted on four billion-scale datasets:Friendster,Orkut,YouTube,and DBLP.The results indicate that the proposed algorithm outperforms static methods in both runtime efficiency and subgraph quality on large-scale dynamic graphs. 展开更多
关键词 the densest k-subgraph FEATURES heuristic approximation algorithm optimal density
在线阅读 下载PDF
Gekko Japonicus Algorithm:A Novel Nature-inspired Algorithm for Engineering Problems and Path Planning
3
作者 Ke Zhang Hongyang Zhao +2 位作者 Xingdong Li Chengjin Fu Jing Jin 《Journal of Bionic Engineering》 2026年第1期431-471,共41页
This paper introduces a novel nature-inspired metaheuristic algorithm called the Gekko japonicus algorithm.The algo-rithm draws inspiration mainly from the predation strategies and survival behaviors of the Gekko japo... This paper introduces a novel nature-inspired metaheuristic algorithm called the Gekko japonicus algorithm.The algo-rithm draws inspiration mainly from the predation strategies and survival behaviors of the Gekko japonicus.The math-ematical model is developed by simulating various biological behaviors of the Gekko japonicus,such as hybrid loco-motion patterns,directional olfactory guidance,implicit group advantage tendencies,and the tail autotomy mechanism.By integrating multi-stage mutual constraints and dynamically adjusting parameters,GJA maintains an optimal balance between global exploration and local exploitation,thereby effectively solving complex optimization problems.To assess the performance of GJA,comparative analyses were performed against fourteen state-of-the-art metaheuristic algorithms using the CEC2017 and CEC2022 benchmark test sets.Additionally,a Friedman test was performed on the experimen-tal results to assess the statistical significance of differences between various algorithms.And GJA was evaluated using multiple qualitative indicators,further confirming its superiority in exploration and exploitation.Finally,GJA was utilized to solve four engineering optimization problems and further implemented in robotic path planning to verify its practical applicability.Experimental results indicate that,compared to other high-performance algorithms,GJA demonstrates excep-tional performance as a powerful optimization algorithm in complex optimization problems.We make the code publicly available at:https://github.com/zhy1109/Gekko-japonicusalgorithm. 展开更多
关键词 Gekko japonicus algorithm Metaheuristic algorithm Exploration and exploitation Engineering optimization Path planning
在线阅读 下载PDF
Information Diffusion Models and Fuzzing Algorithms for a Privacy-Aware Data Transmission Scheduling in 6G Heterogeneous ad hoc Networks
4
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computer Modeling in Engineering & Sciences》 2026年第2期1214-1234,共21页
In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic h... In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic heterogeneous infrastructures,unstable links and non-uniform hardware capabilities create critical issues regarding security and privacy.Traditional protocols are often too computationally heavy to allow 6G services to achieve their expected Quality-of-Service(QoS).As the transport network is built of ad hoc nodes,there is no guarantee about their trustworthiness or behavior,and transversal functionalities are delegated to the extreme nodes.However,while security can be guaranteed in extreme-to-extreme solutions,privacy cannot,as all intermediate nodes still have to handle the data packets they are transporting.Besides,traditional schemes for private anonymous ad hoc communications are vulnerable against modern intelligent attacks based on learning models.The proposed scheme fulfills this gap.Findings show the probability of a successful intelligent attack reduces by up to 65%compared to ad hoc networks with no privacy protection strategy when used the proposed technology.While congestion probability can remain below 0.001%,as required in 6G services. 展开更多
