Recently, a constructive algorithm based on asymptotic expansions was proposed for computing water waves of large amplitude, in the absence of stagnation points, by one of the authors in Kalimeris (Real World Appl Non...
详细信息
Recently, a constructive algorithm based on asymptotic expansions was proposed for computing water waves of large amplitude, in the absence of stagnation points, by one of the authors in Kalimeris (Real World Appl Nonlinear Anal 37:182-212, 2017). Here, we perform a numerical implementation of this algorithm, verifying the analytical results and, indeed, computing large amplitude waves. Furthermore, we introduce a modification of the existing analytical procedure, which allows the computation of waves with variable vorticity by a straightforward adaptation of the current algorithm. Profiles and other features of water waves are presented for constant and some cases of variable vorticity.
We consider the problem of synthesizing multipIe-valued logic functions by neural networks. A genetic algorithm (GA) which finds the longest strip in V subset of or equal to K (n) is described. A strip contains points...
详细信息
We consider the problem of synthesizing multipIe-valued logic functions by neural networks. A genetic algorithm (GA) which finds the longest strip in V subset of or equal to K (n) is described. A strip contains points located between two parallel hyperplanes. Repeated application of GA partitions the space V into certain number of strips, each of them corresponding to a hidden unit. We construct two neural networks based on these hidden units and show that they correctly compute the given but arbitrary multiple-valued function. Preliminary experimental results are presented and discussed.
This paper focuses on the problem of determining a permutation schedule for n jobs in an m-machine flow shop that operates in a sequence-dependent setup time (SDST) environment. Two constructive heuristic algorithms a...
详细信息
This paper focuses on the problem of determining a permutation schedule for n jobs in an m-machine flow shop that operates in a sequence-dependent setup time (SDST) environment. Two constructive heuristic algorithms are developed with the minimisation of makespan as the objective. The first heuristic algorithm termed as setup ranking algorithm obtains the sequence using the setup times of jobs only. The second heuristic algorithm, fictitious job setup ranking algorithm (FJSRA), is developed using the concept of fictitious jobs. Pairs of jobs with minimum setup time between them constitute the fictitious jobs. Both these algorithms are compared with an existing constructive algorithm. For the purpose of experimentation, Taillard benchmark problems are used to develop SDST benchmark problems at eight different levels of sequence-dependent setup times. Graphical analysis, relative performance index analysis and statistical analysis are carried out on the results obtained for all the eight sets of benchmark problems. The analysis reveals that FJSRA emerges as the better algorithm for larger problems and for smaller problems with higher level of setup time. The results of statistical analysis are used to develop setup time dominance matrix for deciding upon the algorithm to be used for a particular size of problem.
Feature construction has been shown to be an useful technique to improve the efficiency of extracting information from raw data. We develop a modified feature construction algorithm, using correlation information amon...
详细信息
Feature construction has been shown to be an useful technique to improve the efficiency of extracting information from raw data. We develop a modified feature construction algorithm, using correlation information among the initial set of features, and study its performance. Feed-forward neural networks, using the back-propagation algorithm to learn, have been shown to have excellent properties while plagued with the problem of time needed to learn concepts. We alleviate this inherent problem with the back-propagation algorithm using data pre-processed by the proposed feature construction algorithm. Initial results suggest that this methodology can be beneficially used along with other means of improving the learning performance in feed-forward neural networks.
Checkerboard patterns belong to a special class of 2-stage guillotine patterns that require less machine time to be cut. In this paper we propose an enumerative algorithm to generate exact constrained checkerboard pat...
详细信息
Checkerboard patterns belong to a special class of 2-stage guillotine patterns that require less machine time to be cut. In this paper we propose an enumerative algorithm to generate exact constrained checkerboard patterns. At each node of the enumeration tree a constructive procedure is used to generate a feasible pattern. In addition, an upper bound on the objective function value is calculated to decide whether further branching from the node is worth. The algorithm was implemented and computational tests were performed. The test results indicate that the proposed scheme outperforms previous methods of the literature in terms of execution times. (c) 2006 Published by Elsevier Ltd.
This paper presents a novel hybrid algorithm for feedforward neural networks, called a self organizing map-based initialization for hybrid training based on a two stage learning approach. First stage, a structure lear...
