期刊文献+
共找到32篇文章
< 1 2 >
每页显示 20 50 100
Geochemical and Geostatistical Studies for Estimating Gold Grade in Tarq Prospect Area by K-Means Clustering Method 被引量:7
1
作者 Adel Shirazy Aref Shirazi +1 位作者 Mohammad Hossein Ferdossi Mansour Ziaii 《Open Journal of Geology》 2019年第6期306-326,共21页
Tarq geochemical 1:100,000 Sheet is located in Isfahan province which is investigated by Iran’s Geological and Explorations Organization using stream sediment analyzes. This area has stratigraphy of Precambrian to Qu... Tarq geochemical 1:100,000 Sheet is located in Isfahan province which is investigated by Iran’s Geological and Explorations Organization using stream sediment analyzes. This area has stratigraphy of Precambrian to Quaternary rocks and is located in the Central Iran zone. According to the presence of signs of gold mineralization in this area, it is necessary to identify important mineral areas in this area. Therefore, finding information is necessary about the relationship and monitoring the elements of gold, arsenic, and antimony relative to each other in this area to determine the extent of geochemical halos and to estimate the grade. Therefore, a well-known and useful K-means method is used for monitoring the elements in the present study, this is a clustering method based on minimizing the total Euclidean distances of each sample from the center of the classes which are assigned to them. In this research, the clustering quality function and the utility rate of the sample have been used in the desired cluster (S(i)) to determine the optimum number of clusters. Finally, with regard to the cluster centers and the results, the equations were used to predict the amount of the gold element based on four parameters of arsenic and antimony grade, length and width of sampling points. 展开更多
关键词 GOLD Tarq k-means clustering method Estimation of the ELEMENTS GRADE k-means
暂未订购
Classification of Northeast China Cold Vortex Activity Paths in Early Summer Based on K-means Clustering and Their Climate Impact 被引量:13
2
作者 Yihe FANG Haishan CHEN +3 位作者 Yi LIN Chunyu ZHAO Yitong LIN Fang ZHOU 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2021年第3期400-412,共13页
The classification of the Northeast China Cold Vortex(NCCV)activity paths is an important way to analyze its characteristics in detail.Based on the daily precipitation data of the northeastern China(NEC)region,and the... The classification of the Northeast China Cold Vortex(NCCV)activity paths is an important way to analyze its characteristics in detail.Based on the daily precipitation data of the northeastern China(NEC)region,and the atmospheric circulation field and temperature field data of ERA-Interim for every six hours,the NCCV processes during the early summer(June)seasons from 1979 to 2018 were objectively identified.Then,the NCCV processes were classified using a machine learning method(k-means)according to the characteristic parameters of the activity path information.The rationality of the classification results was verified from two aspects,as follows:(1)the atmospheric circulation configuration of the NCCV on various paths;and(2)its influences on the climate conditions in the NEC.The obtained results showed that the activity paths of the NCCV could be divided into four types according to such characteristics as the generation origin,movement direction,and movement velocity of the NCCV.These included the generation-eastward movement type in the east of the Mongolia Plateau(eastward movement type or type A);generation-southeast longdistance movement type in the upstream of the Lena River(southeast long-distance movement type or type B);generationeastward less-movement type near Lake Baikal(eastward less-movement type or type C);and the generation-southward less-movement type in eastern Siberia(southward less-movement type or type D).There were obvious differences observed in the atmospheric circulation configuration and the climate impact of the NCCV on the four above-mentioned types of paths,which indicated that the classification results were reasonable. 展开更多