关键词 6G networks ad hoc networks PRIVACY scheduling algorithms diffusion models fuzzing algorithms
在线阅读 下载PDF
Integrated diagnosis of abnormal energy consumption in converter steelmaking using GWO-SVM-K-means algorithms
5
作者 Fei-Xiang Dai Xiang-Jun Bao +2 位作者 Lu Zhang Xiao-Jing Yang Guang Chen 《Journal of Iron and Steel Research International》 2026年第1期458-468,共11页
To address the issue of abnormal energy consumption fluctuations in the converter steelmaking process,an integrated diagnostic method combining the gray wolf optimization(GWO)algorithm,support vector machine(SVM),and ... To address the issue of abnormal energy consumption fluctuations in the converter steelmaking process,an integrated diagnostic method combining the gray wolf optimization(GWO)algorithm,support vector machine(SVM),and K-means clustering was proposed.Eight input parameters—derived from molten iron conditions and external factors—were selected as feature variables.A GWO-SVM model was developed to accurately predict the energy consumption of individual heats.Based on the prediction results,the mean absolute percentage error and maximum relative error of the test set were employed as criteria to identify heats with abnormal energy usage.For these heats,the K-means clustering algorithm was used to determine benchmark values of influencing factors from similar steel grades,enabling root-cause diagnosis of excessive energy consumption.The proposed method was applied to real production data from a converter in a steel plant.The analysis reveals that heat sample No.44 exhibits abnormal energy consumption,due to gas recovery being 1430.28 kg of standard coal below the benchmark level.A secondary contributing factor is a steam recovery shortfall of 237.99 kg of standard coal.This integrated approach offers a scientifically grounded tool for energy management in converter operations and provides valuable guidance for optimizing process parameters and enhancing energy efficiency. 展开更多
关键词 Converter smelting process Abnormal energy diagnosis Gray wolf optimization algorithm Support vector machine k-means clustering algorithm
原文传递
Optimizing Resource Allocation in Blockchain Networks Using Neural Genetic Algorithm
6
作者 Malvinder Singh Bali Weiwei Jiang +2 位作者 Saurav Verma Kanwalpreet Kour Ashwini Rao 《Computers, Materials & Continua》 2026年第2期1580-1598,共19页
In recent years,Blockchain Technology has become a paradigm shift,providing Transparent,Secure,and Decentralized platforms for diverse applications,ranging from Cryptocurrency to supply chain management.Nevertheless,t... In recent years,Blockchain Technology has become a paradigm shift,providing Transparent,Secure,and Decentralized platforms for diverse applications,ranging from Cryptocurrency to supply chain management.Nevertheless,the optimization of blockchain networks remains a critical challenge due to persistent issues such as latency,scalability,and energy consumption.This study proposes an innovative approach to Blockchain network optimization,drawing inspiration from principles of biological evolution and natural selection through evolutionary algorithms.Specifically,we explore the application of genetic algorithms,particle swarm optimization,and related evolutionary techniques to enhance the performance of blockchain networks.The proposed methodologies aim to optimize consensus mechanisms,improve transaction throughput,and reduce resource consumption.Through extensive simulations and real-world experiments,our findings demonstrate significant improvements in network efficiency,scalability,and stability.This research offers a thorough analysis of existing optimization techniques,introduces novel strategies,and assesses their efficacy based on empirical outputs. 展开更多