详细信息
This paper presents a novel hybrid algorithm for feedforward neural networks, called a self organizing map-based initialization for hybrid training based on a two stage learning approach. First stage, a structure learning scheme which includes adding hidden neurons is used to determine the network size. Second stage, a FN (fuzzy neighborhood)-based hybrid learning scheme which we have recently proposed is used to adjust the network parameters. In this approach the weights between input and hidden layers are firstly adjusted by Kohonen algorithm with fuzzy neighborhood, whereas the weights connecting hidden and output layers are adjusted using gradient descent method. Four simulation examples are provided to demonstrate the efficiency of the approach compared with other well-known and recently proposed learning methods. (C) 2011 Elsevier B.V. All rights reserved.
This paper describes the cascade neural network design algorithm (CNNDA), a new algorithm for designing compact, two-hidden-layer artificial neural networks (ANNs). This algorithm determines an ANN's architecture ...
详细信息
This paper describes the cascade neural network design algorithm (CNNDA), a new algorithm for designing compact, two-hidden-layer artificial neural networks (ANNs). This algorithm determines an ANN's architecture with connection weights automatically. The design strategy used in the CNNDA was intended to optimize both the generalization ability and the training time of ANNs. In order to improve the generalization ability, the CNDDA uses a combination of constructive and pruning algorithms and bounded fan-ins of the hidden nodes. A new training approach, by which the input weights of a hidden node are temporarily frozen when its output does not change much after a few successive training cycles, was used in the CNNDA for reducing the computational cost and the training time. The CNNDA was tested on several benchmarks including the cancer, diabetes and character-recognition problems in ANNs. The experimental results show that the CNNDA can produce compact ANNs with good generalization ability and short training time in comparison with other algorithms. (C) 2001 Elsevier Science Ltd. All rights reserved.
In this article we derive a complete characterization of the Solvent Excluded Surface (SES) for molecular systems including a complete characterization of singularities of the surface. The theory is based on an implic...
详细信息
In this article we derive a complete characterization of the Solvent Excluded Surface (SES) for molecular systems including a complete characterization of singularities of the surface. The theory is based on an implicit representation of the SES, which, in turn, is based on the signed distance function to the Solvent Accessible Surface (SAS). All proofs are constructive so that the theory allows for efficient algorithms in order to compute the area of the SES and the volume of the SES-cavity, or to visualize the surface. Further, we propose to refine the notion of SAS and SES in order to take inner holes in a solute molecule into account or not. (C) 2016 Elsevier Inc. All rights reserved.
The single machine scheduling problems minimizing total weighted tardiness and square tardiness objectives have been studied in literature for many years. Applications of the model include sequencing problems in manuf...
详细信息
The single machine scheduling problems minimizing total weighted tardiness and square tardiness objectives have been studied in literature for many years. Applications of the model include sequencing problems in manufacture and logistics. This paper proposes two new priority allocation rules, PAR 1 and PAR 2, for solving these two problems. Unlike most known dispatch rules and constructive algorithms, our new rules take advantage of not only the jobs' static characters values such as the process time, the due date and the weight, but also their dynamic characters values, i.e., the slack and the values of the objective function for different choices of some jobs. At any time when a job is being selected to process, some of the unprocessed jobs are delayed while the others are not. It means that the characters of these two sorts of jobs are different from each other. So, combining these characters with the objective function's value can obtain effective dispatch rule. Experimental analysis based on the instances from the OR-Library discloses that our priority allocation rules, PAR 1 and PAR 2, are efficient and have significant advantages over traditional approaches.
Aiming at making improvements on solutions to function optimisation problems, an enhanced harmony search, called EHS, is proposed by hybridising differential mutation strategies. EHS employs differential mutation stra...
详细信息
Aiming at making improvements on solutions to function optimisation problems, an enhanced harmony search, called EHS, is proposed by hybridising differential mutation strategies. EHS employs differential mutation strategies after a solution generated by harmony search, then the solution is integrated into the differential mutation strategies as a target or current vector. Moreover, four differential mutation operators, including target-to-rand/1, target-to-rand/2, target-to-best/1 and target-to-best/2 are invoked adaptively in a random way. Extensive experiments on CEC2014 benchmark functions demonstrate EHS is effective and efficient with the combination of harmony search and the differential mutation strategies.
暂无评论