期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
Performance vs.Complexity Comparative Analysis of Multimodal Bilinear Pooling Fusion Approaches for Deep Learning-Based Visual Arabic-Question Answering Systems
1
作者 Sarah M.Kamel Mai A.Fadel +1 位作者 Lamiaa Elrefaei Shimaa I.Hassan 《Computer Modeling in Engineering & Sciences》 2025年第4期373-411,共39页
Visual question answering(VQA)is a multimodal task,involving a deep understanding of the image scene and the question’s meaning and capturing the relevant correlations between both modalities to infer the appropriate... Visual question answering(VQA)is a multimodal task,involving a deep understanding of the image scene and the question’s meaning and capturing the relevant correlations between both modalities to infer the appropriate answer.In this paper,we propose a VQA system intended to answer yes/no questions about real-world images,in Arabic.To support a robust VQA system,we work in two directions:(1)Using deep neural networks to semantically represent the given image and question in a fine-grainedmanner,namely ResNet-152 and Gated Recurrent Units(GRU).(2)Studying the role of the utilizedmultimodal bilinear pooling fusion technique in the trade-o.between the model complexity and the overall model performance.Some fusion techniques could significantly increase the model complexity,which seriously limits their applicability for VQA models.So far,there is no evidence of how efficient these multimodal bilinear pooling fusion techniques are for VQA systems dedicated to yes/no questions.Hence,a comparative analysis is conducted between eight bilinear pooling fusion techniques,in terms of their ability to reduce themodel complexity and improve themodel performance in this case of VQA systems.Experiments indicate that these multimodal bilinear pooling fusion techniques have improved the VQA model’s performance,until reaching the best performance of 89.25%.Further,experiments have proven that the number of answers in the developed VQA system is a critical factor that a.ects the effectiveness of these multimodal bilinear pooling techniques in achieving their main objective of reducing the model complexity.The Multimodal Local Perception Bilinear Pooling(MLPB)technique has shown the best balance between the model complexity and its performance,for VQA systems designed to answer yes/no questions. 展开更多
关键词 Arabic-VQA deep learning-based VQA deep multimodal information fusion multimodal representation learning VQA of yes/no questions VQA model complexity VQA model performance performance-complexity trade-off
在线阅读 下载PDF
A Hybrid Model for Reliability Aware and Energy-Efficiency in Multicore Systems 被引量:1
2
作者 Samar Nour Sameh A.Salem Shahira M.Habashy 《Computers, Materials & Continua》 SCIE EI 2022年第3期4447-4466,共20页
Recently,Multicore systems use Dynamic Voltage/Frequency Scaling(DV/FS)technology to allow the cores to operate with various voltage and/or frequencies than other cores to save power and enhance the performance.In thi... Recently,Multicore systems use Dynamic Voltage/Frequency Scaling(DV/FS)technology to allow the cores to operate with various voltage and/or frequencies than other cores to save power and enhance the performance.In this paper,an effective and reliable hybridmodel to reduce the energy and makespan in multicore systems is proposed.The proposed hybrid model enhances and integrates the greedy approach with dynamic programming to achieve optimal Voltage/Frequency(Vmin/F)levels.Then,the allocation process is applied based on the availableworkloads.The hybrid model consists of three stages.The first stage gets the optimum safe voltage while the second stage sets the level of energy efficiency,and finally,the third is the allocation stage.Experimental results on various benchmarks show that the proposed model can generate optimal solutions to save energy while minimizing the makespan penalty.Comparisons with other competitive algorithms show that the proposed model provides on average 48%improvements in energy-saving and achieves an 18%reduction in computation time while ensuring a high degree of system reliability. 展开更多
关键词 ENERGY-EFFICIENCY safe voltage multicore processors core utilization dynamic voltage/frequency scaling MAKESPAN
在线阅读 下载PDF
Compression of ECG Signal Based on Compressive Sensing and the Extraction of Significant Features 被引量:2
3
作者 Mohammed M. Abo-Zahhad Aziza I. Hussein Abdelfatah M. Mohamed 《International Journal of Communications, Network and System Sciences》 2015年第5期97-117,共21页