关键词 Blockchain technology energy efficiency environmental impact evolutionary algorithms optimization
在线阅读 下载PDF
Design of Consensus Algorithm for UAV Swarm Identity Authentication Based on Lightweight Blockchain
7
作者 Yuji Sang Lijun Liu +2 位作者 Long Lv Husheng Wu Hemin Yin 《Computers, Materials & Continua》 2026年第5期639-663,共25页
Aiming at the challenges of low throughput,excessive consensus latency and high communication complexity in the Practical Byzantine Fault Tolerance(PBFT)algorithm in blockchain networks,its application in identity ver... Aiming at the challenges of low throughput,excessive consensus latency and high communication complexity in the Practical Byzantine Fault Tolerance(PBFT)algorithm in blockchain networks,its application in identity verification for distributed networking of a drone cluster is limited.Therefore,a lightweight blockchainbased identity authentication model for UAV swarms is designed,and a Credit-score and Grouping-mechanism Practical Byzantine Fault Tolerance(CG-PBFT)algorithm is proposed.CG-PBFT introduces a reputation score evaluation mechanism,classifies the reputation levels of nodes in the network,and optimizes the consensus process based on grouping consensus and BLS aggregate signature technology.Experimental results demonstrate that under identical experimental conditions,compared with the PBFT algorithm,CG-PBFT achieves a 250%increase in average throughput,a 70%reduction in average latency,and simultaneous enhancement in security,thus making it more suitable for UAV swarm networks. 展开更多
关键词 UAV swarm network blockchain PBFT consensus algorithm credit score
在线阅读 下载PDF
Equivalent Modeling with Passive Filter Parameter Clustering for Photovoltaic Power Stations Based on a Particle Swarm Optimization K-Means Algorithm
8
作者 Binjiang Hu Yihua Zhu +3 位作者 Liang Tu Zun Ma Xian Meng Kewei Xu 《Energy Engineering》 2026年第1期431-459,共29页
This paper proposes an equivalent modeling method for photovoltaic(PV)power stations via a particle swarm optimization(PSO)K-means clustering(KMC)algorithm with passive filter parameter clustering to address the compl... This paper proposes an equivalent modeling method for photovoltaic(PV)power stations via a particle swarm optimization(PSO)K-means clustering(KMC)algorithm with passive filter parameter clustering to address the complexities,simulation time cost and convergence problems of detailed PV power station models.First,the amplitude–frequency curves of different filter parameters are analyzed.Based on the results,a grouping parameter set for characterizing the external filter characteristics is established.These parameters are further defined as clustering parameters.A single PV inverter model is then established as a prerequisite foundation.The proposed equivalent method combines the global search capability of PSO with the rapid convergence of KMC,effectively overcoming the tendency of KMC to become trapped in local optima.This approach enhances both clustering accuracy and numerical stability when determining equivalence for PV inverter units.Using the proposed clustering method,both a detailed PV power station model and an equivalent model are developed and compared.Simulation and hardwarein-loop(HIL)results based on the equivalent model verify that the equivalent method accurately represents the dynamic characteristics of PVpower stations and adapts well to different operating conditions.The proposed equivalent modeling method provides an effective analysis tool for future renewable energy integration research. 展开更多
关键词 Photovoltaic power station multi-machine equivalentmodeling particle swarmoptimization k-means clustering algorithm
在线阅读 下载PDF
Improved Cuckoo Search Algorithm for Engineering Optimization Problems
9
