期刊文献+
共找到123篇文章
< 1 2 7 >
每页显示 20 50 100
Hybrid Metaheuristic Lion and Fireffy Optimization Algorithm with Chaotic Map for Substitution S-Box Design
1
作者 Arkan Kh Shakr Sabonchi 《Journal of Information Hiding and Privacy Protection》 2024年第1期21-45,共25页
Substitution boxes(S-boxes)are key components of symmetrical cryptosystems,acting as nonlinear substitutionfunctions that hide the relationship between the encrypted text and input key.This confusion mechanism is vita... Substitution boxes(S-boxes)are key components of symmetrical cryptosystems,acting as nonlinear substitutionfunctions that hide the relationship between the encrypted text and input key.This confusion mechanism is vitalfor cryptographic security because it prevents attackers from intercepting the secret key by analyzing the encryptedtext.Therefore,the S-box design is essential for the robustness of cryptographic systems,especially for the dataencryption standard(DES)and advanced encryption standard(AES).This study focuses on the application of theffreffy algorithm(FA)and metaheuristic lion optimization algorithm(LOA),thereby proposing a hybrid approachcalled the metaheuristic lion ffreffy(ML-F)algorithm.FA,inspired by the blinking behavior of ffreffies,is a relativelynew calculation technique that is effective for various optimization problems.However,FA offen experiences earlyconvergence,limiting the ability to determine the global optimal solution in complex search areas.To address thisproblem,the ML-F algorithm was developed by combining the strengths of FA and LOA.This study identiffesa research gap in enhancing S-box nonlinearity and resistance to differential attacks,which the proposed ML-Faims to address.The main contributions of this paper are the enhanced cryptographic robustness of the S-boxesdeveloped with ML-F,consistently outperforming those generated by FA and other methodsregarding nonlinearityand overall cryptographic properties.The LOA,inspired by the social hunting behavior of lions,uses the collectiveintelligence of a pride of lions to explore and exploit the search space more effectively.The experimental analysis ofthisstudy focused on the main encryption criteria,namely,nonlinearity,the bit independence criterion(BIC),strictavalanche criterion(SAC),differential probability(DP),and maximum expected linear probability(MELP).Thesecriteria ensure that the S-boxes provide robust security against various cryptanalytic attacks.The ML-F algorithmconsistently surpassed the FA and other optimization algorithms in generating S-boxes with higher nonlinearityand better overall cryptographic properties.In case of ML-F-based S-boxes,the results indicated a better averagenonlinear score and more resistance against several cryptographic attacks for quite a number of criteria.Therefore,they were considered more reliable while dealing with secured encryption.The values generated by the ML-FS-boxes are near ideal in both SAC and BIC,indicating better diffusion properties and consequently,enhancedsecurity.The DP analysisfurthershowed that the ML-F-generated S-boxes are highly resistant to differential attacks,which is a crucial requirement for secure encryption systems. 展开更多
关键词 Fireffy algorithm substitution boxes CRYPTOLOGY lion optimization algorithm information security
在线阅读 下载PDF
A State of Art Analysis of Telecommunication Data by k-Means and k-Medoids Clustering Algorithms
2
作者 T. Velmurugan 《Journal of Computer and Communications》 2018年第1期190-202,共13页
Cluster analysis is one of the major data analysis methods widely used for many practical applications in emerging areas of data mining. A good clustering method will produce high quality clusters with high intra-clus... Cluster analysis is one of the major data analysis methods widely used for many practical applications in emerging areas of data mining. A good clustering method will produce high quality clusters with high intra-cluster similarity and low inter-cluster similarity. Clustering techniques are applied in different domains to predict future trends of available data and its uses for the real world. This research work is carried out to find the performance of two of the most delegated, partition based clustering algorithms namely k-Means and k-Medoids. A state of art analysis of these two algorithms is implemented and performance is analyzed based on their clustering result quality by means of its execution time and other components. Telecommunication data is the source data for this analysis. The connection oriented broadband data is given as input to find the clustering quality of the algorithms. Distance between the server locations and their connection is considered for clustering. Execution time for each algorithm is analyzed and the results are compared with one another. Results found in comparison study are satisfactory for the chosen application. 展开更多