Diagnoses of heart diseases can be done effectively on long term recordings of ECG signals that preserve the signals’ morphologies. In these cases, the volume of the ECG data produced by the monitoring systems grows ... Diagnoses of heart diseases can be done effectively on long term recordings of ECG signals that preserve the signals’ morphologies. In these cases, the volume of the ECG data produced by the monitoring systems grows significantly. To make the mobile healthcare possible, the need for efficient ECG signal compression algorithms to store and/or transmit the signal efficiently has been rising exponentially. Currently, ECG signal is acquired at Nyquist rate or higher, thus introducing redundancies between adjacent heartbeats due to its quasi-periodic structure. Existing compression methods remove these redundancies by achieving compression and facilitate transmission of the patient’s imperative information. Based on the fact that these signals can be approximated by a linear combination of a few coefficients taken from different basis, an alternative new compression scheme based on Compressive Sensing (CS) has been proposed. CS provides a new approach concerned with signal compression and recovery by exploiting the fact that ECG signal can be reconstructed by acquiring a relatively small number of samples in the “sparse” domains through well-developed optimization procedures. In this paper, a single-lead ECG compression method has been proposed based on improving the signal sparisty through the extraction of the signal significant features. The proposed method starts with a preprocessing stage that detects the peaks and periods of the Q, R and S waves of each beat. Then, the QRS-complex for each signal beat is estimated. The estimated QRS-complexes are subtracted from the original ECG signal and the resulting error signal is compressed using the CS technique. Throughout this process, DWT sparsifying dictionaries have been adopted. The performance of the proposed algorithm, in terms of the reconstructed signal quality and compression ratio, is evaluated by adopting DWT spatial domain basis applied to ECG records extracted from the MIT-BIH Arrhythmia Database. The results indicate that average compression ratio of 11:1 with PRD1 = 1.2% are obtained. Moreover, the quality of the retrieved signal is guaranteed and the compression ratio achieved is an improvement over those obtained by previously reported algorithms. Simulation results suggest that CS should be considered as an acceptable methodology for ECG compression. 展开更多
关键词 Compressed Sensing ECG SIGNAL Compression SPARSITY COHERENCE Spatial DOMAIN
暂未订购
Course Evaluation Based on Deep Learning and SSA Hyperparameters Optimization 被引量:1
4
作者 Alaa A.El-Demerdash Sherif E.Hussein John FW Zaki 《Computers, Materials & Continua》 SCIE EI 2022年第4期941-959,共19页
Sentiment analysis attracts the attention of Egyptian Decisionmakers in the education sector.It offers a viable method to assess education quality services based on the students’feedback as well as that provides an u... Sentiment analysis attracts the attention of Egyptian Decisionmakers in the education sector.It offers a viable method to assess education quality services based on the students’feedback as well as that provides an understanding of their needs.As machine learning techniques offer automated strategies to process big data derived from social media and other digital channels,this research uses a dataset for tweets’sentiments to assess a few machine learning techniques.After dataset preprocessing to remove symbols,necessary stemming and lemmatization is performed for features extraction.This is followed by several machine learning techniques and a proposed Long Short-Term Memory(LSTM)classifier optimized by the Salp Swarm Algorithm(SSA)and measured the corresponding performance.Then,the validity and accuracy of commonly used classifiers,such as Support Vector Machine,Logistic Regression Classifier,and Naive Bayes classifier,were reviewed.Moreover,LSTM based on the SSA classification model was compared with Support Vector Machine(SVM),Logistic Regression(LR),and Naive Bayes(NB).Finally,as LSTM based SSA achieved the highest accuracy,it was applied to predict the sentiments of students’feedback and evaluate their association with the course outcome evaluations for education quality purposes. 展开更多
关键词 Sentiment analysis course evaluation deep learning Bi-LSTM opinion mining students feedback natural language processing machine learning tweets analysis SSA
在线阅读 下载PDF
Wireless Sensor Networks Routing Attacks Prevention with Blockchain and Deep Neural Network 被引量:1
5
作者 Mohamed Ali Ibrahim A.Abd El-Moghith +1 位作者 Mohamed N.El-Derini Saad M.Darwish 《Computers, Materials & Continua》 SCIE EI 2022年第3期6127-6140,共14页