作者 Shao-Qiang Ye Azlan Mohd Zain Yusliza Yusoff 《Computers, Materials & Continua》 2026年第4期1607-1631,共25页
Engineering optimization problems are often characterized by high dimensionality,constraints,and complex,multimodal landscapes.Traditional deterministic methods frequently struggle under such conditions,prompting incr... Engineering optimization problems are often characterized by high dimensionality,constraints,and complex,multimodal landscapes.Traditional deterministic methods frequently struggle under such conditions,prompting increased interest in swarm intelligence algorithms.Among these,the Cuckoo Search(CS)algorithm stands out for its promising global search capabilities.However,it often suffers from premature convergence when tackling complex problems.To address this limitation,this paper proposes a Grouped Dynamic Adaptive CS(GDACS)algorithm.Theenhancements incorporated intoGDACS can be summarized into two key aspects.Firstly,a chaotic map is employed to generate initial solutions,leveraging the inherent randomness of chaotic sequences to ensure a more uniform distribution across the search space and enhance population diversity from the outset.Secondly,Cauchy and Levy strategies replace the standard CS population update.This strategy involves evaluating the fitness of candidate solutions to dynamically group the population based on performance.Different step-size adaptation strategies are then applied to distinct groups,enabling an adaptive search mechanism that balances exploration and exploitation.Experiments were conducted on six benchmark functions and four constrained engineering design problems,and the results indicate that the proposed GDACS achieves good search efficiency and produces more accurate optimization results compared with other state-of-the-art algorithms. 展开更多
关键词 Cuckoo search algorithm chaotic transformation population division adaptive update strategy Cauchy distribution
在线阅读 下载PDF
A Workflow Scheduling Method Based on the Combination of Tunicate Swarm Algorithm and Highest Response Ratio Next Scheduling
10
作者 Yujie Tian Ming Zhu +2 位作者 Jing Li Cong Liu Ziyang Zhang 《Computers, Materials & Continua》 2026年第5期1950-1963,共14页
Workflow scheduling is critical for efficient cloud resource management.This paper proposes Tunicate Swarm-Highest Response Ratio Next,a novel scheduler that synergistically combines the Tunicate Swarm Algorithm with ... Workflow scheduling is critical for efficient cloud resource management.This paper proposes Tunicate Swarm-Highest Response Ratio Next,a novel scheduler that synergistically combines the Tunicate Swarm Algorithm with the Highest Response Ratio Next policy.The Tunicate Swarm Algorithm generates a cost-minimizing task-to-VM mapping scheme,while the Highest Response Ratio Next dynamically dispatches tasks in the ready queue with the highest-priority.Experimental results demonstrate that the Tunicate Swarm-Highest Response RatioNext reduces costs by up to 94.8%compared to meta-heuristic baselines.It also achieves competitive cost efficiency vs.a learning-based method while offering superior operational simplicity and efficiency,establishing it as a highly practical solution for dynamic cloud environments. 展开更多
关键词 Workflow scheduling cloud computing tunicate swarm algorithm highest response ratio next scheduling
在线阅读 下载PDF
SSA*-PDWA:A Hierarchical Path Planning Framework with Enhanced A*Algorithm and Dynamic Window Approach for Mobile Robots
11
作者 Lishu Qin Yu Gao Xinyuan Lu 《Computers, Materials & Continua》 2026年第4期2069-2094,共26页
