期刊文献+
共找到282,855篇文章
< 1 2 250 >
每页显示 20 50 100
Regulating Algorithmic Online Manipulation in the Digital Market-Responses of the EU and China
1
作者 Gu Chenhao Wu Qian 《科技与法律(中英文)》 2025年第2期138-148,共11页
The original intention of the algorithmic recommender system is to grapple with the negative impacts caused by information overload,but the system also can be used as"hypernudge",a new form of online manipul... The original intention of the algorithmic recommender system is to grapple with the negative impacts caused by information overload,but the system also can be used as"hypernudge",a new form of online manipulation,to inten⁃tionally exploit people's cognitive and decision-making gaps to influence their decisions in practice,which is particu⁃larly detrimental to the sustainable development of the digital market.Limiting harmful algorithmic online manipula⁃tion in digital markets has become a challenging task.Globally,both the EU and China have responded to this issue,and the differences between them are so evident that their governance measures can serve as the typical case.The EU focuses on improving citizens'digital literacy and their ability to integrate into digital social life to independently ad⁃dress this issue,and expects to address harmful manipulation behavior through binding and applicable hard law,which is part of the digital strategy.By comparison,although there exist certain legal norms that have made relevant stipula⁃tions on manipulation issues,China continues to issue specific departmental regulations to regulate algorithmic recom⁃mender services,and pays more attention to addressing collective harm caused by algorithmic online manipulation through a multiple co-governance approach led by the government or industry associations to implement supervision. 展开更多
关键词 algorithm MANIPULATION digital market the EU China
在线阅读 下载PDF
Artificial intelligence in the service of entrepreneurial finance:knowledge structure and the foundational algorithmic paradigm
2
作者 Robert Kudelić Tamara Šmaguc Sherry Robinson 《Financial Innovation》 2025年第1期2021-2063,共43页
The study conducts a bibliometric review of artificial intelligence applications in two areas:the entrepreneurial finance literature,and the corporate finance literature with implications for entrepreneurship.A rigoro... The study conducts a bibliometric review of artificial intelligence applications in two areas:the entrepreneurial finance literature,and the corporate finance literature with implications for entrepreneurship.A rigorous search and screening of the web of science core collection identified 1,890 journal articles for analysis.The bibliometrics provide a detailed view of the knowledge field,indicating underdeveloped research directions.An important contribution comes from insights through artificial intelligence methods in entrepreneurship.The results demonstrate a high representation of artificial neural networks,deep neural networks,and support vector machines across almost all identified topic niches.In contrast,applications of topic modeling,fuzzy neural networks,and growing hierarchical self-organizing maps are rare.Additionally,we take a broader view by addressing the problem of applying artificial intelligence in economic science.Specifically,we present the foundational paradigm and a bespoke demonstration of the Monte Carlo randomized algorithm. 展开更多
关键词 BIBLIOMETRICS Artificial intelligence ENTREPRENEURSHIP FINANCE Randomized algorithm
在线阅读 下载PDF
Energy focusing of flexural waves via algorithmically optimized coding metasurface lenses
3
作者 Zi-Rui Wang Di-Chao Chen +1 位作者 Rui Hong Da-Jian Wu 《Chinese Physics B》 2025年第9期277-282,共6页
Efficient elastic wave focusing is crucial in materials and physical engineering.Elastic coding metasurfaces,which are innovative planar artificial structures,show great potential for use in the field of wave focusing... Efficient elastic wave focusing is crucial in materials and physical engineering.Elastic coding metasurfaces,which are innovative planar artificial structures,show great potential for use in the field of wave focusing.However,elastic coding lenses(ECLs)still suffer from low focusing performance,thickness comparable to wavelength,and frequency sensitivity.Here,we consider both the structural and material properties of the coding unit,thus realizing further compression of the thickness of the ECL.We chose the simplest ECL,which consists of only two encoding units.The coding unit 0 is a straight structure constructed using a carbon fiber reinforced composite material,and the coding unit 1 is a zigzag structure constructed using an aluminum material,and the thickness of the ECL constructed using them is only 1/8 of the wavelength.Based on the theoretical design,the arrangement of coding units is further optimized using genetic algorithms,which significantly improves the focusing performance of the lens at different focus and frequencies.This study provides a more effective way to control vibration and noise in advanced structures. 展开更多
