A multi-strategy hybrid whale optimization algorithm(MSHWOA)for complex constrained optimization problems is proposed to overcome the drawbacks of easily trapping into local optimum,slow convergence speed and low opti...
详细信息
A multi-strategy hybrid whale optimization algorithm(MSHWOA)for complex constrained optimization problems is proposed to overcome the drawbacks of easily trapping into local optimum,slow convergence speed and low optimization ***,the population is initialized by introducing the theory of good point set,which increases the randomness and diversity of the population and lays the foundation for the global optimization of the ***,a novel linearly update equation of convergence factor is designed to coordinate the abilities of exploration and *** the same time,the global exploration and local exploitation capabilities are improved through the siege mechanism of Harris Hawks optimization ***,the simulation experiments are conducted on the 6 benchmark functions and Wilcoxon rank sum test to evaluate the optimization performance of the improved *** experimental results show that the proposed algorithm has more significant improvement in optimization accuracy,convergence speed and robustness than the comparison algorithm.
Industrial process plants use emergency shutdown valves(ESDVs)as safety barriers to protect against hazardous events,bringing the plant to a safe state when potential danger is *** ESDVs are used extensively in offsho...
详细信息
Industrial process plants use emergency shutdown valves(ESDVs)as safety barriers to protect against hazardous events,bringing the plant to a safe state when potential danger is *** ESDVs are used extensively in offshore oil and gas processing plants and have been mandated in the design of such systems from national and international standards and *** paper has used actual ESDV operating data from four mid/late life oil and gas production platforms in the North Sea to research operational relationships that are of interest to those responsible for the technical management and operation of *** first of the two relationships is between the closure time(CT)of the ESDV and the time it remains in the open position,prior to the close *** has been hypothesised that the CT of the ESDV is affected by the length of time that it has been open prior to being closed(Time since the last stroke).In addition to the general analysis of the data series,two sub-categories were created to further investigate this possible relationship for CT and these are“above mean”and“below mean”.The correlations(Pearson's based)resulting from this analysis are in the“weak”and“very weak”*** second relationship investigated was the effect of very frequent closures to assess if this improves the *** operational records for six subjects were analysed to find closures that occurred within a 24 h period of each ***,no discriminating trend was apparent where CT was impacted positively or negatively by the frequent closure *** was concluded that the variance of ESDV closure time cannot be influenced by the technical management of the ESDV in terms of scheduling the operation of the ESDV.
Due to complex noise environments, it is difficult to extract bearing fault features from vibration signal and it affects the accuracy of fault diagnosis. To solve the problem, this paper proposes a multi-channel para...
详细信息
In the realm of smart cities, sensor technologies play a pivotal role in monitoring urban facilities and environments, providing real-time, site-specific information to residents. However, discrepancies often arise in...
详细信息
Live video streaming demands high user Quality of Experience (QoE) and requires significant computing power and bandwidth for video encoding and transmission. The standard adaptive live streaming approach encodes the ...
详细信息
Blasting in surface mines aims to fragment rock masses to a proper ***,flyrock is an undesirable effect of blasting that can result in human *** this study,support vector regression(SVR)is combined with four algorithm...
详细信息
Blasting in surface mines aims to fragment rock masses to a proper ***,flyrock is an undesirable effect of blasting that can result in human *** this study,support vector regression(SVR)is combined with four algorithms:gravitational search algorithm(GSA),biogeography-based optimization(BBO),ant colony optimization(ACO),and whale optimization algorithm(WOA)for predicting flyrock in two surface mines in ***,three other methods,including artificial neural network(ANN),kernel extreme learning machine(KELM),and general regression neural network(GRNN),are employed,and their performances are compared to those of four hybrid SVR *** modeling,the measured and predicted flyrock values are validated with some performance indices,such as root mean squared error(RMSE).The results revealed that the SVR-WOA model has the most optimal accuracy,with an RMSE of 7.218,while the RMSEs of the KELM,GRNN,SVR-GSA,ANN,SVR-BBO,and SVR-ACO models are 10.668,10.867,15.305,15.661,16.239,and 18.228,***,combining WOA and SVR can be a valuable tool for accurately predicting flyrock distance in surface mines.
Behavior-Driven Development (BDD) user stories are widely used in agile methods for capturing user requirements and acceptance criteria due to their simplicity and clarity. However, the concise structure of BDD-based ...
详细信息
Different from traditional object detection, pure vision is not enough to infrared small target detection, due to small target size and weak background contrast. For promoting detection performance, more target repres...
详细信息
A game measurement model considering the attacker’s knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of *...
详细信息
A game measurement model considering the attacker’s knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of *** quantified the sensitive level of information according to the user’s personalized sensitive information protection *** on the probability distribution of sensitive level and attacker’s knowledge background type,the strategy combination of service provider and attacker was analyzed,and a game-based sensitive information protection model was *** the combination of strategies under Bayesian equilibrium,the information entropy was used to measure the leakage of sensitive ***,in the paper the influence of the sensitive level of information and the attacker’s knowledge background on the strategy of both sides of the game was considered *** on,the leakage of the user’s sensitive information was ***,the feasibility of the model was described by experiments.
Action recognition in videos is a critical task in computer vision, with a wide range of applications including security surveillance, behavior analysis, and cooperative control. Despite significant advancements in ac...
详细信息
暂无评论