关键词 northeastern China early summer Northeast China Cold Vortex classification of activity paths machine learning method k-means clustering high-pressure blocking
在线阅读 下载PDF
基于归一化RGB和K-means聚类的车牌阴影去除方法
3
作者 王相海 王凯 +1 位作者 宫根 宋传鸣 《辽宁师范大学学报(自然科学版)》 CAS 2016年第3期349-355,共7页
提出一种基于归一化RGB和K-means聚类的车牌二值方法,实现对交通场景中的车牌阴影去除和车牌二值.首先,将RGB图像进行颜色的归一化,避免亮度改变的干扰,然后,再将图像转换到多维空间进行K-means聚类,根据聚类的标签对车牌进行二值.通过... 提出一种基于归一化RGB和K-means聚类的车牌二值方法,实现对交通场景中的车牌阴影去除和车牌二值.首先,将RGB图像进行颜色的归一化,避免亮度改变的干扰,然后,再将图像转换到多维空间进行K-means聚类,根据聚类的标签对车牌进行二值.通过与Otsu、局部阈值等方法进行比较,该算法可以有效提高阴影覆盖车牌的二值效果. 展开更多
关键词 归一化RGB k-means 阴影车牌 二值方法 聚类
在线阅读 下载PDF
Application of K-means and PCA approaches to estimation of gold grade in Khooni district(central Iran) 被引量:3
4
作者 Neda Mahvash Mohammadi Ardeshir Hezarkhani Abbas Maghsoudi 《Acta Geochimica》 EI CAS CSCD 2018年第1期102-112,共11页
Grade estimation is an important phase of mining projects, and one that is considered a challenge due in part to the structural complexities in mineral ore deposits.To overcome this challenge, various techniques have ... Grade estimation is an important phase of mining projects, and one that is considered a challenge due in part to the structural complexities in mineral ore deposits.To overcome this challenge, various techniques have been used in the past. This paper introduces an approach for estimating Au ore grades within a mining deposit using k-means and principal component analysis(PCA). The Khooni district was selected as the case study. This region is interesting geologically, in part because it is considered an important gold source. The study area is situated approximately 60km northeast of the Anarak city and 270km from Esfahan. Through PCA, we sought to understand the relationship between the elements of gold,arsenic, and antimony. Then, by clustering, the behavior of these elements was investigated. One of the most famous and efficient clustering methods is k-means, based on minimizing the total Euclidean distance from each class center. Using the combined results and characteristics of the cluster centers, the gold grade was determined with a correlation coefficient of 91%. An estimation equation for gold grade was derived based on four parameters: arsenic and antimony content, and length and width of the sampling points. The results demonstrate that this approach is faster and more accurate than existing methodologies for ore grade estimation. 展开更多
关键词 k-means method clustering Principal component analysis(PCA) ESTIMATION GOLD Khooni district
在线阅读 下载PDF
Binary star detection in the open cluster King 1 field
5
作者 Parvej Reja Saleh Debasish Hazarika +2 位作者 Ajaz Ahmad Dar Padmakar Singh Parihar Eeshankur Saikia 《Research in Astronomy and Astrophysics》 SCIE CAS CSCD 2020年第3期185-191,共7页