关键词 K-MEANS algorithm k-medoids algorithm DATA CLUSTERING Time COMPLEXITY TELECOMMUNICATION DATA
暂未订购
An Algorithm Substitution Attack on Fiat-Shamir Signatures Based on Lattice
3
作者 LIU Jinhui YU Yong +2 位作者 WU Fusheng CHENG Yuehua ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2022年第1期17-25,共9页
Many evidences have showed that some intelligence agencies(often called big brother)attempt to monitor citizens’communication by providing coerced citizens a lot of subverted cryptographic algorithms and coercing the... Many evidences have showed that some intelligence agencies(often called big brother)attempt to monitor citizens’communication by providing coerced citizens a lot of subverted cryptographic algorithms and coercing them to adopt these algorithms.Since legalized services on large number of various applications and system architectures depend on digital signature techniques,in the context some coerced users who use double authentication preventing signatures to design some novel digital signature techniques,have some convincing dissertations to defuse requests from authorities and big brothers creating some corresponding subverted signatures.As rapid progress in quantum computers,National Security Agency advisory memorandum and announcement of National Institute of Standards and Technology procedures from standardization focus on some cryptographic algorithms which are post quantum secure.Motivated by these issues,we design an algorithm substitution attack against Fiat-Shamir family based on lattices(e.g.,BLISS,BG,Ring-TESLA,PASSSign and GLP)that are proven post-quantum computational secure.We also show an efficient deterable way to eliminate big brother’s threat by leaking signing keys from signatures on two messages to be public.Security proof shows that our schemes satisfy key extraction,undetectability and deterability.Through parameters analysis and performance evaluation,we demonstrate that our deterring subverted Fiat-Shamir signature is practical,which means that it can be applied to privacy and protection in some system architectures. 展开更多
关键词 algorithm substitution attack double authentication preventing signatures LATTICE ring-SIS(small integer solution)problem
原文传递
Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms
4
作者 Muhammad Fahad Khan Khalid Saleem +4 位作者 Mohammed Alotaibi Mohammad Mazyad Hazzazi Eid Rehman Aaqif Afzaal Abbasi Muhammad Asif Gondal 《Computers, Materials & Continua》 SCIE EI 2022年第11期2679-2696,共18页
Internet of Things is an ecosystem of interconnected devices that are accessible through the internet.The recent research focuses on adding more smartness and intelligence to these edge devices.This makes them suscept... Internet of Things is an ecosystem of interconnected devices that are accessible through the internet.The recent research focuses on adding more smartness and intelligence to these edge devices.This makes them susceptible to various kinds of security threats.These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field.In this regard,block cipher has been one of the most reliable options through which data security is accomplished.The strength of block encryption algorithms against different attacks is dependent on its nonlinear primitive which is called Substitution Boxes.For the design of S-boxes mainly algebraic and chaos-based techniques are used but researchers also found various weaknesses in these techniques.On the other side,literature endorse the true random numbers for information security due to the reason that,true random numbers are purely non-deterministic.In this paper firstly a natural dynamical phenomenon is utilized for the generation of true random numbers based S-boxes.Secondly,a systematic literature review was conducted to know which metaheuristic optimization technique is highly adopted in the current decade for the optimization of S-boxes.Based on the outcome of Systematic Literature Review(SLR),genetic algorithm is chosen for the optimization of s-boxes.The results of our method validate that the proposed dynamic S-boxes are effective for the block ciphers.Moreover,our results showed that the proposed substitution boxes achieve better cryptographic strength as compared with state-of-the-art techniques. 展开更多
关键词 IoT security sensors data encryption substitution box generation True Random Number Generators(TRNG) heuristic optimization genetic algorithm
在线阅读 下载PDF
