Exploration targeting is a multi-step process concerned with delimiting progressively smaller areas that are prospective for the targeted mineral deposit type, capable of hosting a potentially economic deposit and des...
详细信息
Exploration targeting is a multi-step process concerned with delimiting progressively smaller areas that are prospective for the targeted mineral deposit type, capable of hosting a potentially economic deposit and deserving of exploration funds. In mineral prospectivity modeling (MPM), target delineation represents the final stage of a procedure designed to identify discrete, explorable areas of high discovery potential within a much larger area of interest, typically covering entire camps, districts or provinces. However, defining unbiased thresholds for discriminating between high, moderate and low priority exploration targets is not a straightforward task. To avoid human bias in this thresholding process, a more structured, automated approach is needed. This study presents a simulation-based approach to MPM that adapts the Grey wolf Optimizer (GWO) algorithm, a swarm intelligence method capable of objectively delineating exploration targets from MPM results. Our approach aims to reduce bias by applying Monte Carlo Simulation to the assignment of robust weights to the predictor maps at the core of the MPM procedure. The GWO algorithm facilitates the classification and prioritization and enhances the accuracy and reliability of the resulting targets. The proposed procedure is demonstrated here using a porphyry copper (Cu) example from the Chahargonbad district, SE Iran. The results show that the GWO-based framework not only identifies high-priority exploration zones but also reduces the uncertainty inherent in traditional manual selection methods. As such, this novel approach contributes to both theoretical and practical advancements in the field of mineral exploration, offering a scalable solution that can be adapted to various geological settings.
Palm print identification is a biometric technique that relies on the distinctive characteristics of a person's palm print to distinguish and authenticate their identity. The unique pattern of ridges, lines, and o...
详细信息
Palm print identification is a biometric technique that relies on the distinctive characteristics of a person's palm print to distinguish and authenticate their identity. The unique pattern of ridges, lines, and other features present on the palm allows for the identification of an individual. The ridges and lines on the palm are formed during embryonic development and remain relatively unchanged throughout a person's lifetime, making palm prints an ideal candidate for biometric identification. Using deep learning networks, such as GoogLeNet, SqueezeNet, and AlexNet combined with graywolfoptimization, we achieved to extract and analyze the unique features of a person's palm print to create a digital representation that can be used for identification purposes with a high degree of accuracy. To this end, two well-known datasets, the Hong Kong Polytechnic University dataset and the Tongji Contactless dataset, were used for testing and evaluation. The recognition rate of the proposed method was compared with other existing methods such as principal component analysis, including local binary pattern and Laplacian of Gaussian-Gabor transform. The results demonstrate that the proposed method outperforms other methods with a recognition rate of 96.72%. These findings show that the combination of deep learning and graywolfoptimization can effectively improve the accuracy of human identification using palm print images.
Under the same initial noise covariance, the extended Kalman filter (EKF) algorithm and the adaptive extended Kalman filter (AEKF) algorithm show different convergence rates in the battery state estimation experiments...
详细信息
Under the same initial noise covariance, the extended Kalman filter (EKF) algorithm and the adaptive extended Kalman filter (AEKF) algorithm show different convergence rates in the battery state estimation experiments. It can be concluded from the experimental results that the convergence rate of the EKF algorithm is usually faster than that of the AEKF algorithm, but the estimation accuracy of the AEKF algorithm is usually better than that of the EKF algorithm. In response to this issue, this article proposes a fast convergence strategy based on the grey wolfoptimization (GWO) algorithm for the co-estimation of battery SOC and capacity. Based on battery parameter identification, the proposed algorithm utilizes the GWO to optimize the initial noise covariance of the EKF algorithm. Then, the EKF algorithm with optimized initial noise covariance is used to quickly pull the SOC estimation results into a stable region and switch to the AEKF algorithm to jointly estimate the SOC and capacity of the battery. Through data validation under different working conditions, it is shown that the proposed target algorithm has a much faster convergence ability than the comparison algorithm, and the proposed algorithm also exhibits excellent robustness under different initialization errors and temperatures.
To accurately determine the leakage source location and strength during gas leakage accidents, this study compares the concentration obtained from the diffusion model with that measured by the sensor and proposes an i...