A rarely studied open cluster,King 1 is observed using the 1.3-m telescope equipped with a 2 k×4 k CCD at Vainu Bappu Observatory,India.We analyze the photometric data obtained from CCD observations in both B and... A rarely studied open cluster,King 1 is observed using the 1.3-m telescope equipped with a 2 k×4 k CCD at Vainu Bappu Observatory,India.We analyze the photometric data obtained from CCD observations in both B and V bands.Out of 132 detected stars in the open cluster King 1 field,we have identified four stellar variables,and two among them are reported as newly detected binary systems.The parallax values from Gaia DR2 suggest that the open cluster King 1 is in the background of these two detected binary systems,falling along the same line of sight,giving rise to different parallax values.Periodogram analysis was carried out using Phase Dispersion Minimization(PDM)and the Lomb-Scargle(LS)method for all the detected variables.PHysics Of Eclipsing Binari Es(PHOEBE)is extensively employed to model various stellar parameters of both the detected binary systems.Based on the modeling results obtained from this work,one of the binary systems is reported for the first time as an Eclipsing Detached(ED)and the other as an Eclipsing Contact(EC)binary of W-type W UMa. 展开更多
关键词 GALAXIES photometry-galaxies clusters individual(King 1)-(stars:)binaries eclipsing-methods OBSERVATIONAL
在线阅读 下载PDF
基于Prometheus的云平台多容器集群异常监控技术
6
作者 戚林成 陶笑 +1 位作者 冷新云 韦健 《微型电脑应用》 2025年第4期202-206,232,共6页
云平台多容器集群数据量大、涉及种类多,导致异常状态监控难度大,为此提出基于Prometheus的监控算法。在云平台中,利用小波分解法获取多容器集群数据的实时状态序列,结合二叉树分解描述法划分不同类型的集群数据特征。根据Prometheus技... 云平台多容器集群数据量大、涉及种类多,导致异常状态监控难度大,为此提出基于Prometheus的监控算法。在云平台中,利用小波分解法获取多容器集群数据的实时状态序列,结合二叉树分解描述法划分不同类型的集群数据特征。根据Prometheus技术具备的分布式储存管理特点划分监控空间,并设定监控类中心,对比多容器集群数据与该节点中心相似性,相似性最强的数据即异常。仿真实验证明,方法监控异常状态数据入侵信号在800~1200测试点位间出现大幅度变动,与实际number format exception (NFE)异常状态数据入侵监控结果十分接近,CPU耗用率较低,最小值为15%,对异常监控的响应耗时平均值为1.7 s,可为云平台稳定运行提供帮助。 展开更多
关键词 多容器集群 数据监控 二叉树分解描述法 小波分解法 状态序列
在线阅读 下载PDF
跌落式熔断器拉合控制的智能判断方法
7
作者 陶金龙 王健 +1 位作者 王学峰 余子彬 《信息技术》 2025年第7期117-122,共6页
在大型DCS系统中,操作熔管的拉合操作需求判断不仅具有相当的难度,且操作过程中的不安全因素甚多。为此,设计一种跌落式熔断器拉合控制的智能判断方法。分析DCS控制站中,熔断器有拉合控制需求时,会发生电磁铁推斥熔管分断这一特征;基于... 在大型DCS系统中,操作熔管的拉合操作需求判断不仅具有相当的难度,且操作过程中的不安全因素甚多。为此,设计一种跌落式熔断器拉合控制的智能判断方法。分析DCS控制站中,熔断器有拉合控制需求时,会发生电磁铁推斥熔管分断这一特征;基于长短期记忆模型(LSTM)的三个控制门,提取电磁铁推斥熔管分断这一特征向量;利用二分K均值聚类法对传统KNNC方法展开优化,采用优化后的方法展开跌落式熔断器拉合控制需求的智能检测。实验结果表明,该方法检测耗时短、效率高并且对拉合需求检测比较精准。 展开更多
关键词 熔断器 拉合控制 双树复小波 长短期记忆模型 二分K均值聚类法
在线阅读 下载PDF
Predicting the Endpoint Phosphorus Content of Molten Steel in BOF by Two-stage Hybrid Method 被引量:5
8
作者 Hong-bing WANG Jun CAI Kai FENG 《Journal of Iron and Steel Research International》 SCIE EI CAS CSCD 2014年第S1期65-69,共5页
A two-stage hybrid method is proposed to predict the phosphorus content of molten steel at the endpoint of steelmaking in BOF(Basic Oxygen Furnace). At the first clustering stage, the weighted K-means is performed to ... A two-stage hybrid method is proposed to predict the phosphorus content of molten steel at the endpoint of steelmaking in BOF(Basic Oxygen Furnace). At the first clustering stage, the weighted K-means is performed to produce clusters with homogeneous data. At the second predicting stage, each fuzzy neural network is carried out on each cluster and the results from all fuzzy neural networks are combined to be the final result of the hybrid method. The hybrid method and single fuzzy neural network are compared and the results show that the hybrid method outperforms single fuzzy neural network. 展开更多
关键词 k-means clustering fuzzy neural network hybrid method predicting endpoint phosphorus content
原文传递
Three Indication Variables and Their Performance for the Troubled-Cell Indicator using K-Means Clustering 被引量:1
9
作者 Zhihuan Wang Zhen Gao +2 位作者 Haiyun Wang Qiang Zhang Hongqiang Zhu 《Advances in Applied Mathematics and Mechanics》 SCIE 2023年第2期522-544,共23页