关键词 coding metasurface elastic wave focusing genetic algorithm
原文传递
Algorithmic opacity and employees’knowledge hiding:medication by job insecurity and moderation by employee-AI collaboration
4
作者 Chunhong Guo Huifang Liu Jingfu Guo 《Journal of Psychology in Africa》 2025年第3期411-418,共8页
We explored the effects of algorithmic opacity on employees’playing dumb and evasive hiding rather than rationalized hiding.We examined the mediating role of job insecurity and the moderating role of employee-AI coll... We explored the effects of algorithmic opacity on employees’playing dumb and evasive hiding rather than rationalized hiding.We examined the mediating role of job insecurity and the moderating role of employee-AI collaboration.Participants were 421 full-time employees(female=46.32%,junior employees=31.83%)from a variety of organizations and industries that interact with AI.Employees filled out data on algorithm opacity,job insecurity,knowledge hiding,employee-AI collaboration,and control variables.The results of the structural equation modeling indicated that algorithm opacity exacerbated employees’job insecurity,and job insecurity mediated between algorithm opacity and playing dumb and evasive hiding rather than rationalized hiding.The relationship between algorithmic opacity and playing dumb and evasive hiding was more positive when the level of employee-AI collaboration was higher.These findings suggest that employee-AI collaboration reinforces the indirect relationship between algorithmic opacity and playing dumb and evasive hiding.Our study contributes to research on human and AI collaboration by exploring the dark side of employee-AI collaboration. 展开更多
关键词 algorithmic opacity job insecurity knowledge hiding employee-AI collaboration
在线阅读 下载PDF
Algorithmic crypto trading using information‑driven bars,triple barrier labeling and deep learning
5
作者 Przemysław Grądzki Piotr Wojcik Stefan Lessmann 《Financial Innovation》 2025年第1期3979-4021,共43页
This paper investigates the optimization of data sampling and target labeling techniques to enhance algorithmic trading strategies in cryptocurrency markets,focusing on Bitcoin(BTC)and Ethereum(ETH).Traditional data s... This paper investigates the optimization of data sampling and target labeling techniques to enhance algorithmic trading strategies in cryptocurrency markets,focusing on Bitcoin(BTC)and Ethereum(ETH).Traditional data sampling methods,such as time bars,often fail to capture the nuances of the continuously active and highly volatile cryptocurrency market and force traders to wait for arbitrary points in time.To address this,we propose an alternative approach using information-driven sampling methods,including the CUSUM filter,range bars,volume bars,and dollar bars,and evaluate their performance using tick-level data from January 2018 to June 2023.Additionally,we introduce the Triple Barrier method for target labeling,which offers a solution tailored for algorithmic trading as opposed to the widely used next-bar prediction.We empirically assess the effectiveness of these data sampling and labeling methods to craft profitable trading strategies.The results demonstrate that the innovative combination of CUSUM-filtered data with Triple Barrier labeling outperforms traditional time bars and next-bar prediction,achieving consistently positive trading performance even after accounting for transaction costs.Moreover,our system enables making trading decisions at any point in time on the basis of market conditions,providing an advantage over traditional methods that rely on fixed time intervals.Furthermore,the paper contributes to the ongoing debate on the applicability of Transformer models to time series classification in the context of algorithmic trading by evaluating various Transformer architectures—including the vanilla Transformer encoder,FEDformer,and Autoformer—alongside other deep learning architectures and classical machine learning models,revealing insights into their relative performance. 展开更多
关键词 Cryptocurrencies algorithmic trading Deep learning Information-driven bars Triple barrier method
在线阅读 下载PDF
Research on the Responsibility Traceability Mechanism Based on AI and the Application Boundary of Algorithmic Ethics in Medical Decision Making
6
作者 Baochen Huang Zhikai Huang 《Proceedings of Business and Economic Studies》 2025年第4期280-298,共19页