The Majorization Order on Monomials and Termination of the Successive Difference Substitutions
5
作者 Jia XU Yong YAO 《Journal of Mathematical Research with Applications》 CSCD 2015年第2期229-236,共8页
We introduce a concept for the majorization order on monomials. With the help of this order, we derive a necessary condition on the positive termination of a general successive difference substitution algorithm (KSDS... We introduce a concept for the majorization order on monomials. With the help of this order, we derive a necessary condition on the positive termination of a general successive difference substitution algorithm (KSDS) for an input form f. 展开更多
关键词 successive difference substitution algorithm majorization order on monomials TERMINATION positive semi-definite form
原文传递
A survey on the Metaheuristics for Cryptanalysis of Substitution and Transposition Ciphers
6
作者 Arkan Kh Shakr Sabonchi Bahriye Akay 《Computer Systems Science & Engineering》 SCIE EI 2021年第10期87-106,共20页
This paper presents state-of-art cryptanalysis studies on attacks of the substitution and transposition ciphers using various metaheuristic algorithms.Traditional cryptanalysis methods employ an exhaustive search,whic... This paper presents state-of-art cryptanalysis studies on attacks of the substitution and transposition ciphers using various metaheuristic algorithms.Traditional cryptanalysis methods employ an exhaustive search,which is computationally expensive.Therefore,metaheuristics have attracted the interest of researchers in the cryptanalysis field.Metaheuristic algorithms are known for improving the search for the optimum solution and include Genetic Algorithm,Simulated Annealing,Tabu Search,Particle Swarm Optimization,Differential Evolution,Ant Colony,the Artificial Bee Colony,Cuckoo Search,and Firefly algorithms.The most important part of these various applications is deciding the fitness function to guide the search.This review presents how these algorithms have been implemented for cryptanalysis purposes.The paper highlights the results and findings of the studies and determines the gaps in the literature. 展开更多
关键词 CRYPTANALYSIS metaheuristic algorithms substitution cipher transposition cipher
在线阅读 下载PDF
由“变易之”与“还原法”看清代算家对“立术之由”的探究
7
作者 王鑫义 《内蒙古师范大学学报(自然科学版)》 2025年第4期363-368,共6页
清代算家在解决割圆捷术中的相关问题时,有时所设计的算法较为复杂,且同一问题设计的算法多样。《外切密率》中的“变易之”和“还原法”即是戴煦对同一问题而设计的不同算法。从具体操作和计算的复杂度上来看,戴煦对同一问题选择“变... 清代算家在解决割圆捷术中的相关问题时,有时所设计的算法较为复杂,且同一问题设计的算法多样。《外切密率》中的“变易之”和“还原法”即是戴煦对同一问题而设计的不同算法。从具体操作和计算的复杂度上来看,戴煦对同一问题选择“变易之”是考虑了割圆捷术中各项系数的分子变化规律,最终目标则是揭示“立术之由”。由此表明,在当时的割圆捷术算学圈中,算家在追求计算精度的同时,也在深入探究算法原理。 展开更多
关键词 变易之 还原法 《外切密率》 立术之由
在线阅读 下载PDF
融合AES算法和Hopfield ANN的网络数据加密传输技术
8
作者 孟轩 昝风彪 刘昕 《电子设计工程》 2025年第4期174-178,共5页
为有效保障网络数据的传输安全性,提出融合AES算法和Hopfield ANN的网络数据加密传输技术。在AES算法下实现基于AES算法的数据密钥生成。设计Hopfield ANN网络架构,利用AES算法的数据密钥定义传输序列,标定目标传输位置,实现网络数据加... 为有效保障网络数据的传输安全性,提出融合AES算法和Hopfield ANN的网络数据加密传输技术。在AES算法下实现基于AES算法的数据密钥生成。设计Hopfield ANN网络架构,利用AES算法的数据密钥定义传输序列,标定目标传输位置,实现网络数据加密传输技术方法的设计。实验结果表明,经上述方法加密后再向外传输的数据只能得到目标主机的认证,其他开放主机对于该类传输数据始终保持非响应状态,有效控制计算机网络的运行风险,提高了数据传输安全性。 展开更多
关键词 AES算法 Hopfield ANN网络 网络数据 加密传输 字节代换
在线阅读 下载PDF
S-box:six-dimensional compound hyperchaotic map and artificial bee colony algorithm 被引量:1
9
作者 Ye Tian Zhimao Lu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第1期232-241,共10页
Being as unique nonlinear components of block ciphers,substitution boxes(S-boxes) directly affect the security of the cryptographic systems.It is important and difficult to design cryptographically strong S-boxes th... Being as unique nonlinear components of block ciphers,substitution boxes(S-boxes) directly affect the security of the cryptographic systems.It is important and difficult to design cryptographically strong S-boxes that simultaneously meet with multiple cryptographic criteria such as bijection,non-linearity,strict avalanche criterion(SAC),bits independence criterion(BIC),differential probability(DP) and linear probability(LP).To deal with this problem,a chaotic S-box based on the artificial bee colony algorithm(CSABC) is designed.It uses the S-boxes generated by the six-dimensional compound hyperchaotic map as the initial individuals and employs ABC to improve their performance.In addition,it considers the nonlinearity and differential uniformity as the fitness functions.A series of experiments have been conducted to compare multiple cryptographic criteria of this algorithm with other algorithms.Simulation results show that the new algorithm has cryptographically strong S-box while meeting multiple cryptographic criteria. 展开更多
关键词 substitution boxes(S-boxes) multiple cryptographic criteria six-dimensional compound hyperchaotic map artificial bee colony algorithm(ABC).
