According to the singularity problem in the working space of industrial robot, the reachability of robot is judged from the view of equation solution. Based on this, the optimal selection algorithm of multiple solutio...
详细信息
Resource matching is designed to make use of limited resources to optimize the processing task. In this paper, genetic algorithm is adopted to optimize the matching of resources. First, the principle of genetic algori...
详细信息
Resource matching is designed to make use of limited resources to optimize the processing task. In this paper, genetic algorithm is adopted to optimize the matching of resources. First, the principle of genetic algorithm and resource matching are introduced. Then, the detailed steps of genetic algorithm to solve resource matching are given. Finally, the simulation program is written by eclipse. By comparing with the prediction based resource matching algorithm, which is proved that the genetic algorithm has better superiority in time span and resource utilization ratio.
Based on the generalized additive model, we propose a CPP-GAM algorithm which transforms the non-linear problem into a linear one. We apply this algorithm to predict the closing price of international and domestic sto...
详细信息
The location-routing problem under emergency with simultaneous relief materials delivery and victim evacuation is studied and modeled. The number of victims is assumed ambiguous, risk preference of the decision maker ...
详细信息
The location-routing problem under emergency with simultaneous relief materials delivery and victim evacuation is studied and modeled. The number of victims is assumed ambiguous, risk preference of the decision maker is considered, and mixed transportation of relief and victims is allowed. A chance-constrained programming model is proposed based on the fuzzy credibility theory, and a genetic algorithm is designed to solve the problem.
In this paper, we analyze and extract the Tibetan text features structure based on k-means image character recognition algorithm. Through character library file generated from Tessract-ocr training, we improve the acc...
详细信息
In this paper, we analyze and extract the Tibetan text features structure based on k-means image character recognition algorithm. Through character library file generated from Tessract-ocr training, we improve the accuracy and recognition of image text recognition and extraction and realize the identification of Tibetan.
In order to protect the visual effect of 3D model, watermarking algorithm should have good invisibility, thus a novel frequency-domain watermarking method is proposed in this paper. Robust regions of 3D model are sele...
详细信息
The security problem of network devices and terminals has been attracted much attention. Many experts and scholars have done a lot of research on this. Based on the TNC three elements and three layers architecture, a ...
详细信息
The security problem of network devices and terminals has been attracted much attention. Many experts and scholars have done a lot of research on this. Based on the TNC three elements and three layers architecture, a new scheme about the network device and terminal connection and authentication is proposed, and the feasibility of the case is verified by experiments.
Generalized linear models are generally applied in statistical researches. Since a lot of real data reveal nonnormality especially skew-normality, new assumption is proposed that error terms follow skew-normal distrib...
详细信息
Generalized linear models are generally applied in statistical researches. Since a lot of real data reveal nonnormality especially skew-normality, new assumption is proposed that error terms follow skew-normal distribution to increase the adaptability of GLMs, which forms GLMSNs. To estimate the parameters in the linear part in models, penalized expectation maximization algorithm is extended. This paper focuses on the combination of skew-normal data and GLMs to get more robust results. Several applications and empirical analyses are given to fit GLMSNs and models selection is presented by Bayesian information criterion.
A lot of learning algorithms for deep layered network are sincerely suffered from complex computation and slow convergence because of a very large number of free parameters. We need to develop an efficient algorithm f...
详细信息
ISBN:
(纸本)9781450363396
A lot of learning algorithms for deep layered network are sincerely suffered from complex computation and slow convergence because of a very large number of free parameters. We need to develop an efficient algorithm for deep neural network. The Kalman filter concept can be applied to parameter estimation of neural network to improve computation performance. The algorithms based extended Kalman filter has a serious drawback in its computational complexity. We discuss how a fast algorithm should be developed for reduction in computation time.
In recent years, with the rapid development of wireless mobile network and smart phone operating systems, various social software based on wireless Internet has emerged one after another. Current popular social softwa...
详细信息
ISBN:
(纸本)9781510864696
In recent years, with the rapid development of wireless mobile network and smart phone operating systems, various social software based on wireless Internet has emerged one after another. Current popular social software such as QQ and We Chat have become important tools for people to meet new friends. At present, existing social software can recommend other users in the vicinity according to the geographical location of the user. However, this method does not consider the user's interests, hobbies, etc. So that the effectiveness of such a friend recommmendation system is often unsatisfactory. In order to solve the above problems, a personalized friend recommendation system based on geolocation information and user content is designed and developed. In this system, not only the geolocation information of the user is considered, but also the features of the user's published statuses are extracted, aiming to recommend more similar other users to the user. After testing, the effectiveness of the proposed method is verified.
暂无评论