In Zhu,Wang and Gao(SIAM J.Sci.Comput.,43(2021),pp.A3009–A3031),we proposed a new framework of troubled-cell indicator(TCI)using K-means clustering and the numerical results demonstrate that it can detect the trouble... In Zhu,Wang and Gao(SIAM J.Sci.Comput.,43(2021),pp.A3009–A3031),we proposed a new framework of troubled-cell indicator(TCI)using K-means clustering and the numerical results demonstrate that it can detect the troubled cells accurately using the KXRCF indication variable.The main advantage of this TCI framework is its great potential of extensibility.In this follow-up work,we introduce three more indication variables,i.e.,the TVB,Fu-Shu and cell-boundary jump indication variables,and show their good performance by numerical tests to demonstrate that the TCI framework offers great flexibility in the choice of indication variables.We also compare the three indication variables with the KXRCF one,and the numerical results favor the KXRCF and the cell-boundary jump indication variables. 展开更多
关键词 Troubled-cell indicator indication variable discontinuous Galerkin method shock detection k-means clustering
在线阅读 下载PDF
Photometric solution and period analysis of the contact binary system AH Cnc 被引量:1
10
作者 Ying-Jiang Peng Zhi-Quan Luo +11 位作者 Xiao-Bin Zhang Li-Cai Deng Kun Wang Jian-Feng Tian Zheng-Zhou Yan Yang Pan Wei-Jing Fang Zhong-Wen Feng De-Lin Tang Qi-Li Liu Jin-Jiang Sun Qiang Zhou 《Research in Astronomy and Astrophysics》 SCIE CAS CSCD 2016年第10期63-70,共8页
Photometric observations of AH Cnc, a W UMa-type system in the open cluster M67, were car- fled out by using the 50BIN telescope. About 100h of time-series/3- and V-band data were taken, based on which eight new times... Photometric observations of AH Cnc, a W UMa-type system in the open cluster M67, were car- fled out by using the 50BIN telescope. About 100h of time-series/3- and V-band data were taken, based on which eight new times of light minima were determined. By applying the Wilson-Devinney method, the light curves were modeled and a revised photometric solution of the binary system was derived. We con- firmed that AH Cnc is a deep contact (f = 51%), low mass-ratio (q - 0.156) system. Adopting the distance modulus derived from study of the host cluster, we have re-calculated the physical parameters of the binary system, namely the masses and radii. The masses and radii of the two components were estimated to be respectively 1.188(4-0.061) Me, 1.332(4-0.063) RQ for the primary component and 0.185(4-0.032) Me, 0.592(4-0.051) Re for the secondary. By adding the newly derived minimum timings to all the available data, the period variations of AH Cnc were studied. This shows that the orbital period of the binary is con- tinuously increasing at a rate of dp/dt = 4.29 x 10-10 d yr-1. In addition to the long-term period increase, a cyclic variation with a period of 35.26 yr was determined, which could be attributed to an unresolved tertiary component of the system. 展开更多
关键词 methods: data analysis -- astronomical instrumentation -- binaries: eclipsing stars closestars -- Galaxy: open clusters and associations: individual (M67)
在线阅读 下载PDF
Image Segmentation: A Novel Cluster Ensemble Algorithm
11
作者 Lei Wang Guoyin Zhang +1 位作者 Chen Liu Wei Gao 《国际计算机前沿大会会议论文集》 2016年第1期103-105,共3页
Cluster ensemble has testified to be a good choice for addressing cluster analysis issues, which is composed of two processes: creating a group of clustering results from a same data set and then combining these resul... Cluster ensemble has testified to be a good choice for addressing cluster analysis issues, which is composed of two processes: creating a group of clustering results from a same data set and then combining these results into a final clustering results. How to integrate these results to produce a final one is a significant issue for cluster ensemble. This combination process aims to improve the quality of individual data clustering results. A novel image segmentation algorithm using the Binary k-means and the Adaptive Affinity Propagation clustering (CEBAAP) is designed in this paper. It uses a Binary k-means method to generate a set of clustering results and develops an Adaptive Affinity Propagation clustering to combine these results. The experiments results show that CEBAAP has good image partition effect. 展开更多
