期刊文献+
共找到79,547篇文章
< 1 2 250 >
每页显示 20 50 100
Research on Euclidean Algorithm and Reection on Its Teaching
1
作者 ZHANG Shaohua 《应用数学》 北大核心 2025年第1期308-310,共3页
In this paper,we prove that Euclid's algorithm,Bezout's equation and Divi-sion algorithm are equivalent to each other.Our result shows that Euclid has preliminarily established the theory of divisibility and t... In this paper,we prove that Euclid's algorithm,Bezout's equation and Divi-sion algorithm are equivalent to each other.Our result shows that Euclid has preliminarily established the theory of divisibility and the greatest common divisor.We further provided several suggestions for teaching. 展开更多
关键词 Euclid's algorithm Division algorithm Bezout's equation
在线阅读 下载PDF
Fusion Algorithm Based on Improved A^(*)and DWA for USV Path Planning
2
作者 Changyi Li Lei Yao Chao Mi 《哈尔滨工程大学学报(英文版)》 2025年第1期224-237,共14页
The traditional A^(*)algorithm exhibits a low efficiency in the path planning of unmanned surface vehicles(USVs).In addition,the path planned presents numerous redundant inflection waypoints,and the security is low,wh... The traditional A^(*)algorithm exhibits a low efficiency in the path planning of unmanned surface vehicles(USVs).In addition,the path planned presents numerous redundant inflection waypoints,and the security is low,which is not conducive to the control of USV and also affects navigation safety.In this paper,these problems were addressed through the following improvements.First,the path search angle and security were comprehensively considered,and a security expansion strategy of nodes based on the 5×5 neighborhood was proposed.The A^(*)algorithm search neighborhood was expanded from 3×3 to 5×5,and safe nodes were screened out for extension via the node security expansion strategy.This algorithm can also optimize path search angles while improving path security.Second,the distance from the current node to the target node was introduced into the heuristic function.The efficiency of the A^(*)algorithm was improved,and the path was smoothed using the Floyd algorithm.For the dynamic adjustment of the weight to improve the efficiency of DWA,the distance from the USV to the target point was introduced into the evaluation function of the dynamic-window approach(DWA)algorithm.Finally,combined with the local target point selection strategy,the optimized DWA algorithm was performed for local path planning.The experimental results show the smooth and safe path planned by the fusion algorithm,which can successfully avoid dynamic obstacles and is effective and feasible in path planning for USVs. 展开更多
关键词 Improved A^(%mUL%)algorithm optimized DWA algorithm Unmanned surface vehicles Path planning Fusion algorithm
在线阅读 下载PDF
Retina algorithm for heavy-ion tracking in single-event effects localization
3
作者 Wen-Di Deng Jin-Chuan Wang +5 位作者 Hui-Peng Pan Wei Zhang Jian-Song Wang Fu-Qiang Wang Zi-Li Li Ren-Zhuo Wan 《Nuclear Science and Techniques》 2025年第6期123-135,共13页
This study presents a real-time tracking algorithm derived from the retina algorithm,designed for the rapid,real-time tracking of straight-line particle trajectories.These trajectories are detected by pixel detectors ... This study presents a real-time tracking algorithm derived from the retina algorithm,designed for the rapid,real-time tracking of straight-line particle trajectories.These trajectories are detected by pixel detectors to localize single-event effects in two-dimensional space.Initially,we developed a retina algorithm to track the trajectory of a single heavy ion and achieved a positional accuracy of 40μm.This was accomplished by analyzing trajectory samples from the simulations using a pixel sensor with a 72×72 pixel array and an 83μm pixel pitch.Subsequently,we refined this approach to create an iterative retina algorithm for tracking multiple heavy-ion trajectories in single events.This iterative version demonstrated a tracking efficiency of over 97%,with a positional resolution comparable to that of single-track events.Furthermore,it exhibits significant parallelism,requires fewer resources,and is ideally suited for implementation in field-programmable gate arrays on board-level systems,facilitating real-time online trajectory tracking. 展开更多
关键词 Single-event effects Retina algorithm Iterative retina algorithm Heavy ion Particle tracking
在线阅读 下载PDF
Energy Efficient Clustering and Sink Mobility Protocol Using Hybrid Golden Jackal and Improved Whale Optimization Algorithm for Improving Network Longevity in WSNs
4
作者 S B Lenin R Sugumar +2 位作者 J S Adeline Johnsana N Tamilarasan R Nathiya 《China Communications》 2025年第3期16-35,共20页