详细信息
To accurately determine the leakage source location and strength during gas leakage accidents, this study compares the concentration obtained from the diffusion model with that measured by the sensor and proposes an improved gray wolf optimization algorithm for leakage source location. This algorithm introduces two improvement strategies. First, a nonlinear convergence factor is introduced to balance the global and local searches of the algorithm. Second, a reverse learning operation is performed on the three individuals with the worst fitness in the contemporary population. The results showed that the location results based on the improved gray wolf optimization algorithm exhibited high accuracy and stability, could quickly and accurately locate the leakage source, and provided data support for emergency disposal of accidents.
This paper presents a library book recommendation system designed to improve effectiveness, utilizing the GWO algorithm. The system architecture consists of three distinct layers: the foundational data layer, the data...
详细信息
This paper presents a library book recommendation system designed to improve effectiveness, utilizing the GWO algorithm. The system architecture consists of three distinct layers: the foundational data layer, the data processing layer, and the intelligent service. The improved CGWO-KM algorithm is used to cluster project attributes, and the search and update mechanism of the graywolf population is applied to find better initial clustering centers. Missing rating data is then filled in, and user similarity is calculated. A harmonized weighting factor is used to eliminate the correlation between ratings from different users. The weighted rating mechanism comprehensively considers both user ratings and the influence of neighboring users. The improved Pearson correlation coefficient combines the weighting factors with user similarity to obtain the final recommendation score, completing the intelligent book recommendation process for the library's books. The results show that at the 5th month time snapshot, the predicted data (6) for the library's historical borrowing dataset closely matches the actual value (3.7). The method proposed in this paper demonstrates an IGD mean close to the true optimal solution across various library datasets for literature, science popularization, history, art, and novels, with values of 0.0012, 0.0023, 0.0014, 0.0021, and 0.0020, respectively. The optimal non-dominated solutions in the three-dimensional space for resource utilization, recommendation diversity, and user engagement are close to the ideal value of 1. Moreover, the book recommendation system has a short processing time, and the recommendation accuracy ranges from 0.882 to 0.993, providing personalized, high-quality book recommendation services for readers.
Speech emotion recognition (SER), an important method of emotional human-machine interaction, has been the focus of much research in recent years. Motivated by powerful Deep Convolutional Neural Networks (DCNNs) to le...
详细信息
Speech emotion recognition (SER), an important method of emotional human-machine interaction, has been the focus of much research in recent years. Motivated by powerful Deep Convolutional Neural Networks (DCNNs) to learn features and the landmark success of these networks in the field of image classification, the present study aimed to prepare a pre-trained DCNN model for SER and provide compatible input to these networks by converting a speech signal into a 3D tensor. First, using a reconstructed phase space, speech samples are reconstructed in a 3D phase space. Studies have shown that the patterns formed in this space contain meaningful emotional features of the speaker. To provide an input that is compatible with DCNN, a new speech signal representation called Chaogram was introduced as the projection of these patterns, and three channels similar to RGB images were obtained. In the next step, image enhancement techniques were used to highlight the details of Chaogram images. Then, the Visual Geometry Group (VGG) DCNN pre-trained on the large ImageNet dataset is utilized to learn Chaogram high-level features and corresponding emotion classes. Finally, transfer learning is performed on the proposed model, and the presented model is fine-tuned on our datasets. To optimize the hyper-parameter arrangement of architecture-determined CNNs, an innovative DCNN-GWO (graywolfoptimization) is also presented. The results of this study on two public datasets of emotions, i.e., EMO-DB and eNTERFACE05, show the promising performance of the proposed model, which can greatly improve SER applications.
In the field of precision manufacturing, error compensation of parts is the key to improve product quality and manufacturing efficiency. This paper presents a Long Short-Term Memory Network (LSTM) model based on the G...
详细信息
ISBN:
(纸本)9798350363272;9798350363265
In the field of precision manufacturing, error compensation of parts is the key to improve product quality and manufacturing efficiency. This paper presents a Long Short-Term Memory Network (LSTM) model based on the gray wolf optimization algorithm designed to optimize part error compensation. First, we introduce the sources of part errors and their impact on the manufacturing process. Then, we elaborate the application of LSTM network in predicting and compensating part errors by selecting appropriate features through correlation analysis. Through experiments, we verify the effectiveness of the graywolfoptimization-based LSTM model in part error prediction and compensation. The experimental results show that compared with the traditional method, the model in this paper has a significant improvement in both error prediction accuracy and compensation efficiency.