With the rapid development of intelligent navigation technology,efficient and safe path planning for mobile robots has become a core requirement.To address the challenges of complex dynamic environments,this paper pro... With the rapid development of intelligent navigation technology,efficient and safe path planning for mobile robots has become a core requirement.To address the challenges of complex dynamic environments,this paper proposes an intelligent path planning framework based on grid map modeling.First,an improved Safe and Smooth A*(SSA*)algorithm is employed for global path planning.By incorporating obstacle expansion and cornerpoint optimization,the proposed SSA*enhances the safety and smoothness of the planned path.Then,a Partitioned Dynamic Window Approach(PDWA)is integrated for local planning,which is triggered when dynamic or sudden static obstacles appear,enabling real-time obstacle avoidance and path adjustment.A unified objective function is constructed,considering path length,safety,and smoothness comprehensively.Multiple simulation experiments are conducted on typical port grid maps.The results demonstrate that the improved SSA*significantly reduces the number of expanded nodes and computation time in static environmentswhile generating smoother and safer paths.Meanwhile,the PDWA exhibits strong real-time performance and robustness in dynamic scenarios,achieving shorter paths and lower planning times compared to other graph search algorithms.The proposedmethodmaintains stable performance across maps of different scales and various port scenarios,verifying its practicality and potential for wider application. 展开更多
关键词 Dynamic window approach improved A*algorithm dynamic path planning trajectory optimization
在线阅读 下载PDF
Optimization of the frequency offset increment of FDA-MIMO based on cuckoo search algorithm
12
作者 WANG Bo ZHAO Yu +2 位作者 LI Yonglin YANG Rennong XUE Junjie 《Journal of Systems Engineering and Electronics》 2026年第1期157-170,共14页
Frequency diverse array multiple-input multiple-output(FDA-MIMO)radar has gained considerable research attention due to its ability to effectively counter active repeater deception jamming in complex electromagnetic e... Frequency diverse array multiple-input multiple-output(FDA-MIMO)radar has gained considerable research attention due to its ability to effectively counter active repeater deception jamming in complex electromagnetic environments.The effectiveness of interference suppression by FDA-MIMO is limited by the inherent range-angle coupling issue in the FDA beampattern.Existing literature primarily focuses on control methods for FDA-MIMO radar beam direction under the assumption of static beampatterns,with insufficient exploration of techniques for managing nonstationary beam directions.To address this gap,this paper initially introduces the FDA-MIMO signal model and the calculation formula for the FDA-MIMO array output using the minimum variance distortionless response(MVDR)beamformer.Building on this,the problem of determining the optimal frequency offset for the FDA is rephrased as a convex optimization problem,which is then resolved using the cuckoo search(CS)algorithm.Simulations confirm the effectiveness of the proposed approach,showing that the frequency offsets obtained through the CS algorithm can create a dot-shaped beam direction at the target location while effectively suppressing interference signals within the mainlobe. 展开更多
关键词 frequency diverse array multiple-input multiple-output(FDA-MIMO) convex optimization cuckoo search algorithm beampattern
在线阅读 下载PDF
Fault Self-Healing Cooperative Strategy of New Energy Distribution Network Based on Improved Ant Colony-Genetic Hybrid Algorithm
13
作者 Fengchao Chen Aoqi Mei +2 位作者 Zheng Liu Ruhao Wu Qiwei Li 《Energy Engineering》 2026年第4期247-267,共21页