在线阅读 下载PDF
支持密码逆向防火墙的基于SM9的属性基可搜索加密方案
10
作者 高改梅 段明博 +2 位作者 荀亚玲 刘春霞 党伟超 《计算机应用》 CSCD 北大核心 2024年第11期3495-3502,共8页
针对属性基可搜索加密(ABSE)方案大都基于非国密算法设计,且无法抵抗内部算法替换攻击(ASA)的问题,提出一种支持密码逆向防火墙的基于SM9的属性基可搜索加密方案(SM9ABSE-CRF)。该方案将国密算法SM9扩展至ABSE领域,实现了细粒度数据访... 针对属性基可搜索加密(ABSE)方案大都基于非国密算法设计,且无法抵抗内部算法替换攻击(ASA)的问题,提出一种支持密码逆向防火墙的基于SM9的属性基可搜索加密方案(SM9ABSE-CRF)。该方案将国密算法SM9扩展至ABSE领域,实现了细粒度数据访问控制,并引入密码逆向防火墙(CRF)技术有效抵御ASA。分析了SM9ABSE-CRF在判定性Diffie-Hellman(DBDH)假设下满足了选择关键词下的不可区分性,并形式化证明了CRF的部署满足维持功能性、保留安全性以及抵抗泄漏性。理论分析和仿真实验结果表明,与提供CRF的ABSE方案cABKSCRF(consistent Attribute-Based Keyword Search system with CRF)相比,SM9ABSE-CRF具有更高的安全性,并且在索引与陷门生成阶段也表现出显著的性能优势。 展开更多
关键词 密码逆向防火墙 可搜索加密 属性基加密 SM9算法 算法替换攻击
在线阅读 下载PDF
完备的IBE密码学逆向防火墙构造方法 被引量:2
11
作者 赵一 刘行 +1 位作者 明洋 杨波 《软件学报》 EI CSCD 北大核心 2024年第7期3482-3496,共15页
斯诺登事件后,以算法替换攻击为代表的后门攻击带来的威胁受到广泛关注.该类攻击通过不可检测的篡改密码协议参与方的算法流程,在算法中嵌入后门来获得秘密信息.为协议参与方配置密码学逆向防火墙(cryptographic reverse firewall,CRF)... 斯诺登事件后,以算法替换攻击为代表的后门攻击带来的威胁受到广泛关注.该类攻击通过不可检测的篡改密码协议参与方的算法流程,在算法中嵌入后门来获得秘密信息.为协议参与方配置密码学逆向防火墙(cryptographic reverse firewall,CRF)是抵抗算法替换攻击的主要手段.基于身份加密(identity-based encryption,IBE)作为一种广泛应用的公钥加密体制,亟需构建合适的CRF方案.然而,已有工作仅实现了CRF再随机化的功能,忽视了将用户私钥直接发送给作为第三方的CRF的安全风险.针对上述问题,首先给出适用于IBE的CRF安全性质的形式化定义和安全模型.其次提出可再随机化且密钥可延展的无安全信道IBE(rerandomizable and keymalleable secure channel free IBE,RKM-SFC-IBE)的形式化定义并给出传统IBE转化为RKM-SFC-IBE以及增加匿名性的方法.最后基于RKM-SFC-IBE给出对应CRF的一般性构造方法,并给出标准模型下IBE方案的CRF构造实例与性能优化方法.与已有工作相比,提出完备的适用于IBE的CRF安全模型,给出一般构造方法,明确为表达力更强的加密方案构造CRF时的基本原则. 展开更多
关键词 算法替换攻击 密码学逆向防火墙 无安全信道的基于身份加密 安全保持性
在线阅读 下载PDF
考虑订单替换的冷链配送-库存联合优化与仿真 被引量:1
12
作者 万远鹏 梁承姬 +1 位作者 王思洪 王钰 《系统仿真学报》 CAS CSCD 北大核心 2024年第3期578-594,共17页
冷链物流最重要的目的是保证产品新鲜度,而在此基础上如何降低订单配送的成本是冷链公司急需解决的问题。对消费者来说,产品的质量与食品安全是其主要的需求。因此以配送中心为研究对象,在配送之前根据产品初始新鲜度将产品分成不同的等... 冷链物流最重要的目的是保证产品新鲜度,而在此基础上如何降低订单配送的成本是冷链公司急需解决的问题。对消费者来说,产品的质量与食品安全是其主要的需求。因此以配送中心为研究对象,在配送之前根据产品初始新鲜度将产品分成不同的等级,通过对不符合配送要求的订单采用等级向上的替换模式来提升产品整体新鲜度,使客户尽可能获得更好质量的产品,确保顾客的需求得到满足,同时针对配送与库存分配问题进行联合优化,根据最低新鲜度、库存量等为约束建立了双层规划模型,其中上层模型以运输成本、货损成本等之和最小为目标以此确定订单配送以及库存分配方案,下层模型以订单替换成本最小为目标以此确定需要进行订单替换的订单以及替换的产品等级,通过提出改进的自适应遗传算法与cplex分别求解上下层模型,将求解得到的配送方案代入模拟了道路拥堵的仿真模型中进行验证并重新加入双层模型中进行规划;对算例求解的结果表明:订单替换可以有效降低冷链企业运营成本,获得更符合实际的订单配送与库存的分配方案。 展开更多