Routing is a key function inWireless Sensor Networks(WSNs)since it facilitates data transfer to base stations.Routing attacks have the potential to destroy and degrade the functionality ofWSNs.A trustworthy routing sy... Routing is a key function inWireless Sensor Networks(WSNs)since it facilitates data transfer to base stations.Routing attacks have the potential to destroy and degrade the functionality ofWSNs.A trustworthy routing system is essential for routing security andWSN efficiency.Numerous methods have been implemented to build trust between routing nodes,including the use of cryptographic methods and centralized routing.Nonetheless,the majority of routing techniques are unworkable in reality due to the difficulty of properly identifying untrusted routing node activities.At the moment,there is no effective way to avoid malicious node attacks.As a consequence of these concerns,this paper proposes a trusted routing technique that combines blockchain infrastructure,deep neural networks,and Markov Decision Processes(MDPs)to improve the security and efficiency of WSN routing.To authenticate the transmission process,the suggested methodology makes use of a Proof of Authority(PoA)mechanism inside the blockchain network.The validation group required for proofing is chosen using a deep learning approach that prioritizes each node’s characteristics.MDPs are then utilized to determine the suitable next-hop as a forwarding node capable of securely transmitting messages.According to testing data,our routing system outperforms current routing algorithms in a 50%malicious node routing scenario. 展开更多
关键词 Wireless sensor networks trusted routing deep neural network blockchain markov decision
在线阅读 下载PDF
Deep Forest-Based Fall Detection in Internet of Medical Things Environment 被引量:1
6
作者 Mohamed Esmail Karar Omar Reyad Hazem Ibrahim Shehata 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2377-2389,共13页
This article introduces a new medical internet of things(IoT)framework for intelligent fall detection system of senior people based on our proposed deep forest model.The cascade multi-layer structure of deep forest cl... This article introduces a new medical internet of things(IoT)framework for intelligent fall detection system of senior people based on our proposed deep forest model.The cascade multi-layer structure of deep forest classifier allows to generate new features at each level with minimal hyperparameters compared to deep neural networks.Moreover,the optimal number of the deep forest layers is automatically estimated based on the early stopping criteria of validation accuracy value at each generated layer.The suggested forest classifier was successfully tested and evaluated using a public SmartFall dataset,which is acquired from three-axis accelerometer in a smartwatch.It includes 92781 training samples and 91025 testing samples with two labeled classes,namely non-fall and fall.Classification results of our deep forest classifier demonstrated a superior performance with the best accuracy score of 98.0%compared to three machine learning models,i.e.,K-nearest neighbors,decision trees and traditional random forest,and two deep learning models,which are dense neural networks and convolutional neural networks.By considering security and privacy aspects in the future work,our proposed medical IoT framework for fall detection of old people is valid for real-time healthcare application deployment. 展开更多
关键词 Elderly population fall detection wireless sensor networks internet of medical things deep forest
在线阅读 下载PDF
Methodology for Detecting Strabismus through Video Analysis and Intelligent Mining Techniques
7
作者 Hanan Abdullah Mengash Hanan A.Hosni Mahmoud 《Computers, Materials & Continua》 SCIE EI 2021年第4期1013-1032,共20页
:Strabismus is a medical condition that is defined as the lack of coordination between the eyes.When Strabismus is detected at an early age,the chances of curing it are higher.The methods used to detect strabismus and... :Strabismus is a medical condition that is defined as the lack of coordination between the eyes.When Strabismus is detected at an early age,the chances of curing it are higher.The methods used to detect strabismus and measure its degree of deviation are complex and time-consuming,and they always require the presence of a physician.In this paper,we present a method of detecting strabismus and measuring its degree of deviation using videos of the patient’s eye region under a cover test.Our method involves extracting features from a set of training videos(training corpora)and using them to build a classifier.A decision tree(ID3)is built using labeled cases from actual strabismus diagnosis.Patterns are extracted from the corresponding videos of patients,and an association between the extracted features and actual diagnoses is established.Matching Rules from the correlation plot are used to predict diagnoses for future patients.The classifier was tested using a set of testing videos(testing corpora).The results showed 95.9%accuracy,4.1%were light cases and could not be detected correctly from the videos,half of them were false positive and the other half was false negative. 展开更多