With the high proportion of new energy access,the traditional fault self-healing mechanism of the distribution network is challenged.Aiming at the demand for fast recovery of new distribution network faults,this paper... With the high proportion of new energy access,the traditional fault self-healing mechanism of the distribution network is challenged.Aiming at the demand for fast recovery of new distribution network faults,this paper proposes a fault self-healing cooperative strategy for the new energy distribution network based on an improved ant colony-genetic hybrid algorithm.Firstly,the graph theory adjacency matrix is used to characterize the topology of the distribution network,and the dynamic positioning of new energy nodes is realized.Secondly,based on the output model and load characteristic model of wind,photovoltaic,and energy storage,a two-layer cooperative self-healing model of the distribution network is constructed.The upper layer is based on the improved depth-breadth hybrid search(DFS-BFS)to divide the island,with the maximum weight load recovery and the minimum number of switching actions as the goal,combined with the load priority to dynamically restore the key load.The lower layer uses the improved ant colony-genetic hybrid algorithm to solve the fault recovery path with the minimum total power loss load and the minimum network loss as the goal,generate the optimal switching sequence,and verify the power flow constraints.Finally,the simulation results based on the IEEE 33-bus system show that the proposed method can guarantee the power supply of key loads in the distribution network with high-tech energy penetration,restore the power supply of more load nodes with the least switching operation,and effectively reduce the line loss,which verifies the effectiveness and superiority of the method. 展开更多
关键词 Fault recovery identification of topology improved ant colony-genetic hybrid algorithm distribution network self-healing
在线阅读 下载PDF
Study on the destabilizing damage precursors of cemented tailings backfill based on critical slowing down theory combined with multiple denoising algorithms under consideration of initial defect conditions
14
作者 ZHAO Kang ZHONG Jun-cheng +3 位作者 YAN Ya-jing LIU Yang WEN Dao-tan XIAO Wei-ling 《Journal of Central South University》 2026年第1期375-399,共25页
The cemented tailings backfill(CTB)with initial defects is more prone to destabilization damage under the influence of various unfavorable factors during the mining process.In order to investigate its influence on the... The cemented tailings backfill(CTB)with initial defects is more prone to destabilization damage under the influence of various unfavorable factors during the mining process.In order to investigate its influence on the stability of underground mining engineering,this paper simulates the generation of different degrees of initial defects inside the CTB by adding different contents of air-entraining agent(AEA),investigates the acoustic emission RA/AF eigenvalues of CTB with different contents of AEA under uniaxial compression,and adopts various denoising algorithms(e.g.,moving average smoothing,median filtering,and outlier detection)to improve the accuracy of the data.The variance and autocorrelation coefficients of RA/AF parameters were analyzed in conjunction with the critical slowing down(CSD)theory.The results show that the acoustic emission RA/AF values can be used to characterize the progressive damage evolution of CTB.The denoising algorithm processed the AE signals to reduce the effects of extraneous noise and anomalous spikes.Changes in the variance curves provide clear precursor information,while abrupt changes in the autocorrelation coefficient can be used as an auxiliary localization warning signal.The phenomenon of dramatic increase in the variance and autocorrelation coefficient curves during the compression-tightening stage,which is influenced by the initial defects,can lead to false warnings.As the initial defects of the CTB increase,its instability precursor time and instability time are prolonged,the peak stress decreases,and the time difference between the CTB and the instability damage is smaller.The results provide a new method for real-time monitoring and early warning of CTB instability damage. 展开更多