With the rapid advancement of medical artificial intelligence(AI)technology,particularly the widespread adoption of AI diagnostic systems,ethical challenges in medical decision-making have garnered increasing attentio... With the rapid advancement of medical artificial intelligence(AI)technology,particularly the widespread adoption of AI diagnostic systems,ethical challenges in medical decision-making have garnered increasing attention.This paper analyzes the limitations of algorithmic ethics in medical decision-making and explores accountability mechanisms,aiming to provide theoretical support for ethically informed medical practices.The study highlights how the opacity of AI algorithms complicates the definition of decision-making responsibility,undermines doctor-patient trust,and affects informed consent.By thoroughly investigating issues such as the algorithmic“black box”problem and data privacy protection,we develop accountability assessment models to address ethical concerns related to medical resource allocation.Furthermore,this research examines the effective implementation of AI diagnostic systems through case studies of both successful and unsuccessful applications,extracting lessons on accountability mechanisms and response strategies.Finally,we emphasize that establishing a transparent accountability framework is crucial for enhancing the ethical standards of medical AI systems and protecting patients’rights and interests. 展开更多
关键词 algorithmic ethics Medical decision-making Liability tracing Medical AI Patient rights protection
暂未订购
Non-Neural 3D Nasal Reconstruction:A Sparse Landmark Algorithmic Approach for Medical Applications
7
作者 Nguyen Khac Toan Ho Nguyen Anh Tuan Nguyen Truong Thinh 《Computer Modeling in Engineering & Sciences》 2025年第5期1273-1295,共23页
This paper presents a novel method for reconstructing a highly accurate 3D nose model of the human from 2D images and pre-marked landmarks based on algorithmic methods.The study focuses on the reconstruction of a 3D n... This paper presents a novel method for reconstructing a highly accurate 3D nose model of the human from 2D images and pre-marked landmarks based on algorithmic methods.The study focuses on the reconstruction of a 3D nose model tailored for applications in healthcare and cosmetic surgery.The approach leverages advanced image processing techniques,3D Morphable Models(3DMM),and deformation techniques to overcome the limita-tions of deep learning models,particularly addressing the interpretability issues commonly encountered in medical applications.The proposed method estimates the 3D coordinates of landmark points using a 3D structure estimation algorithm.Sub-landmarks are extracted through image processing techniques and interpolation.The initial surface is generated using a 3DMM,though its accuracy remains limited.To enhance precision,deformation techniques are applied,utilizing the coordinates of 76 identified landmarks and sub-landmarks.The resulting 3D nose model is constructed based on algorithmic methods and pre-marked landmarks.Evaluation of the 3D model is conducted by comparing landmark distances and shape similarity with expert-determined ground truth on 30 Vietnamese volunteers aged 18 to 47,all of whom were either preparing for or required nasal surgery.Experimental results demonstrate a strong agreement between the reconstructed 3D model and the ground truth.The method achieved a mean landmark distance error of 0.631 mm and a shape error of 1.738 mm,demonstrating its potential for medical applications. 展开更多
关键词 Nose reconstruction 3D reconstruction medical applications algorithmic reconstruction enhanced 3D model
在线阅读 下载PDF
Large Language Models for Effective Detection of Algorithmically Generated Domains:A Comprehensive Review
8
作者 Hamed Alqahtani Gulshan Kumar 《Computer Modeling in Engineering & Sciences》 2025年第8期1439-1479,共41页
Domain Generation Algorithms(DGAs)continue to pose a significant threat inmodernmalware infrastructures by enabling resilient and evasive communication with Command and Control(C&C)servers.Traditional detection me... Domain Generation Algorithms(DGAs)continue to pose a significant threat inmodernmalware infrastructures by enabling resilient and evasive communication with Command and Control(C&C)servers.Traditional detection methods-rooted in statistical heuristics,feature engineering,and shallow machine learning-struggle to adapt to the increasing sophistication,linguistic mimicry,and adversarial variability of DGA variants.The emergence of Large Language Models(LLMs)marks a transformative shift in this landscape.Leveraging deep contextual understanding,semantic generalization,and few-shot learning capabilities,LLMs such as BERT,GPT,and T5 have shown promising results in detecting both character-based and dictionary-based DGAs,including previously unseen(zeroday)variants.This paper provides a comprehensive and critical review of LLM-driven DGA detection,introducing a structured taxonomy of LLM architectures,evaluating the linguistic and behavioral properties of benchmark datasets,and comparing recent detection frameworks across accuracy,latency,robustness,and multilingual performance.We also highlight key limitations,including challenges in adversarial resilience,model interpretability,deployment scalability,and privacy risks.To address these gaps,we present a forward-looking research roadmap encompassing adversarial training,model compression,cross-lingual benchmarking,and real-time integration with SIEM/SOAR platforms.This survey aims to serve as a foundational resource for advancing the development of scalable,explainable,and operationally viable LLM-based DGA detection systems. 展开更多