关键词 Data mining STRABISMUS video analysis angle of deviation decision tree
在线阅读 下载PDF
Software Development of Linear Programming Algorithms for Decision Analysis Applications
8
作者 Mats Danielson Love Ekenberg 《通讯和计算机(中英文版)》 2011年第9期793-806,共14页
关键词 应用软件开发 线性规划算法 决策分析 面向对象的设计 概率问题 评价方法 公用事业 软件设计
在线阅读 下载PDF
Sketches toward a Theory of Every Thin/kin/g
9
作者 Ame Kjellman 《Journal of Philosophy Study》 2013年第8期685-705,共21页
The status of the social and human sciences as genuine sciences on a par with the natural sciences has widely been held in doubt, and the subject-oriented approach (SOA) to knowledge also shows the traditional scien... The status of the social and human sciences as genuine sciences on a par with the natural sciences has widely been held in doubt, and the subject-oriented approach (SOA) to knowledge also shows the traditional scientific view to be misleaded. Its shows that it is mandatory to dismiss the idea that personal knowledge is a representation of a common world created by some God, and also the mistake to take the seductive noun/verb structure as for given. We need a new methodological paradigm of science--an approach that avoids the pitfalls of dualism and realism--and take the effort to couch its thinking in a re-interpretation of natural language. This line of reasoning paves the way for the SOA--a new epistemology that takes the individual knower and its feelings as the coherent point of departure. The traits of a new foundation are sketched and to that end a bootstrap model is proposed that departs from the early man's first experience. In doing so, we, in a subject-oriented manner, can bring man's living experience and his priverse (or private universe), under the collective umbrella of a consensual science. This approach brings the promise to provide a sound theory of everything-or rather a theory of every thin/kin/g-which in one step removes the cleft between the natural and social sciences. 展开更多
关键词 SEMIOSIS knowledge experience communication CONVENTION scientific consensus MONISM
在线阅读 下载PDF
Adequation of a Virtual Immersive Environment for a Learning-Teaching Interaction Using the Limem 3d Method
10
作者 Diego Mauricio Torres Arias Helmuth Trefftz 《通讯和计算机(中英文版)》 2015年第2期57-66,共10页
关键词 虚拟环境 学习过程 教学互动 3D 数字世界 用户交互 教育过程 语言学习
在线阅读 下载PDF
Compressive Sensing Algorithms for Signal Processing Applications: A Survey 被引量:7
11
作者 Mohammed M. Abo-Zahhad Aziza I. Hussein Abdelfatah M. Mohamed 《International Journal of Communications, Network and System Sciences》 2015年第6期197-216,共20页
In digital signal processing (DSP), Nyquistrate sampling completely describes a signal by exploiting its bandlimitedness. Compressed Sensing (CS), also known as compressive sampling, is a DSP technique efficiently acq... In digital signal processing (DSP), Nyquistrate sampling completely describes a signal by exploiting its bandlimitedness. Compressed Sensing (CS), also known as compressive sampling, is a DSP technique efficiently acquiring and reconstructing a signal completely from reduced number of measurements, by exploiting its compressibility. The measurements are not point samples but more general linear functions of the signal. CS can capture and represent sparse signals at a rate significantly lower than ordinarily used in the Shannon’s sampling theorem. It is interesting to notice that most signals in reality are sparse;especially when they are represented in some domain (such as the wavelet domain) where many coefficients are close to or equal to zero. A signal is called K-sparse, if it can be exactly represented by a basis, , and a set of coefficients , where only K coefficients are nonzero. A signal is called approximately K-sparse, if it can be represented up to a certain accuracy using K non-zero coefficients. As an example, a K-sparse signal is the class of signals that are the sum of K sinusoids chosen from the N harmonics of the observed time interval. Taking the DFT of any such signal would render only K non-zero values . An example of approximately sparse signals is when the coefficients , sorted by magnitude, decrease following a power law. In this case the sparse approximation constructed by choosing the K largest coefficients is guaranteed