关键词 initial defects cemented tailings backfill critical slowing down acoustic emission RA/AF values denoising algorithms
在线阅读 下载PDF
Energy Aware Task Scheduling of IoT Application Using a Hybrid Metaheuristic Algorithm in Cloud Computing
15
作者 Ahmed Awad Mohamed Eslam Abdelhakim Seyam +4 位作者 Ahmed R.Elsaeed Laith Abualigah Aseel Smerat Ahmed M.AbdelMouty Hosam E.Refaat 《Computers, Materials & Continua》 2026年第3期1786-1803,共18页
In recent years,fog computing has become an important environment for dealing with the Internet of Things.Fog computing was developed to handle large-scale big data by scheduling tasks via cloud computing.Task schedul... In recent years,fog computing has become an important environment for dealing with the Internet of Things.Fog computing was developed to handle large-scale big data by scheduling tasks via cloud computing.Task scheduling is crucial for efficiently handling IoT user requests,thereby improving system performance,cost,and energy consumption across nodes in cloud computing.With the large amount of data and user requests,achieving the optimal solution to the task scheduling problem is challenging,particularly in terms of cost and energy efficiency.In this paper,we develop novel strategies to save energy consumption across nodes in fog computing when users execute tasks through the least-cost paths.Task scheduling is developed using modified artificial ecosystem optimization(AEO),combined with negative swarm operators,Salp Swarm Algorithm(SSA),in order to competitively optimize their capabilities during the exploitation phase of the optimal search process.In addition,the proposed strategy,Enhancement Artificial Ecosystem Optimization Salp Swarm Algorithm(EAEOSSA),attempts to find the most suitable solution.The optimization that combines cost and energy for multi-objective task scheduling optimization problems.The backpack problem is also added to improve both cost and energy in the iFogSim implementation as well.A comparison was made between the proposed strategy and other strategies in terms of time,cost,energy,and productivity.Experimental results showed that the proposed strategy improved energy consumption,cost,and time over other algorithms.Simulation results demonstrate that the proposed algorithm increases the average cost,average energy consumption,and mean service time in most scenarios,with average reductions of up to 21.15%in cost and 25.8%in energy consumption. 展开更多
关键词 Energy-efficient tasks internet of things(IoT) cloud fog computing artificial ecosystem-based optimization salp swarm algorithm cloud computing
在线阅读 下载PDF
An Overall Optimization Model Using Metaheuristic Algorithms for the CNN-Based IoT Attack Detection Problem
16
作者 Le Thi Hong Van Le Duc Thuan +1 位作者 Pham Van Huong Nguyen Hieu Minh 《Computers, Materials & Continua》 2026年第4期1934-1964,共31页
Optimizing convolutional neural networks(CNNs)for IoT attack detection remains a critical yet challenging task due to the need to balance multiple performance metrics beyond mere accuracy.This study proposes a unified... Optimizing convolutional neural networks(CNNs)for IoT attack detection remains a critical yet challenging task due to the need to balance multiple performance metrics beyond mere accuracy.This study proposes a unified and flexible optimization framework that leverages metaheuristic algorithms to automatically optimize CNN configurations for IoT attack detection.Unlike conventional single-objective approaches,the proposed method formulates a global multi-objective fitness function that integrates accuracy,precision,recall,and