关键词 cluster ENSEMBLE binary k-means Adaptive AFFINITY propagation clustering Image segmentation
在线阅读 下载PDF
Revealing dislocation activity modes during yielding and uniform deformation of low-temperature tempered steel by acoustic emission
12
作者 Jie Li Jia-zhi Zhang +5 位作者 Li-yang Zeng Shuai Wang Xiang-yu Song Nai-lu Chen Xun-wei Zuo Yong-hua Rong 《Journal of Iron and Steel Research International》 CSCD 2024年第12期3022-3036,共15页
The distinctive distribution of acoustic emission(AE)characteristic parameters generated during tensile testing of low-temperature tempered AISI 4140 steel was investigated.Two clusters of acoustic emission signals we... The distinctive distribution of acoustic emission(AE)characteristic parameters generated during tensile testing of low-temperature tempered AISI 4140 steel was investigated.Two clusters of acoustic emission signals were distinguished using power-law distribution fitting and k-means clustering methods.These clusters were identified as resulting from dislocation motion during yielding and dislocation entanglement during uniform plastic deformation.The conclusion is further confirmed by transmission electron microscopy images at different strains.In particular,the unique"arch-shaped"distribution of the acoustic emission energy during yielding implies a change in unusual dislocation motion modes.The effect of carbide precipitation was qualitatively discussed as not considering the primary cause of the formation of this arch-shaped distribution.The evolution of dislocation motion modes during yielding of low-temperature tempered martensite was elucidated by comparing the significant difference in cumulative energy values during yielding of annealed and low-temperature tempered specimens.Dislocations emit from Frank–Read or grain boundary sources and slip along short free paths,contributing to the initial increase in AE signals energy.Subsequently,the primary source of acoustic emission energy“arch-shaped”peak during yielding was generated by the avalanche behavior of accumulated dislocations,leading to the accelerated dislocation motion. 展开更多
关键词 Dislocation activity mode Acoustic emission k-means clustering method Power-law distribution AISI4140 tempered steel
原文传递
Incident Detection Based on Differential Analysis
13
作者 Mohammed Ali Elseddig Mohamed Mejri 《Journal of Information Security》 2024年第3期378-409,共32页
Internet services and web-based applications play pivotal roles in various sensitive domains, encompassing e-commerce, e-learning, e-healthcare, and e-payment. However, safeguarding these services poses a significant ... Internet services and web-based applications play pivotal roles in various sensitive domains, encompassing e-commerce, e-learning, e-healthcare, and e-payment. However, safeguarding these services poses a significant challenge, as the need for robust security measures becomes increasingly imperative. This paper presented an innovative method based on differential analyses to detect abrupt changes in network traffic characteristics. The core concept revolves around identifying abrupt alterations in certain characteristics such as input/output volume, the number of TCP connections, or DNS queries—within