关键词 库存路径优化 新鲜度 订单替换 道路拥堵 冷链物流仿真 遗传算法
原文传递
无人机辅助多MEC服务器的任务完成率最大化方案 被引量:3
13
作者 刘伯阳 张浩然 +2 位作者 郭天润 王丽平 党儒鸽 《西安邮电大学学报》 2024年第5期19-29,共11页
针对传统移动边缘计算(Mobile Edge Computing,MEC)网络中的严重信道衰落以及单一MEC服务器计算资源有限的问题,提出一种无人机(Unmanned Aerial Vehicles,UAV)辅助多MEC服务器的任务完成率最大化方案。该方案联合优化任务卸载决策、计... 针对传统移动边缘计算(Mobile Edge Computing,MEC)网络中的严重信道衰落以及单一MEC服务器计算资源有限的问题,提出一种无人机(Unmanned Aerial Vehicles,UAV)辅助多MEC服务器的任务完成率最大化方案。该方案联合优化任务卸载决策、计算和通信资源及UAV轨迹,在满足信息因果关系约束、任务约束和轨迹约束的前提下,建立任务完成率最大化和UAV与用户加权能耗最小化问题。为求解该问题,采用交替优化算法将高度复杂问题解耦为任务卸载问题、资源分配问题和UAV轨迹设计问题,利用变量替换与拉格朗日对偶算法对任务卸载和资源分配问题转换后的凸问题进行迭代求解,并通过连续凸近似算法优化UAV轨迹。仿真结果表明,所提方案可以有效提高任务完成率并降低系统能耗,能够有效缓解信道衰落以及单一MEC服务器计算资源有限的问题。 展开更多
关键词 移动边缘计算 无人机 变量替换算法 拉格朗日对偶算法 连续凸近似算法
在线阅读 下载PDF
生成式人工智能对图书馆员的岗位替代——基于技术替代理论视角 被引量:3
14
作者 王小玮 《山东图书馆学刊》 2024年第3期72-78,共7页
技术的升级往往会对传统岗位产生替代,图书馆员也不例外。基于技术替代理论,分析了生成式人工智能对图书馆员岗位替代的理论机制,剖析了容易被技术替代的可能岗位,总结了岗位替代的效应和风险,提出了相应的干预对策。研究发现,依赖于生... 技术的升级往往会对传统岗位产生替代,图书馆员也不例外。基于技术替代理论,分析了生成式人工智能对图书馆员岗位替代的理论机制,剖析了容易被技术替代的可能岗位,总结了岗位替代的效应和风险,提出了相应的干预对策。研究发现,依赖于生成式人工智能带来的成本效率机制、性能超越机制以及技能偏置机制三条路径,传统图书馆员中的目录编制、信息检索、文献传递和流通服务等岗位面临被技术替代的可能性,这虽然在一定程度上能降低图书馆的成本,优化流程并推进数智化服务,但是会使图书馆面临着技术故障、机器依赖以及服务情感缺失等风险,需要从技能重塑与知识更新、工作重构与角色互补、机器互动与情感连接三条路径进行干预,实现人与机器的协同合作与双向奔赴。 展开更多
关键词 生成式人工智能 技术替代理论 算法 服务情感
在线阅读 下载PDF
Optimized air-ground data fusion method for mine slope modeling
15
作者 LIU Dan HUANG Man +4 位作者 TAO Zhigang HONG Chenjie WU Yuewei FAN En YANG Fei 《Journal of Mountain Science》 SCIE CSCD 2024年第6期2130-2139,共10页
Refined 3D modeling of mine slopes is pivotal for precise prediction of geological hazards.Aiming at the inadequacy of existing single modeling methods in comprehensively representing the overall and localized charact... Refined 3D modeling of mine slopes is pivotal for precise prediction of geological hazards.Aiming at the inadequacy