to have an approximation error that decreases with the same power law as the coefficients. The main limitation of CS-based systems is that they are employing iterative algorithms to recover the signal. The sealgorithms are slow and the hardware solution has become crucial for higher performance and speed. This technique enables fewer data samples than traditionally required when capturing a signal with relatively high bandwidth, but a low information rate. As a main feature of CS, efficient algorithms such as -minimization can be used for recovery. This paper gives a survey of both theoretical and numerical aspects of compressive sensing technique and its applications. The theory of CS has many potential applications in signal processing, wireless communication, cognitive radio and medical imaging. 展开更多
关键词 COMPRESSIVE SENSING Shannon Sampling Theory SENSING MATRICES SPARSITY COHERENCE
在线阅读 下载PDF
Brain Cancer Tumor Classification from Motion-Corrected MRI Images Using Convolutional Neural Network 被引量:3
12
作者 Hanan Abdullah Mengash Hanan A.Hosni Mahmoud 《Computers, Materials & Continua》 SCIE EI 2021年第8期1551-1563,共13页
Detection of brain tumors in MRI images is the first step in brain cancer diagnosis.The accuracy of the diagnosis depends highly on the expertise of radiologists.Therefore,automated diagnosis of brain cancer from MRI ... Detection of brain tumors in MRI images is the first step in brain cancer diagnosis.The accuracy of the diagnosis depends highly on the expertise of radiologists.Therefore,automated diagnosis of brain cancer from MRI is receiving a large amount of attention.Also,MRI tumor detection is usually followed by a biopsy(an invasive procedure),which is a medical procedure for brain tumor classification.It is of high importance to devise automated methods to aid radiologists in brain cancer tumor diagnosis without resorting to invasive procedures.Convolutional neural network(CNN)is deemed to be one of the best machine learning algorithms to achieve high-accuracy results in tumor identification and classification.In this paper,a CNN-based technique for brain tumor classification has been developed.The proposed CNN can distinguish between normal(no-cancer),astrocytoma tumors,gliomatosis cerebri tumors,and glioblastoma tumors.The implemented CNN was tested on MRI images that underwent a motion-correction procedure.The CNN was evaluated using two performance measurement procedures.The first one is a k-fold cross-validation testing method,in which we tested the dataset using k=8,10,12,and 14.The best accuracy for this procedure was 96.26%when k=10.To overcome the over-fitting problem that could be occurred in the k-fold testing method,we used a hold-out testing method as a second evaluation procedure.The results of this procedure succeeded in attaining 97.8%accuracy,with a specificity of 99.2%and a sensitivity of 97.32%.With this high accuracy,the developed CNN architecture could be considered an effective automated diagnosis method for the classification of brain tumors from MRI images. 展开更多
关键词 CLASSIFICATION convolutional neural network tumor classification MRI deep learning k-fold cross classification
在线阅读 下载PDF
AVLINK: Robust Clustering Algorithm based on Average Link Applied to Protein Sequence Analysis 被引量:1
13
作者 Mohamed A. Mahfouz 《Journal of Mathematics and System Science》 2016年第5期205-214,共10页
Robust Clustering methods are aimed at avoiding unsatisfactory results resulting from the presence of certain amount of outlying observations in the input data of many practical applications such as biological sequenc... Robust Clustering methods are aimed at avoiding unsatisfactory results resulting from the presence of certain amount of outlying observations in the input data of many practical applications such as biological sequences analysis or gene expressions analysis. This paper presents a fuzzy clustering algorithm based on average link and possibilistic clustering paradigm termed as AVLINK. It minimizes the average dissimilarity between pairs of patterns within the same cluster and at the same time the size of a cluster is maximized by computing the zeros of the derivative of proposed objective function. AVLINK along with the proposed initialization procedure show a high outliers rejection capability as it makes their membership very low furthermore it does not requires the number of clusters to be known in advance and it can discover clusters of non convex shape. The effectiveness and robustness of the proposed algorithms have been demonstrated on different types of protein data sets. 展开更多
关键词 Data Mining Fuzzy Clustering Relational Clustering Hierarchical Clustering Bioinformatics.