the analyzed traffic. Initially, the traffic is segmented into distinct sequences of slices, followed by quantifying specific characteristics for each slice. Subsequently, the distance between successive values of these measured characteristics is computed and clustered to detect sudden changes. To accomplish its objectives, the approach combined several techniques, including propositional logic, distance metrics (e.g., Kullback-Leibler Divergence), and clustering algorithms (e.g., K-means). When applied to two distinct datasets, the proposed approach demonstrates exceptional performance, achieving detection rates of up to 100%. 展开更多
关键词 IDS SOC SIEM KL-Divergence k-mean clustering Algorithms Elbow method
在线阅读 下载PDF
Big Data & DDoS ATTACKS: A Discussion of Ensemble Algorithms to Detect Cyber Attacks
14
作者 Anja Housden-Brooks 《Journal of Computer and Communications》 2024年第12期246-265,共20页
The use of machine learning algorithms to identify characteristics in Distributed Denial of Service (DDoS) attacks has emerged as a powerful approach in cybersecurity. DDoS attacks, which aim to overwhelm a network or... The use of machine learning algorithms to identify characteristics in Distributed Denial of Service (DDoS) attacks has emerged as a powerful approach in cybersecurity. DDoS attacks, which aim to overwhelm a network or service with a flood of malicious traffic, pose significant threats to online systems. Traditional methods of detection and mitigation often struggle to keep pace with the evolving nature of these attacks. Machine learning, with its ability to analyze vast amounts of data and recognize patterns, offers a robust solution to this challenge. The aim of the paper is to demonstrate the application of ensemble ML algorithms, namely the K-Means and the KNN, for a dual clustering mechanism when used with PySpark to collect 99% accurate data. The algorithms, when used together, identify distinctive features of DDoS attacks that prove a very accurate reflection of reality, so they are a good combination for this aim. Impressively, having preprocessed the data, both algorithms with the PySpark foundation enabled the achievement of 99% accuracy when tuned on the features of a DDoS big dataset. The semi-supervised dataset tabulates traffic anomalies in terms of packet size distribution in correlation to Flow Duration. By training the K-Means Clustering and then applying the KNN to the dataset, the algorithms learn to evaluate the character of activity to a greater degree by displaying density with ease. The study evaluates the effectiveness of the K-Means Clustering with the KNN as ensemble algorithms that adapt very well in detecting complex patterns. Ultimately, cross-reaching environmental results indicate that ML-based approaches significantly improve detection rates compared to traditional methods. Furthermore, ensemble learning methods, which combine two plus multiple models to improve prediction accuracy, show greatness in handling the complexity and variability of big data sets especially when implemented by PySpark. The findings suggest that the enhancement of accuracy derives from newer software that’s designed to reflect reality. However, challenges remain in the deployment of these systems, including the need for large, high-quality datasets and the potential for adversarial attacks that attempt to deceive the ML models. Future research should continue to improve the robustness and efficiency of combining algorithms, as well as integrate them with existing security frameworks to provide comprehensive protection against DDoS attacks and other areas. The dataset was originally