Reliable Cluster Head(CH)selectionbased routing protocols are necessary for increasing the packet transmission efficiency with optimal path discovery that never introduces degradation over the transmission reliability... Reliable Cluster Head(CH)selectionbased routing protocols are necessary for increasing the packet transmission efficiency with optimal path discovery that never introduces degradation over the transmission reliability.In this paper,Hybrid Golden Jackal,and Improved Whale Optimization Algorithm(HGJIWOA)is proposed as an effective and optimal routing protocol that guarantees efficient routing of data packets in the established between the CHs and the movable sink.This HGJIWOA included the phases of Dynamic Lens-Imaging Learning Strategy and Novel Update Rules for determining the reliable route essential for data packets broadcasting attained through fitness measure estimation-based CH selection.The process of CH selection achieved using Golden Jackal Optimization Algorithm(GJOA)completely depends on the factors of maintainability,consistency,trust,delay,and energy.The adopted GJOA algorithm play a dominant role in determining the optimal path of routing depending on the parameter of reduced delay and minimal distance.It further utilized Improved Whale Optimisation Algorithm(IWOA)for forwarding the data from chosen CHs to the BS via optimized route depending on the parameters of energy and distance.It also included a reliable route maintenance process that aids in deciding the selected route through which data need to be transmitted or re-routed.The simulation outcomes of the proposed HGJIWOA mechanism with different sensor nodes confirmed an improved mean throughput of 18.21%,sustained residual energy of 19.64%with minimized end-to-end delay of 21.82%,better than the competitive CH selection approaches. 展开更多
关键词 Cluster Heads(CHs) Golden Jackal optimization algorithm(GJoA) Improved Whale optimization algorithm(IWoA) unequal clustering
在线阅读 下载PDF
Calculation algorithm for the space charge force of a train with infinite bunches
5
作者 San-Hai Ren Hong-Yu Li +5 位作者 Jia-Ru Shi Hao Zha Wei-Hang Gu Qiang Gao Qian Tan Huai-Bi Chen 《Nuclear Science and Techniques》 2025年第6期13-25,共13页
Industrial linear accelerators often contain many bunches when their pulse widths are extended to microseconds.As they typically operate at low electron energies and high currents,the interactions among bunches cannot... Industrial linear accelerators often contain many bunches when their pulse widths are extended to microseconds.As they typically operate at low electron energies and high currents,the interactions among bunches cannot be neglected.In this study,an algorithm is introduced for calculating the space charge force of a train with infinite bunches.By utilizing the ring charge model and the particle-in-cell(PIC)method and combining analytical and numerical methods,the proposed algorithm efficiently calculates the space charge force of infinite bunches,enabling the accurate design of accelerator parameters and a comprehensive understanding of the space charge force.This is a significant improvement on existing simulation software such as ASTRA and PARMELA that can only handle a single bunch or a small number of bunches.The PIC algorithm is validated in long drift space transport by comparing it with existing models,such as the infinite-bunch,ASTRA single-bunch,and PARMELA several-bunch algorithms.The space charge force calculation results for the external acceleration field are also verified.The reliability of the proposed algorithm provides a foundation for the design and optimization of industrial accelerators. 展开更多
关键词 Particle-in-cell method Space charge force algorithm Infinite bunches
在线阅读 下载PDF
Many-objective evolutionary algorithms based on reference-point-selection strategy for application in reactor radiation-shielding design
6
作者 Cheng-Wei Liu Ai-Kou Sun +4 位作者 Ji-Chong Lei Hong-Yu Qu Chao Yang Tao Yu Zhen-Ping Chen 《Nuclear Science and Techniques》 2025年第6期201-215,共15页
In recent years,the development of new types of nuclear reactors,such as transportable,marine,and space reactors,has presented new challenges for the optimization of reactor radiation-shielding design.Shielding struct... In recent years,the development of new types of nuclear reactors,such as transportable,marine,and space reactors,has presented new challenges for the optimization of reactor radiation-shielding design.Shielding structures typically need to be lightweight,miniaturized,and radiation-protected,which is a multi-parameter and multi-objective optimization problem.The conventional multi-objective(two or three objectives)optimization method for radiation-shielding design exhibits limitations for a number of optimization objectives and variable parameters,as well as a deficiency in achieving a global optimal solution,thereby failing to meet the requirements of shielding optimization for newly developed reactors.In this study,genetic and artificial bee-colony algorithms are combined with a reference-point-selection strategy and applied to the many-objective(having four or more objectives)optimal design of reactor radiation shielding.To validate the reliability of the methods,an optimization simulation is conducted on three-dimensional shielding structures and another complicated shielding-optimization problem.The numerical results demonstrate that the proposed algorithms outperform conventional shielding-design methods in terms of optimization performance,and they exhibit their reliability in practical engineering problems.The many-objective optimization algorithms developed in this study are proven to efficiently and consistently search for Pareto-front shielding schemes.Therefore,the algorithms proposed in this study offer novel insights into improving the shielding-design performance and shielding quality of new reactor types. 展开更多