关键词 Adversarial domains cyber threat detection domain generation algorithms large language models machine learning security
在线阅读 下载PDF
Algorithmic Empathy:Reconstructing Mainstream Media Communication Logic Through AI-Driven Technology for Precision Emotional Matching and Enhanced Communication Efficiency
9
作者 XIAO Shufang 《Journalism and Mass Communication》 2025年第3期189-195,共7页
This study investigates how artificial intelligence(AI)algorithms enable mainstream media to achieve precise emotional matching and improve communication efficiency through reconstructed communication logic.As digital... This study investigates how artificial intelligence(AI)algorithms enable mainstream media to achieve precise emotional matching and improve communication efficiency through reconstructed communication logic.As digital intelligence technology rapidly evolves,mainstream media organizations are increasingly leveraging AI-driven empathy algorithms to enhance audience engagement and optimize content delivery.This research employs a mixed-methods approach,combining quantitative analysis of algorithmic performance metrics with qualitative examination of media communication patterns.Through systematic review of 150 academic papers and analysis of data from 12 major media platforms,this study reveals that algorithmic empathy systems can improve emotional resonance by 34.7%and increase audience engagement by 28.3%compared to traditional communication methods.The findings demonstrate that AI algorithms reconstruct media communication logic through three primary pathways:emotional pattern recognition,personalized content curation,and real-time sentiment adaptation.However,the study also identifies significant challenges including algorithmic bias,emotional authenticity concerns,and ethical implications of automated empathy.The research contributes to understanding how mainstream media can leverage AI technology to build high-quality empathetic communication while maintaining journalistic integrity and social responsibility. 展开更多
关键词 algorithmic empathy artificial intelligence mainstream media communication logic emotional matching digital intelligence technology media convergence sentiment analysis
在线阅读 下载PDF
AN ALGORITHM FOR AUTOMATICALLY GENERATING BLACK-BOX TEST CASES 被引量:3
10
作者 Xu Baowen Nie Changhai +1 位作者 Shi Qunfeng Lu Hong 《Journal of Electronics(China)》 2003年第1期74-77,共4页
Selection of test cases plays a key role in improving testing efficiency.Black-box testing is an important way of testing,and its validity lies on the selection of test cases in some sense.A reasonable and effective m... Selection of test cases plays a key role in improving testing efficiency.Black-box testing is an important way of testing,and its validity lies on the selection of test cases in some sense.A reasonable and effective method about the selection and generation of test cases is urgently needed.This letter first introduces some usualmethods on black-box test case generation,then proposes a new algorithm based on interface parameters and discusses its properties,finally shows the effectiveness of the algorithm. 展开更多
关键词 Software testing black-box testing Test case Interface parameters Combination coverage
在线阅读 下载PDF
Algorithmic Optimization of BDDs and Performance Evaluation for Multi-level Logic Circuits with Area and Power Trade-offs 被引量:2
11
作者 Saurabh Chaudhury Anirban Dutta 《Circuits and Systems》 2011年第3期217-224,共8页
Binary Decision Diagrams (BDDs) can be graphically manipulated to reduce the number of nodes and hence the area. In this context, ordering of BDDs play a major role. Most of the algorithms for input variable ordering ... Binary Decision Diagrams (BDDs) can be graphically manipulated to reduce the number of nodes and hence the area. In this context, ordering of BDDs play a major role. Most of the algorithms for input variable ordering of OBDD focus primarily on area minimization. However, suitable input variable ordering helps in minimizing the power consumption also. In this particular work, we have proposed two algorithms namely, a genetic algorithm based technique and a branch and bound algorithm to find an optimal input variable order. Of course, the node reordering is taken care of by the standard BDD package buddy-2.4. Moreover, we have evaluated the performances of the proposed algorithms by running an exhaustive search program. Experi-mental results show a substantial saving in area and power. We have also compared our techniques with other state-of-art techniques of variable ordering for OBDDs and found to give superior results. 展开更多