of existing single modeling methods in comprehensively representing the overall and localized characteristics of mining slopes,this study introduces a new method that fuses model data from Unmanned aerial vehicles(UAV)tilt photogrammetry and 3D laser scanning through a data alignment algorithm based on control points.First,the mini batch K-Medoids algorithm is utilized to cluster the point cloud data from ground 3D laser scanning.Then,the elbow rule is applied to determine the optimal cluster number(K0),and the feature points are extracted.Next,the nearest neighbor point algorithm is employed to match the feature points obtained from UAV tilt photogrammetry,and the internal point coordinates are adjusted through the distanceweighted average to construct a 3D model.Finally,by integrating an engineering case study,the K0 value is determined to be 8,with a matching accuracy between the two model datasets ranging from 0.0669 to 1.0373 mm.Therefore,compared with the modeling method utilizing K-medoids clustering algorithm,the new modeling method significantly enhances the computational efficiency,the accuracy of selecting the optimal number of feature points in 3D laser scanning,and the precision of the 3D model derived from UAV tilt photogrammetry.This method provides a research foundation for constructing mine slope model. 展开更多
关键词 Air-ground data fusion method Mini batch k-medoids algorithm Ebow rule Optimal cluster number 3D laser scanning UAV tilt photogrammetry
原文传递
基于前推回代法的含DG配电网无功优化
16
作者 徐婕 俞斌 +1 位作者 白隆 顾晋豪 《自动化与仪表》 2024年第11期13-17,110,共6页
针对分布式电源接入配电网导致的潮流变化,电压稳定性降低等问题,提出了基于前推回代法的含分布式电源配电网无功优化的改进算法。以网损、电压波动和储能系统的总容量最小为目标函数建立无功优化模型,采用前推回代法结合改进的多目标... 针对分布式电源接入配电网导致的潮流变化,电压稳定性降低等问题,提出了基于前推回代法的含分布式电源配电网无功优化的改进算法。以网损、电压波动和储能系统的总容量最小为目标函数建立无功优化模型,采用前推回代法结合改进的多目标粒子群算法进行潮流计算,通过自适应调整惯性权重和适应度函数,显著提升了该算法的收敛速度。用IE333节点系统进行仿真分析,实验结果表明,该算法在求解含分布式电源的配电网无功优化表现出色,不仅有效降低网络损耗,提升电压的稳定性,还验证了分布式光伏电源的接入对系统电压具有支撑和调节作用。 展开更多
关键词 分布式电源 前推回代法 改进多目标粒子群算法 潮流计算 无功优化
