Endoscope 3D motion tracking plays an irreplaceable role for computer-assisted endoscopy systems development. Without such tracking, it is impossible to synchronize pre- and intra-operative images in a reference coord...
详细信息
ISBN:
(纸本)9781509021758
Endoscope 3D motion tracking plays an irreplaceable role for computer-assisted endoscopy systems development. Without such tracking, it is impossible to synchronize pre- and intra-operative images in a reference coordinate frame. Currently available methods are comprised of video-based and electromagnetic tracking. These methods limit to either video image artifacts or inaccurate sensor measurements and dynamic errors. This paper proposes two modified evolutionary computation algorithms: (a) adaptive particle swarm optimization (APSO) and (b) observation-boosted differential evolution (OBDE), to augment current endoscopic camera motion tracking. The experimental results demonstrate that our modified algorithms, which combine endoscopic video images with sensor measurements to estimate endoscope movements, can improve tracking accuracy from 4 8 mm to 2.9 mm OBDE outperforms APSO for endoscope tracking.
This paper proposes a learning method which learns a motion by employing an assistance in order to simplify it. This learning is done from easy to difficult level. Using Genetic Algorithm, it searches for the paramete...
详细信息
ISBN:
(纸本)078034300X
This paper proposes a learning method which learns a motion by employing an assistance in order to simplify it. This learning is done from easy to difficult level. Using Genetic Algorithm, it searches for the parameters of a controller appropriate for controlling the motion to be learnt by gradually increasing difficulty, i.e., by gradually decreasing the degree of assistance. We show that this gradual search enables Genetic Algorithm to evolve a population of controllers efficiently by giving two examples: stable riding of a bicycle and stable controlling of a double inverted pendulum. A bicycle is much easier to control when it is running at a certain velocity. An initial velocity is given as assistance and it is decreased gradually. Similarly a double inverted pendulum is much easier to control when an upward force supports the distal end of the pendulum. The reduction rate of assistance is adjustable in accordance with the adaptability of a population to the reduction.
This paper presents a. method that utilizes an evolutionary computation to design a hierarchical and off-line route planner for multiple Unmanned Aerial Vehicles (UAVs) coordinated navigation in known static environme...
详细信息
ISBN:
(纸本)9780819469540
This paper presents a. method that utilizes an evolutionary computation to design a hierarchical and off-line route planner for multiple Unmanned Aerial Vehicles (UAVs) coordinated navigation in known static environments. Considering the problem of having a number of UAVs starting from different known initial locations, our approach can produce 3-D trajectories composed by a set of successive navigation points with a desirable velocity distribution along each trajectory, aiming at reaching a predetermined. target location, while ensuring collision avoidance either with the environmental obstacles or with the UAVs and satisfying specific route and coordination constraints and objectives. The experiment results demonstrate the feasibility of the method.
In this paper we propose an evolutionary computation (genetic algorithm) based approach to economic dispatch problem. In case of thermal power plants fuel cost is an important element. Fuel price tend to rise from tim...
详细信息
ISBN:
(纸本)9781424420148
In this paper we propose an evolutionary computation (genetic algorithm) based approach to economic dispatch problem. In case of thermal power plants fuel cost is an important element. Fuel price tend to rise from time to time. Therefore effort should be given on minimizing the fuel cost. In the proposed approach elitism operation in genetic algorithm is exploited very well to improve the quality of solution, and it is compared with the classical optimization technique. A Graphical User Interface (GUI) is developed for educational purposes.
evolutionary computation (EC) is a kind of advanced computational intelligence (CI) algorithm and advanced artificial intelligence (AI) algorithm. EC algorithms have been widely studied for solving optimization and sc...