Although fog computing is a new research topic, there are robust and integrated solutions for service activation management and how to distribute IoT services over available fog computing services resources. This pape...
详细信息
Although fog computing is a new research topic, there are robust and integrated solutions for service activation management and how to distribute IoT services over available fog computing services resources. This paper presents a multi-objective graywolfoptimization (GWO) solution for more efficient fog computing service scheduling and activation management. This solution utilizes a multi-objective function in the resource allocation process by developing and improving the proposed algorithm to check the status of resources and manage tasks. The main purpose of this study is to create a trade-off between energy consumption and task execution time. This research has presented a two-stage multi-objective approach to solve the scheduling and task offloading problem. First, the GWO algorithm is used to solve the scheduling problem, and then container migration is used to solve the task offloading problem and appropriate resource allocation. Container migration causes an idle physical server to turn off, reducing power consumption, improving imbalance, reducing latency, and improving efficiency. The proposed method has been compared with three scenarios with 700 nodes, 1000 nodes, and 5000 nodes. The proposed solution has been implemented and simulated in iFogSim and compared with five classical algorithms. The analytical results indicate the better performance of the proposed strategy with average execution time for host selection averages a reduction of 15, 20, 25, 20, and 21%, respectively, compared to Particle swarm optimization (PSO), Ant colony optimization (ACO), Grasshopper optimizationalgorithm (GOA), Genetic algorithm (GA), and Cuckoo optimizationalgorithm (COA), 12% reduction in average time required for reallocation container, and the service-level agreement (SLA) violation rate is maintained in the range of 9-10/% compared to all other solutions.
With the rapid development of technology and the increase in the use of Android software, the number of malware has also increased. This study presents a classification as malware/goodware with the features of 4465 An...
详细信息
ISBN:
(纸本)9781665450928
With the rapid development of technology and the increase in the use of Android software, the number of malware has also increased. This study presents a classification as malware/goodware with the features of 4465 Android applications. Cost is an important problem for the increasing number of applications and the analyzes to be made on each application. This study focused on this problem with the hybrid use of gray wolf optimization algorithm (GWO) and Deep Neural Networks (DNN). With the use of GWO, both feature selection and the features of the model to be created with DNN are determined. In this way, an approximate solution proposal is presented for the most suitable features and the most suitable model design. The model, which was created with the use of GWO-DNN hybrid in this study, offers an F1 score of 99.74%.
The graywolfoptimization (GWO) algorithm, a robust metaheuristic inspired by the hunting behavior of gray wolves, has found extensive application in diverse optimization challenges. However, despite its notable succ...
详细信息
The graywolfoptimization (GWO) algorithm, a robust metaheuristic inspired by the hunting behavior of gray wolves, has found extensive application in diverse optimization challenges. However, despite its notable success, GWO frequently encounters limitations such as premature convergence and diminished accuracy in complex scenarios. To mitigate these issues, this paper proposes a Hybrid Strategy-based graywolfoptimization (HSGWO) algorithm. The HSGWO algorithm utilizes Tent chaotic mapping to replace conventional random initialization, thereby enhancing global exploration and expediting convergence. Additionally, it incorporates the scaling factor strategy from Differential Evolution to balance global and local search, thus improving adaptability to intricate optimization problems. A random mutation strategy is also integrated to perturb updated positions, enabling the algorithm to circumvent premature convergence and escape local optima, thereby enhancing overall optimization performance. To assess the efficacy of HSGWO, comprehensive experiments were conducted on the CEC2017 benchmark functions and four real-world engineering problems. The results demonstrate that HSGWO significantly surpasses existing algorithms across multiple metrics, including convergence speed, accuracy, precision, and global optimization capability. Statistical analyses employing Friedman's and Wilcoxon signed-rank tests further corroborate the superior performance of HSGWO, particularly in addressing complex engineering optimization challenges.
暂无评论