created by the University of New Brunswick to analyze DDoS data. The dataset itself was based on logs of the university’s servers, which found various DoS attacks throughout the publicly available period to totally generate 80 attributes with a 6.40GB size. In this dataset, the label and binary column become a very important portion of the final classification. In the last column, this means the normal traffic would be differentiated by the attack traffic. Further analysis is then ripe for investigation. Finally, malicious traffic alert software, as an example, should be trained on packet influx to Flow Duration dependence, which creates a mathematical scope for averages to enact. In achieving such high accuracy, the project acts as an illustration (referenced in the form of excerpts from my Google Colab account) of many attempts to tune. Cybersecurity advocates for more work on the character of brute-force attack traffic and normal traffic features overall since most of our investments as humans are digitally based in work, recreational, and social environments. 展开更多
关键词 k-means clustering The KNN Algorithm PySpark Ensemble Learning methods DDoS Attacks Veracity Malicious Traffic Alert Systems
在线阅读 下载PDF
An improved probabilistic load flow in distribution networks based on clustering and Point estimate methods 被引量:1
15
作者 Morsal Salehi Mohammad Mahdi Rezaei 《Energy and AI》 2023年第4期253-261,共9页
Clustering approaches are one of the probabilistic load flow(PLF)methods in distribution networks that can be used to obtain output random variables,with much less computation burden and time than the Monte Carlo simu... Clustering approaches are one of the probabilistic load flow(PLF)methods in distribution networks that can be used to obtain output random variables,with much less computation burden and time than the Monte Carlo simulation(MCS)method.However,a challenge of the clustering methods is that the statistical characteristics of the output random variables are obtained with low accuracy.This paper presents a hybrid approach based on clustering and Point estimate methods.In the proposed approach,first,the sample points are clustered based on the𝑙-means method and the optimal agent of each cluster is determined.Then,for each member of the population of agents,the deterministic load flow calculations are performed,and the output variables are calculated.Afterward,a Point estimate-based PLF is performed and the mean and the standard deviation of the output variables are obtained.Finally,the statistical data of each output random variable are modified using the Point estimate method.The use of the proposed method makes it possible to obtain the statistical properties of output random variables such as mean,standard deviation and probabilistic functions,with high accuracy and without significantly increasing the burden of calculations.In order to confirm the consistency and efficiency of the proposed method,the 10-,33-,69-,85-,and 118-bus standard distribution networks have been simulated using coding in Python®programming language.In simulation studies,the results of the proposed method have been compared with the results obtained from the clustering method as well as the MCS method,as a criterion. 展开更多
关键词 Probabilistic load flow(PLF) Distribution network(DN) Monte Carlo simulation(MCS) k-means clustering(KMC) Point estimate method(PEM)
在线阅读 下载PDF
Clustered Reinforcement Learning
16
作者 Xiao MA Shen-Yi ZHAO +1 位作者 Zhao-Heng YIN Wu-Jun LI 《Frontiers of Computer Science》 2025年第4期43-57,共15页