详细信息
ISBN:
(纸本)9781665412544
evolutionary computation (EC) is a kind of advanced computational intelligence (CI) algorithm and advanced artificial intelligence (AI) algorithm. EC algorithms have been widely studied for solving optimization and scheduling problems in various real-world applications, which act as one of the Big Three in CI and AI, together with fuzzy systems and neural networks. Even though EC has been fast developed in recent years, there is an assumption that the algorithm designer can obtain the objective function of the optimization problem so that they can calculate the fitness values of the individuals to follow the "survival of the fittest" principle in natural selection. However, in a real world application scenario, there is a kind of problem that the objective function is privacy so that the algorithm designer can not obtain the fitness values of the individuals directly. This is the privacy-preserving optimization problem (PPOP) where the assumption of available objective function does not check out. How to solve the PPOP is a new emerging frontier with seldom study but is also a challenging research topic in the EC community. This paper proposes a rank-based cryptographic function (RUT) to protect the fitness value information. Especially, the RCF is adopted by the algorithm user to encrypt the fitness values of all the individuals as rank so that the algorithm designer does not know the exact fitness information but only the rank information. Nevertheless, the RCF can protect the privacy of the algorithm user but still can provide sufficient information to the algorithm designer to drive the EC algorithm. We have applied the RCF privacy-preserving method to two typical EC algorithms including particle swarm optimization (PSO) and differential evolution (DE). Experimental results show that the RUE-based privacy-preserving PSO and DE can solve the PPOP without performance loss.
This paper proposes an evolutionary algorithm for solving QAPs with parallel independent run using GPU computation and give sastatistical analysis on how speedup can be attained with this model. With the proposed mode...
详细信息
ISBN:
(纸本)9781424481262
This paper proposes an evolutionary algorithm for solving QAPs with parallel independent run using GPU computation and give sastatistical analysis on how speedup can be attained with this model. With the proposed model, we achieve a GPU computation performance that is nearly proportional to the number of equipped multi-processors (MPs) in the GPUs. We explain these computational results by performing statistical analysis. Regarding performance comparison to CPU computations, GPU computation shows a speedup of x4.4 and x7.9 on average using a single GPU and two GPUs, respectivey
This paper gives a brief presentation of history of Soft Computing considered as a mix of three scientific disciplines that arose in the mid of the 20th century: Fuzzy Sets and Systems, Neural Networks, and Evolutiona...
详细信息
ISBN:
(纸本)9781479903481
This paper gives a brief presentation of history of Soft Computing considered as a mix of three scientific disciplines that arose in the mid of the 20th century: Fuzzy Sets and Systems, Neural Networks, and evolutionary computation. The paper shows the genesis and the historical development of the three disciplines and also their meeting in a coalition in the 1990s.
Aiming at the characteristics of multi-UCAV cooperative attack task assignment,a UCAVs Cooperative Task allocation algorithm based on immune evolutionary computation is *** immune mechanisms in order to maintain the d...
详细信息
ISBN:
(纸本)9781538631089;9781538631072
Aiming at the characteristics of multi-UCAV cooperative attack task assignment,a UCAVs Cooperative Task allocation algorithm based on immune evolutionary computation is *** immune mechanisms in order to maintain the diversity of population,protect outstanding individuals into the next generation of evolution,Overcome stagnancy premature phenomenon,thus improving the search ability of the *** simulation results show that the algorithm is reasonable and effective.
Integer Factorization is a vital number theoretic problem frequently finding application in public-key cryptography like RSA encryption systems, and other areas like Fourier transform algorithm. The problem is computa...
详细信息
Integer Factorization is a vital number theoretic problem frequently finding application in public-key cryptography like RSA encryption systems, and other areas like Fourier transform algorithm. The problem is computationally intractable because it is a one-way mathematical function. Due to its computational infeasibility, it is extremely hard to find the prime factors of a semi prime number generated from two randomly chosen similar sized prime numbers. There has been a recently growing interest in the community with regards to evolutionary computation and other alternative approaches to solving this problem as an optimization task. However, the results still seem to be very rudimentary in nature and there's much work to be done. This paper emphasizes on such approaches and presents a critic study in details. The paper puts forth criticism and ideas in this aspect. (C) 2015 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://***/lienses/by-nc-nd/4.0). Peer-review under responsibility of organizing committee of the 7th Scientific-Technical Conference Material Problems in Civil Engineering
暂无评论