model size(speed/model complexity penalty)with adjustable weights.This design enables both single-objective and weightedsum multi-objective optimization,allowing adaptive selection of optimal CNN configurations for diverse deployment requirements.Two representativemetaheuristic algorithms,GeneticAlgorithm(GA)and Particle Swarm Optimization(PSO),are employed to optimize CNNhyperparameters and structure.At each generation/iteration,the best configuration is selected as themost balanced solution across optimization objectives,i.e.,the one achieving themaximum value of the global objective function.Experimental validation on two benchmark datasets,Edge-IIoT and CIC-IoT2023,demonstrates that the proposed GA-and PSO-based models significantly enhance detection accuracy(94.8%–98.3%)and generalization compared with manually tuned CNN configurations,while maintaining compact architectures.The results confirm that the multi-objective framework effectively balances predictive performance and computational efficiency.This work establishes a generalizable and adaptive optimization strategy for deep learning-based IoT attack detection and provides a foundation for future hybrid metaheuristic extensions in broader IoT security applications. 展开更多
关键词 Genetic algorithm(GA) particle swarm optimization(PSO) multi-objective optimization convolutional neural network—CNN IoT attack detection metaheuristic optimization CNN configuration
在线阅读 下载PDF
基于改进粒子群K-means的道路状态识别聚类算法
17
作者 徐韬 任其亮 +1 位作者 李金宴 林伟 《重庆交通大学学报(自然科学版)》 北大核心 2026年第2期47-56,共10页
针对传统K均值聚类算法(K-means)受到初始聚类中心影响导致聚类精度波动问题,提出了基于改进粒子群(PSO)的组合聚类算法。在道路运行速度一维原始数据上,增加相对速度比αt、速度波动率βt这2个特征,建立新的三维数据集;在分布式延迟粒... 针对传统K均值聚类算法(K-means)受到初始聚类中心影响导致聚类精度波动问题,提出了基于改进粒子群(PSO)的组合聚类算法。在道路运行速度一维原始数据上,增加相对速度比αt、速度波动率βt这2个特征,建立新的三维数据集;在分布式延迟粒子群算法(RODDPSO)基础上,提出改进RODDPSO算法(IRODDPSO算法),引入了粒子最大速度非线性约束函数,随着迭代次数增加,粒子最大更新速度逐步非线性衰减,根据每轮迭代的进化特征值ξ确定不同的粒子更新策略;利用IRODDPSO算法产生K-means初始化聚类中心,利用PSO算法全局搜索能力,寻找出最优初始化聚类中心。研究结果表明:IRODDPSO算法可成功应用在城市道路运行状态聚类分析中,组合算法的准确率、召回率分别为0.935、0.957,较RODDPSO算法分别提升了4.8%、3.6%,较基准PSO算法提升13.2%、11.1%,运行时耗分别下降了6.7%、16.3%;所提出的最大速度非线性约束策略提升了算法收敛能力,并且在快速路、主干路等不同等级道路中表现出良好的稳健性。 展开更多
关键词 交通工程 粒子群算法 k均值聚类算法 非线性速度约束 分布式延迟 道路状态识别
在线阅读 下载PDF
面向流形数据的共享近邻和二阶K近邻密度峰值聚类算法
18
作者 赵嘉 陈蔚昌 +3 位作者 肖人彬 潘正祥 崔志华 王晖 《控制理论与应用》 北大核心 2026年第2期388-396,共9页
密度峰值聚类算法能够快速高效处理数据集且无需迭代.但该算法在处理流形数据时,易错选类簇中心和错误分配样本.因此,本文提出面向流形数据的共享近邻和二阶K近邻密度峰值聚类(DPC–SKNN)算法.首先,该算法引入逆近邻和共享近邻重新定义... 密度峰值聚类算法能够快速高效处理数据集且无需迭代.但该算法在处理流形数据时,易错选类簇中心和错误分配样本.因此,本文提出面向流形数据的共享近邻和二阶K近邻密度峰值聚类(DPC–SKNN)算法.首先,该算法引入逆近邻和共享近邻重新定义局部密度,充分考虑样本的局部信息和全局信息,使算法易找到正确的流形类簇中心;其次,将样本的关联关系分为K近邻点、二阶K近邻点和非近邻点3种情况,设计K近邻的分配策略,增强同一类簇样本的相似性,提高样本分配的准确率.将本文算法与8种算法在流形和UCI数据集进行对比,实验结果表明,DPC-SKNN算法在上述数据集上均获得了不错的聚类结果. 展开更多
关键词 密度峰值聚类 逆近邻 共享近邻 二阶k近邻 流形数据
在线阅读 下载PDF
多k位数阈值的谓词加密方案
19
作者 李婷 陈振华 《计算机应用与软件》 北大核心 2026年第1期338-347,共10页
现有支持比较大小的谓词加密方案没有考虑属性值的排序位置,且大多数方案没有实现更强的隐私性——属性隐藏。针对这两个问题,提出一种具有属性隐藏的多k位数阈值谓词加密方案。设计一种新的编码,将多个排序后的属性值和多个阈值的比较... 现有支持比较大小的谓词加密方案没有考虑属性值的排序位置,且大多数方案没有实现更强的隐私性——属性隐藏。针对这两个问题,提出一种具有属性隐藏的多k位数阈值谓词加密方案。设计一种新的编码,将多个排序后的属性值和多个阈值的比较大小转化为多内积问题;采用对偶向量空间上的内积加密技术,构造随机数等式实现多内积问题;构造属性盲化方法实现属性隐藏。安全性证明和性能分析表明,所提方案在标准模型下是可以抵抗选择明文攻击的,且具备较好的存储性能。 展开更多
关键词 谓词加密 k 位数阈值 比较大小 属性隐藏
在线阅读 下载PDF
利用二阶k近邻构造微簇的过采样方法
20
作者 孟东霞 柳凌燕 魏晓光 《统计与决策》 北大核心 2026年第3期46-51,共6页
为了解决少数类样本在不平衡数据集中分类准确率较低的问题,文章提出一种利用少数类样本的二阶k近邻构造微簇,并在微簇内进行过采样的数据处理方法。二阶k近邻是样本近邻关系的扩展,能更准确地衡量样本在局部结构关系中的影响力。微簇... 为了解决少数类样本在不平衡数据集中分类准确率较低的问题,文章提出一种利用少数类样本的二阶k近邻构造微簇,并在微簇内进行过采样的数据处理方法。二阶k近邻是样本近邻关系的扩展,能更准确地衡量样本在局部结构关系中的影响力。微簇的划分反映了少数类样本的相似程度,微簇内生成的新样本降低了对少数类原始内在分布结构的影响。该方法先计算少数类样本在整个数据集中的k近邻,移除k近邻均属于多数类的噪声样本,在获得剩余样本的二阶k近邻后再计算样本的局部密度,依据局部密度和近邻关系构造少数类样本的微簇,并在微簇中生成新样本。通过对比实验比较了八种过采样方法在两组人工数据集上生成新样本的分布情况,并使用支持向量机对经过平衡处理的十组数据集进行了分类,结果表明,在所提方法构造的平衡数据集中,少数类样本的分类准确率较高,数据集的整体分类效果较好,验证了所提方法的有效性。 展开更多
关键词 二阶k近邻 不平衡数据 过采样
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部