在线阅读 下载PDF
Robust Malicious Executable Detection Using Host-Based Machine Learning Classifier
14
作者 Khaled Soliman Mohamed Sobh Ayman M.Bahaa-Eldin 《Computers, Materials & Continua》 SCIE EI 2024年第4期1419-1439,共21页
The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are ins... The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are insufficientto prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious ExecutableDetection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE)files in hosts using Windows operating systems through collecting PE headers and applying machine learningmechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031benign files and 179,071 malware samples from diverse sources to ensure the efficiency of RMED approach.The most effective PE headers that can highly differentiate between benign and malware files were selected totrain the model on 15 PE features to speed up the classification process and achieve real-time detection formalicious executables. The evaluation results showed that RMED succeeded in shrinking the classification timeto 91 milliseconds for each file while reaching an accuracy of 98.42% with a false positive rate equal to 1.58. Inconclusion, this paper contributes to the field of cybersecurity by presenting a comprehensive framework thatleverages Artificial Intelligence (AI) methods to proactively detect and prevent cyber-attacks. 展开更多
关键词 Portable executable MALWARE intrusion detection CYBERSECURITY zero-day threats Host IntrusionDetection System(HIDS) machine learning Anomaly-based Intrusion Detection System(AIDS) deep learning
在线阅读 下载PDF
Conditional Statement Dependent Communications
15
作者 Yngve Monfelt 《通讯和计算机(中英文版)》 2013年第11期1374-1380,共7页
关键词 条件语句 通讯 道义逻辑 安全通信 供热企业 活动水平 基础设施 环保技术
在线阅读 下载PDF
Predicting Amazon customer reviews with deep confidence using deep learning and conformal prediction 被引量:3
16
作者 Ulf Norinder Petra Norinder 《Journal of Management Analytics》 EI 2022年第1期1-16,共16页
In this investigation,we have shown that the combination of deep learning,including natural language processing,and conformal prediction results in highly predictive and efficient temporal test set sentiment estimates... In this investigation,we have shown that the combination of deep learning,including natural language processing,and conformal prediction results in highly predictive and efficient temporal test set sentiment estimates for 12 categories of Amazon product reviews using either in-category predictions,i.e.the model and the test set are from the same review category or cross-category predictions,i.e.using a model of another review category for predicting the test set.The similar results from in-and cross-category predictions indicate high degree of generalizability across product review categories.The investigation also shows that the combination of deep learning and conformal prediction gracefully handles class imbalances without explicit class balancing measures. 展开更多
关键词 Amazon customer reviews machine learning conformal prediction deep learning natural language processing temporal test sets
原文传递
Linearly and Quadratically Separable Classifiers Using Adaptive Approach 被引量:1
17
作者 Mohamed Abdel-Kawy Mohamed Ali Soliman Rasha M.Abo-Bakr 《Journal of Computer Science & Technology》 SCIE EI CSCD 2011年第5期908-918,共11页
This paper presents a fast adaptive iterative algorithm to solve linearly separable classification problems in R n.In each iteration,a subset of the sampling data (n-points,where n is the number of features) is adap... This paper presents a fast adaptive iterative algorithm to solve linearly separable classification problems in R n.In each iteration,a subset of the sampling data (n-points,where n is the number of features) is adaptively chosen and a hyperplane is constructed such that it separates the chosen n-points at a margin and best classifies the remaining points.The classification problem is formulated and the details of the algorithm are presented.Further,the algorithm is extended to solving quadratically separable classification problems.The basic idea is based on mapping the physical space to another larger one where the problem becomes linearly separable.Numerical illustrations show that few iteration steps are sufficient for convergence when classes are linearly separable.For nonlinearly separable data,given a specified maximum number of iteration steps,the algorithm returns the best hyperplane that minimizes the number of misclassified points occurring through these steps.Comparisons with other machine learning algorithms on practical and benchmark datasets are also presented,showing the performance of the proposed algorithm. 展开更多
关键词 linear classification quadratic classification iterative approach adaptive technique
原文传递
Pricing and Inventory Control Strategy for a Periodic-Review Energy Buy-Back System 被引量:1
18
作者 ZHANG Jihong CHEN Hongqiao +1 位作者 DING Xiaosong LI Xian 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2016年第4期1018-1033,共16页
Along with the rapid development of economics and enhancement of industrialization, the power demand keeps rising and frequently creates mismatch between demand and supply in electricity.This provides miscellaneous en... Along with the rapid development of economics and enhancement of industrialization, the power demand keeps rising and frequently creates mismatch between demand and supply in electricity.This provides miscellaneous energy buy-back programs with great opportunities. Such programs, when activated, offer certain amount of financial compensations to participants for reducing their energy consumption during peak time. They aim at encouraging participants to shift their electricity usage from peak to non-peak time, and thereby release the demand pressure during peak time. This paper considers a periodic-review joint pricing and inventory decision model under an energy buy-back program over finite planning horizons, in which the compensation levels, setup cost and additive random demand function are incorporated. The objective is to maximize a manufacturer's expected total profit.By using Veinott's conditions, it is shown that the manufacturer's optimal decision is a state dependent(s, S, P) policy under a peak market condition, or partly an(s, S, A, P) policy under the normal market condition. 展开更多
关键词 Additive demand function energy buy-back program joint pricing and inventory control Veinott's conditions.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部