关键词 algorithmic OPTIMIZATION BDDS Genetic algorithm Branch & BOUND Variable ORDERING Area-Power Trade-offs
在线阅读 下载PDF
Nonlinear Model Algorithmic Control of a pH Neutralization Process 被引量:12
12
作者 邹志云 于蒙 +4 位作者 王志甄 刘兴红 郭宇晴 张风波 郭宁 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2013年第4期395-400,共6页
Control of pH neutralization processes is challenging in the chemical process industry because of their inherent strong nonlinearity. In this paper, the model algorithmic control (MAC) strategy is extended to nonlinea... Control of pH neutralization processes is challenging in the chemical process industry because of their inherent strong nonlinearity. In this paper, the model algorithmic control (MAC) strategy is extended to nonlinear processes using Hammerstein model that consists of a static nonlinear polynomial function followed in series by a linear impulse response dynamic element. A new nonlinear Hammerstein MAC algorithm (named NLH-MAC) is presented in detail. The simulation control results of a pH neutralization process show that NLH-MAC gives better control performance than linear MAC and the commonly used industrial nonlinear propotional plus integral plus derivative (PID) controller. Further simulation experiment demonstrates that NLH-MAC not only gives good control response, but also possesses good stability and robustness even with large modeling errors. 展开更多
关键词 model algorithmic control nonlinear model predictive control Hammerstein model pH neutralization process control simulation
在线阅读 下载PDF
Radiological Mimics of Popliteal Cysts: An Algorithmic Approach Using US and MRI to Identify the Potentially Malignant Lesions: Case Series 被引量:1
13
作者 Andrae Blanchard Asad A. Naqvi +1 位作者 Zain Badar Hema Choudur 《Open Journal of Clinical Diagnostics》 2016年第2期7-12,共6页
Background: Popliteal cysts are common and present as asymptomatic lumps in the medial popliteal fossa. Some have complex internal characteristics such as septa and loose-bodies. However, not all are popliteal cysts a... Background: Popliteal cysts are common and present as asymptomatic lumps in the medial popliteal fossa. Some have complex internal characteristics such as septa and loose-bodies. However, not all are popliteal cysts and can be aggressive. These lesions need to be differentiated by the absence of the communicating neck with the joint on ultrasound. Presence of Doppler flow of non-communicating cysts requires further evaluation on MRI, prior to performing a biopsy. Using a case series, we propose an algorithmic approach that is simple and will help identify the malignant lesions and institute appropriate management. Case-Presentation: Popliteal Cyst: On ultrasound: characteristic neck communicating with knee joint. Synovial Sarcoma: Gadolinium enhancement, with areas of low-, iso- and hyper-intense signal to fat on T2. Synovial-Osteochondromatosis: Non-mineralized: T1-low/intermediate intensity;T2-high intensity. Mineralized type: low intensity on T1 & T2. Thrombosed Popliteal Aneurysm: Lamellated appearance-high/low signal intensity on T2. Myxoid-Liposarcomas: Inhomogeneous appearance;homogenous with gadolinium. Usually require a biopsy for diagnosis. Conclusion: The cystic lesions in the medial aspect of the popliteal fossa can be misdiagnosed. Our article reiterates the importance of the communicating neck that separates popliteal cysts from other mimics. We have proposed an algorithm to identify these mimics. 展开更多
关键词 Popliteal Cyst Malignant Lesions MIMICS algorithmic Approach
暂未订购
Melody Generator: A Device for Algorithmic Music Construction 被引量:2
14
作者 Dirk-Jan Povel 《Journal of Software Engineering and Applications》 2010年第7期683-695,共13页
This article describes the development of an application for generating tonal melodies. The goal of the project is to ascertain our current understanding of tonal music by means of algorithmic music generation. The me... This article describes the development of an application for generating tonal melodies. The goal of the project is to ascertain our current understanding of tonal music by means of algorithmic music generation. The method followed consists of four stages: 1) selection of music-theoretical insights, 2) translation of these insights into a set of principles, 3) conversion of the principles into a computational model having the form of an algorithm for music generation, 4) testing the “music” generated by the algorithm to evaluate the adequacy of the model. As an example, the method is implemented in Melody Generator, an algorithm for generating tonal melodies. The program has a structure suited for generating, displaying, playing and storing melodies, functions which are all accessible via a dedicated interface. The actual generation of melodies, is based in part on constraints imposed by the tonal context, i.e. by meter and key, the settings of which are controlled by means of parameters on the interface. For another part, it is based upon a set of construction principles including the notion of a hierarchical organization, and the idea that melodies consist of a skeleton that may be elaborated in various ways. After these aspects were implemented as specific sub-algorithms, the device produces simple but well-structured tonal melodies. 展开更多