Exploration strategy design is a challenging problem in reinforcement learning(RL),especially when the environment contains a large state space or sparse rewards.During exploration,the agent tries to discover unexplor... Exploration strategy design is a challenging problem in reinforcement learning(RL),especially when the environment contains a large state space or sparse rewards.During exploration,the agent tries to discover unexplored(novel)areas or high reward(quality)areas.Most existing methods perform exploration by only utilizing the novelty of states.The novelty and quality in the neighboring area of the current state have not been well utilized to simultaneously guide the agent’s exploration.To address this problem,this paper proposes a novel RL framework,called clustered reinforcement learning(CRL),for efficient exploration in RL.CRL adopts clustering to divide the collected states into several clusters,based on which a bonus reward reflecting both novelty and quality in the neighboring area(cluster)of the current state is given to the agent.CRL leverages these bonus rewards to guide the agent to perform efficient exploration.Moreover,CRL can be combined with existing exploration strategies to improve their performance,as the bonus rewards employed by these existing exploration strategies solely capture the novelty of states.Experiments on four continuous control tasks and six hard-exploration Atari-2600 games show that our method can outperform other state-of-the-art methods to achieve the best performance. 展开更多
关键词 deep reinforcement learning EXPLORATION count-based method clustering k-means
原文传递
一种改进的基于先验信息和微粒群算法的基因选择方法 被引量:1
17
作者 凌青华 孙伟 韩飞 《江苏科技大学学报(自然科学版)》 CAS 北大核心 2017年第6期774-780,共7页
针对KMeans-GCSI-MBPSO-ELM方法中冗余基因去除时会出现的"误删除"现象,提出一种改进的基于先验信息和微粒群算法(particle swarm optimization,PSO)的基因选择方法(I-KGME).在充分考虑基因类别灵敏度(gene-to-class sensitiv... 针对KMeans-GCSI-MBPSO-ELM方法中冗余基因去除时会出现的"误删除"现象,提出一种改进的基于先验信息和微粒群算法(particle swarm optimization,PSO)的基因选择方法(I-KGME).在充分考虑基因类别灵敏度(gene-to-class sensitivity,GCS)信息的基础上,利用二进制PSO耦合GCS信息和K-均值聚类算法进行基因选择,并通过二进制PSO算法实现优化.该类方法能够获取低冗余、高预测性的基因子集,并在多个基因表达谱数据上获得了优于经典基因选择方法和KMeansGCSI-MBPSO-ELM方法的性能. 展开更多
关键词 基因选择 基因类别灵敏度信息 K-均值 微粒群优化 基因表达谱数据
在线阅读 下载PDF
仿射传播聚类算法的搜索策略优化
18
作者 董静薇 张天琦 +1 位作者 刘洋 杨光 《哈尔滨理工大学学报》 CAS 北大核心 2018年第3期39-43,共5页
针对多楼层指纹定位中,大规模的指纹样本使得匹配算法复杂度增加,不仅阻碍了系统的实时性,还增加了移动端的能量损耗的问题。依据仿射传播聚类算法理论对指纹库进行分块处理,可以有效减少计算量。复杂环境下的指纹样本搜索通常采用折半... 针对多楼层指纹定位中,大规模的指纹样本使得匹配算法复杂度增加,不仅阻碍了系统的实时性,还增加了移动端的能量损耗的问题。依据仿射传播聚类算法理论对指纹库进行分块处理,可以有效减少计算量。复杂环境下的指纹样本搜索通常采用折半查找法,用于在粗定位阶段得出聚类质量最优结果对应的偏向参数,但此方法花费时间较长。在保证计算质量前提下,为了提高聚类速度,研究了其在粗定位阶段的产生与匹配过程,并给出了对折半查找法进行改进的方法。实验结果表明,对于同一样本空间进行聚类,优化后的折半查找法可以减少算法迭代次数,提高系统工作效率,所用的迭代时间74.5%以上都短于传统折半查找法。 展开更多
关键词 仿射传播 聚类分析 折半查找法 偏向参数
在线阅读 下载PDF
二元合金溶解度间隙的集团变分法分析
19
作者 蒋敏 郝士明 +1 位作者 刘兴军 梁志德 《东北工学院学报》 CSCD 1992年第2期163-168,共6页
应用集团变分法键近似理论,计算了原子间结合能 ε_(ij)为常数的二元合金溶解度间隙和失稳分解曲线,并就其最高临界温度 T_s 进行了理论分析。结果表明由集团变分法获得的T_s比用 Bragg-Williams 统计理论计算的临界温度低。这主要是因... 应用集团变分法键近似理论,计算了原子间结合能 ε_(ij)为常数的二元合金溶解度间隙和失稳分解曲线,并就其最高临界温度 T_s 进行了理论分析。结果表明由集团变分法获得的T_s比用 Bragg-Williams 统计理论计算的临界温度低。这主要是因为集团变分法更精确地计算了溶体内能的缘故。 展开更多
关键词 二元合金 溶解度间隙 集团变分法
在线阅读 下载PDF
基于灰度梯度联合二值图的抗干扰指针仪表自动识读方法 被引量:5
20
作者 尹春丽 刘波 +5 位作者 滕松 王丹 秦轩 梁庆华 吴甜 蒲廷燕 《机械设计与研究》 CSCD 北大核心 2019年第6期43-47,共5页
无人值守机器人在智能配电房进行设备状态检测过程中,需对配电房内的各类指针式仪表进行自动化识别判读。对于方型指针式仪表检测过程中出现的大角度倾斜、阴影与反光干扰,提出一种基于灰度梯度比值阵与联合二值图的抗干扰指针识别算法... 无人值守机器人在智能配电房进行设备状态检测过程中,需对配电房内的各类指针式仪表进行自动化识别判读。对于方型指针式仪表检测过程中出现的大角度倾斜、阴影与反光干扰,提出一种基于灰度梯度比值阵与联合二值图的抗干扰指针识别算法。在表盘定位过程中,提出基于灰度直方图峰值检测与灰度梯度比值阵相结合的方法,有效消除了边框阴影的干扰,实现四条边框方向的定位;在指针识别过程中,提出基于联合二值图的方法,有效增强了表盘中的指针信息,并通过Hough直线检测与线段聚类,最终进行倾斜校正从而获取指针角度。利用C++语言与OpenCV视觉库在计算机中进行算法实现与验证,结果表明,该算法在强干扰条件下仍表现出较高的鲁棒4生和精度,具有较高的应用价值。 展开更多
关键词 方形指针式仪表 灰度梯度比值阵 联合二值图 HOUGH变换 聚类方法
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部