This paper presents a Case Based Reasoning (CBR) approach to identifying micro-architecture anti-patterns and replacing them with "good" patterns in order to improve the design of software system. The result...
详细信息
Three kinds of constrained traveling salesman problems (TSP) arising from application problems, namely the open route TSP, the end-fixed TSP, and the path-constrained TSP, are proposed. The corresponding approaches ba...
详细信息
Three kinds of constrained traveling salesman problems (TSP) arising from application problems, namely the open route TSP, the end-fixed TSP, and the path-constrained TSP, are proposed. The corresponding approaches based on modified genetic algorithms (GA) for solving these constrained TSPs are presented. Numerical experiments demonstrate that the algorithm for the open route TSP shows its advantages when the open route is required, the algorithm for the end-fixed TSP can deal with route optimization with constraint of fixed ends effectively, and the algorithm for the path-constraint could benefit the traffic problems where some cities cannot be visited from each other.
Spatio-temporal information process grows up quickly in these years. Although uncertain and multi-granularities is the common features of spatio-temporal data, those problems were not well solved yet. A new spatio-tem...
详细信息
A novel hybrid algorithm based on the AFTER (Aggregated forecast through exponential re-weighting) and the modified particle swarm optimization (PSO) is proposed. The combining weights in the hybrid algorithm are trai...
详细信息
The use of computational-intelligence-based techniques in the optimization of agent initial positions in land combat simulations is studied. A novel method for the reduction of support vectors in the support vector ma...
详细信息
The use of computational-intelligence-based techniques in the optimization of agent initial positions in land combat simulations is studied. A novel method for the reduction of support vectors in the support vector machine (SVM) is presented. The optimization on the width of the Gaussian kernel function and the combination of the SVM with the radial basis function neural network are performed in the proposed method. Simulation results show that the proposed method can improve the running efficiency drastically compared with that using the traditional SVM with the same precision. We also summarize and present some experiences and trends in the study on the optimization problem in land combat simulation.
An operation template is proposed in this paper for describing the mapping between operations and a subset of natural numbers. With such operation template, a job shop scheduling problem (JSSP) can be transformed into...
详细信息
A modified particle swarm optimization (PSO) algorithm is proposed. Linear constraints in the PSO are added to satisfy the normalization conditions for different problems. A hybrid algorithm based on the modified PSO ...
详细信息
A modified particle swarm optimization (PSO) algorithm is proposed. Linear constraints in the PSO are added to satisfy the normalization conditions for different problems. A hybrid algorithm based on the modified PSO and combining forecasting is presented. Combining forecasting can improve the forecasting accuracy through combining different forecasting methods. The effectiveness of the algorithm is demonstrated through the prediction on the sunspots and the stocks data. Simulated results show that the hybrid algorithm can improve the forecasting accuracy to a great extent.
This paper is a survey for smart home research, from definition to current research status. First we give a definition to smart home, and then describe the smart home elements, typical research projects, smart home ne...
详细信息
ISBN:
(纸本)0780384032
This paper is a survey for smart home research, from definition to current research status. First we give a definition to smart home, and then describe the smart home elements, typical research projects, smart home networks research status, smart home appliances and challenges at last.
Both item-associations and user-associations mined from the rating table can be used to make personalized recommendation for the current user in rule-based recommend technique. Mining user-associations is the key for ...
详细信息
ISBN:
(纸本)0780384032
Both item-associations and user-associations mined from the rating table can be used to make personalized recommendation for the current user in rule-based recommend technique. Mining user-associations is the key for the recommendation based on user-associations. We find that the current user not only can be used to constrain the rule form in user-associations mining process, but also can be used to partition the rating table into two parts in order to accelerate user-associations mining. It is first proved that user-associations about the current user mined from the whole rating table are contained in those mined only from the data set that contain the current user's rating. Then, a user-association mining frame based on two-stage count called TSCF is proposed. TSCF frame can be implemented by using existing algorithms for mining association rules. And an algorithm TSCF-CL for mining user-associations is implemented by using the concept lattice. Last the performance comparison with ASARM algorithm shows that TSCF-CL can reach better time capacity.
Workflow management systems (WFMSs) are used to coordinate and streamline business processes. Very large process instances are often running for a long period and the feedback iteration occurs frequently, thus the sys...
详细信息
ISBN:
(纸本)0780384032
Workflow management systems (WFMSs) are used to coordinate and streamline business processes. Very large process instances are often running for a long period and the feedback iteration occurs frequently, thus the system is inefficient. To overcome such problems, we studied the issues that process modeling parallelly based on product lifecycle management and proposed a parallel model (LBPYYM: lifecycle-based parallel workflow model). First, the parallel process can be created with the model within a product lifecycle. Meanwhile, the complexity of process definition is reduced also by the parallel model. Second, the adhoc access control policies can be created in each phase of lifecycle to satisfy the access control requirement of the least privilege. Finally, two algorithms, which consist of 2-level role parse algorithm and 3-level role parse algorithm, are introduced. Through these two algorithms the workflow activities' participant can be defined very easily and flexibly.
暂无评论