关键词 Principles of Tonal MUSIC CONSTRUCTION algorithmic Composition Synthetic MUSICOLOGY Computational Model Realbasic OOP MELODY METER Key
在线阅读 下载PDF
Stochastic Design of Enhanced Network Management Architecture and Algorithmic Implementations 被引量:1
15
作者 Song-Kyoo Kim 《American Journal of Operations Research》 2013年第1期87-93,共7页
The paper is focused on available server management in Internet connected network environments. The local backup servers are hooked up by LAN and replace broken main server immediately and several different types of b... The paper is focused on available server management in Internet connected network environments. The local backup servers are hooked up by LAN and replace broken main server immediately and several different types of backup servers are also considered. The remote backup servers are hooked up by VPN (Virtual Private Network) with high-speed optical network. A Virtual Private Network (VPN) is a way to use a public network infrastructure and hooks up long-distance servers within a single network infrastructure. The remote backup servers also replace broken main severs immediately under the different conditions with local backups. When the system performs a mandatory routine maintenance of main and local backup servers, auxiliary servers from other location are being used for backups during idle periods. Analytically tractable results are obtained by using several mathematical techniques and the results are demonstrated in the framework of optimized networked server allocation problems. The operational workflow give the guidelines for the actual implementations. 展开更多
关键词 STOCHASTIC Network Management N-POLICY CLOSED QUEUE algorithmic Implementation STOCHASTIC Optimization
在线阅读 下载PDF
Formal Calculation and Invariant-Based Validation Establish Dependable Algorithmic Programs
16
作者 郑宇军 石海鹤 +1 位作者 薛锦云 陈胜勇 《China Communications》 SCIE CSCD 2011年第4期58-64,共7页
The paper presents a formal and practical approach to dependable algorithm development.First,starting from a formal specification based on the Eindhoven quantifier notation,a problem is regularly reduced to subproblem... The paper presents a formal and practical approach to dependable algorithm development.First,starting from a formal specification based on the Eindhoven quantifier notation,a problem is regularly reduced to subproblems with less complexity by using a concise set of calculation rules,the result of which establishes a recurrence-based algorithm.Second,a loop invariant is derived from the problem specification and recurrence,which certifies the transformation from the recurrence-based algorithm to one or more iterative programs.We demonstrate that our approach covers a number of classical algorithm design tactics,develops algorithmic programs together with their proof of correctness,and thus contributes fundamentally to the dependability of computer software. 展开更多
关键词 FORMAL methods algorithm CALCULATION loop INVARIANTS program VALIDATION
在线阅读 下载PDF
Feature selection for face recognition:a memetic algorithmic approach 被引量:2
17
作者 Dinesh KUMAR Shakti KUMAR C.S.RAI 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第8期1140-1152,共13页
The eigenface method that uses principal component analysis(PCA) has been the standard and popular method used in face recognition.This paper presents a PCA-memetic algorithm(PCA-MA) approach for feature selection.PCA... The eigenface method that uses principal component analysis(PCA) has been the standard and popular method used in face recognition.This paper presents a PCA-memetic algorithm(PCA-MA) approach for feature selection.PCA has been extended by MAs where the former was used for feature extraction/dimensionality reduction and the latter exploited for feature selection.Simulations were performed over ORL and YaleB face databases using Euclidean norm as the classifier.It was found that as far as the recognition rate is concerned,PCA-MA completely outperforms the eigenface method.We compared the performance of PCA extended with genetic algorithm(PCA-GA) with our proposed PCA-MA method.The results also clearly established the supremacy of the PCA-MA method over the PCA-GA method.We further extended linear discriminant analysis(LDA) and kernel principal component analysis(KPCA) approaches with the MA and observed significant improvement in recognition rate with fewer features.This paper also compares the performance of PCA-MA,LDA-MA and KPCA-MA approaches. 展开更多