在线阅读 下载PDF
WEKA数据挖掘平台及其二次开发 被引量:35
17
作者 陈慧萍 林莉莉 +1 位作者 王建东 苗新蕊 《计算机工程与应用》 CSCD 北大核心 2008年第19期76-79,共4页
在开源数据挖掘平台WEKA上进行了挖掘测试和分析,并分析了其存在的主要问题。为了克服WEKA系统在聚类方面的薄弱性,在WEKA的开源环境下进行二次开发,扩充了聚类算法。介绍了将k-中心点轮换算法嵌入到WEKA平台的过程,充分利用了开源WEKA... 在开源数据挖掘平台WEKA上进行了挖掘测试和分析,并分析了其存在的主要问题。为了克服WEKA系统在聚类方面的薄弱性,在WEKA的开源环境下进行二次开发,扩充了聚类算法。介绍了将k-中心点轮换算法嵌入到WEKA平台的过程,充分利用了开源WEKA中的类和可视化功能,并对嵌入的算法和原有聚类算法进行了对比分析。该算法改进了传统的k-中心点算法,避免陷入局部最优,而且它对初始点不太敏感,可以获取更好的聚类效果。 展开更多
关键词 数据挖掘 WEKA平台 聚类 k-中心点轮换算法
在线阅读 下载PDF
基于替代路径的路网连通可靠性评价方法研究 被引量:17
18
作者 郭继孚 高永 温慧敏 《公路交通科技》 CAS CSCD 北大核心 2007年第7期91-94,136,共5页
首先综述了路网可靠性的发展情况,重点阐述了传统连通可靠性的算法及其特点。传统连通可靠性算法考虑路段仅为0/1两种状态,即路段连通或者中断,不考虑网络交通流状态对出行连通质量的影响,不适用于路段密集的城市路网。在此基础上,提出... 首先综述了路网可靠性的发展情况,重点阐述了传统连通可靠性的算法及其特点。传统连通可靠性算法考虑路段仅为0/1两种状态,即路段连通或者中断,不考虑网络交通流状态对出行连通质量的影响,不适用于路段密集的城市路网。在此基础上,提出了替代路径的连通可靠性算法,假设城市路网出行中,当初选路径被破坏或不可选择时,替代路径的出行费用与初始路径出行费用差距越小,则出行的连通可靠性越高,出行服务质量越高。最后,提出了基于替代路径出行费用的连通可靠性评价数学模型,并进行了一个示范案例的应用。 展开更多
关键词 交通工程 评价算法 替代路径 连通可靠性
在线阅读 下载PDF
直链烷烃取代衍生物Wiener指数的简便计算方法 被引量:5
19
作者 丁伟 刘先军 +3 位作者 于涛 吴文祥 刘娜 张艳秋 《物理化学学报》 SCIE CAS CSCD 北大核心 2004年第11期1369-1371,共3页
根据直链烷烃衍生物分子拓扑结构的特点,将直链烷烃衍生物拆分为由直链单元和取代基团几个部分构成,再根据每部分的拓扑结构特点给出相应的计算公式.从而提出了一个计算直链烷烃衍生物Wiener指数的简便方法,达到简化计算的目的.该方法... 根据直链烷烃衍生物分子拓扑结构的特点,将直链烷烃衍生物拆分为由直链单元和取代基团几个部分构成,再根据每部分的拓扑结构特点给出相应的计算公式.从而提出了一个计算直链烷烃衍生物Wiener指数的简便方法,达到简化计算的目的.该方法简化了传统Wiener指数的计算方法,使Wiener指数的计算具有效率高、不易出错等优点,便于Wiener指数计算程序化,从而提高了Wiener指数的实用性. 展开更多
关键词 直链烷烃衍生物 WIENER指数 位置指数 计算方法
在线阅读 下载PDF
考虑产品需求可替代的再制造批量生产计划优化 被引量:11
20
作者 景熠 王旭 +1 位作者 李文川 陈明 《中国机械工程》 EI CAS CSCD 北大核心 2012年第18期2176-2181,共6页
针对制造/再制造混合生产场景下的批量计划问题,建立了库存和生产能力受限的混合整数规划模型。该模型考虑制造/再制造商将回收产品加工为两种质量不同的再制造产品,高质量的再制造产品与新产品具有同质性,且当其生产数量超过需求量时,... 针对制造/再制造混合生产场景下的批量计划问题,建立了库存和生产能力受限的混合整数规划模型。该模型考虑制造/再制造商将回收产品加工为两种质量不同的再制造产品,高质量的再制造产品与新产品具有同质性,且当其生产数量超过需求量时,可以作为低质量再制造产品的替代品进行销售。设计了一种改进的合作协同进化遗传算法,引入种群多样性评价,对代表个体的选择数量进行动态调整,从而平衡算法的计算复杂性和优化解性能。实例仿真计算表明,该算法具有更高的求解质量和求解效率。 展开更多
关键词 批量生产计划 再制造 遗传算法 需求替代 协同进化
在线阅读 下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部