关键词 Face recognition Memetic algorithm (MA) Principal component analysis (PCA) Linear discriminant analysis (LDA) Kernel principal component analysis (KPCA) Feature selection
原文传递
Algorithmic tangent modulus at finite strains based on multiplicative decomposition
18
作者 李朝君 冯吉利 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2014年第3期345-358,共14页
The algorithmic tangent modulus at finite strains in current configuration plays an important role in the nonlinear finite element method. In this work, the exact tensorial forms of the algorithmic tangent modulus at ... The algorithmic tangent modulus at finite strains in current configuration plays an important role in the nonlinear finite element method. In this work, the exact tensorial forms of the algorithmic tangent modulus at finite strains are derived in the principal space and their corresponding matrix expressions are also presented. The algorithmic tangent modulus consists of two terms. The first term depends on a specific yield surface, while the second term is independent of the specific yield surface. The elastoplastic matrix in the principal space associated with the specific yield surface is derived by the logarithmic strains in terms of the local multiplicative decomposition. The Drucker-Prager yield function of elastoplastic material is used as a numerical example to verify the present algorithmic tangent modulus at finite strains. 展开更多
关键词 algorithmic tangent modulus matrix expression finite strain multiplicative decomposition
在线阅读 下载PDF
Intelligent Evidence-Based Management for Data Collection and Decision-Making Using Algorithmic Randomness and Active Learning
19
作者 Harry Wechsler Shen-Shyang Ho 《Intelligent Information Management》 2011年第4期142-159,共18页
We describe here a comprehensive framework for intelligent information management (IIM) of data collection and decision-making actions for reliable and robust event processing and recognition. This is driven by algori... We describe here a comprehensive framework for intelligent information management (IIM) of data collection and decision-making actions for reliable and robust event processing and recognition. This is driven by algorithmic information theory (AIT), in general, and algorithmic randomness and Kolmogorov complexity (KC), in particular. The processing and recognition tasks addressed include data discrimination and multilayer open set data categorization, change detection, data aggregation, clustering and data segmentation, data selection and link analysis, data cleaning and data revision, and prediction and identification of critical states. The unifying theme throughout the paper is that of “compression entails comprehension”, which is realized using the interrelated concepts of randomness vs. regularity and Kolmogorov complexity. The constructive and all encompassing active learning (AL) methodology, which mediates and supports the above theme, is context-driven and takes advantage of statistical learning, in general, and semi-supervised learning and transduction, in particular. Active learning employs explore and exploit actions characteristic of closed-loop control for evidence accumulation in order to revise its prediction models and to reduce uncertainty. The set-based similarity scores, driven by algorithmic randomness and Kolmogorov complexity, employ strangeness / typicality and p-values. We propose the application of the IIM framework to critical states prediction for complex physical systems;in particular, the prediction of cyclone genesis and intensification. 展开更多
关键词 Active Learning algorithmic Information Theory algorithmic RANDOMNESS EVIDENCE-BASED Management KOLMOGOROV Complexity P-VALUES TRANSDUCTION Critical States Prediction
暂未订购
Cellular automation model of faults and algorithmic complexity
20
作者 陆远忠 吕悦军 《Acta Seismologica Sinica(English Edition)》 CSCD 1994年第2期235-244,共10页
In this paper, we use the cellular automation model to imitate earthquake process and draw some conclusionsof general applicability. First, it is confirmed that earthquake process has some ordering characters, and it ... In this paper, we use the cellular automation model to imitate earthquake process and draw some conclusionsof general applicability. First, it is confirmed that earthquake process has some ordering characters, and it isshown that both the existence and their mutual arrangement of faults could obviously influence the overallcharacters of earthquake process. Then the characters of each stage of model evolution are explained withself-organized critical state theory. Finally, earthquake sequences produced by the models are analysed interms pf algorithmic complexity and the result shows that AC-values of algorithmic complexity could be usedto study earthquake process and evolution. 展开更多
关键词 cellular automation model algorithmic complexity self-organized critical state EVOLUTION FAULT
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部