关键词 many-objective optimization problem Evolutionary algorithm Radiation-shielding design Reference-point-selection strategy
在线阅读 下载PDF
DDoS Attack Tracking Using Multi-Round Iterative Viterbi Algorithm in Satellite Internet
7
作者 Guo Wei Xu Jin +2 位作者 Pei Yukui Yin Liuguo Feng Wei 《China Communications》 2025年第3期148-163,共16页
Satellite Internet(SI)provides broadband access as a critical information infrastructure in 6G.However,with the integration of the terrestrial Internet,the influx of massive terrestrial traffic will bring significant ... Satellite Internet(SI)provides broadband access as a critical information infrastructure in 6G.However,with the integration of the terrestrial Internet,the influx of massive terrestrial traffic will bring significant threats to SI,among which DDoS attack will intensify the erosion of limited bandwidth resources.Therefore,this paper proposes a DDoS attack tracking scheme using a multi-round iterative Viterbi algorithm to achieve high-accuracy attack path reconstruction and fast internal source locking,protecting SI from the source.Firstly,to reduce communication overhead,the logarithmic representation of the traffic volume is added to the digests after modeling SI,generating the lightweight deviation degree to construct the observation probability matrix for the Viterbi algorithm.Secondly,the path node matrix is expanded to multi-index matrices in the Viterbi algorithm to store index information for all probability values,deriving the path with non-repeatability and maximum probability.Finally,multiple rounds of iterative Viterbi tracking are performed locally to track DDoS attack based on trimming tracking results.Simulation and experimental results show that the scheme can achieve 96.8%tracking accuracy of external and internal DDoS attack at 2.5 seconds,with the communication overhead at 268KB/s,effectively protecting the limited bandwidth resources of SI. 展开更多
关键词 DDoS tracking iterative Viterbi algorithm satellite Internet 6G
在线阅读 下载PDF
Research and Implementation of Trusted Blockchain Core Technology Based on State Secret Algorithm
8
作者 Zheng Qingan Meng Jialin +2 位作者 Wu Junjie Li Jingtao Lin Haonan 《China Communications》 2025年第4期143-160,共18页
With the rapid development of blockchain technology,the Chinese government has proposed that the commercial use of blockchain services in China should support the national encryption standard,also known as the state s... With the rapid development of blockchain technology,the Chinese government has proposed that the commercial use of blockchain services in China should support the national encryption standard,also known as the state secret algorithm GuoMi algorithm.The original Hyperledger Fabric only supports internationally common encryption algorithms,so it is particularly necessary to enhance support for the national encryption standard.Traditional identity authentication,access control,and security audit technologies have single-point failures,and data can be easily tampered with,leading to trust issues.To address these problems,this paper proposes an optimized and application research plan for Hyperledger Fabric.We study the optimization model of cryptographic components in Hyperledger Fabric,and based on Fabric's pluggable mechanism,we enhance the Fabric architecture with the national encryption standard.In addition,we research key technologies involved in the secure application protocol based on the blockchain.We propose a blockchain-based identity authentication protocol,detailing the design of an identity authentication scheme based on blockchain certificates and Fabric CA,and use a dual-signature method to further improve its security and reliability.Then,we propose a flexible,dynamically configurable real-time access control and security audit mechanism based on blockchain,further enhancing the security of the system. 展开更多
关键词 access control authentication Hyperledger Fabric security audit state secret algorithm
在线阅读 下载PDF
Altruistic Nurturing Algorithm for Multi-Objective Autonomous Underwater Vehicles Path Planning Problems
9
作者 Liu Min Chen Jianhong +4 位作者 Fan Xiaoping Ouyang Haibin Steven Li Zhang Chunliang Ding Weiping 《China Communications》 2025年第5期350-371,共22页
Solving the path planning problem of Autonomous Underwater Vehicles(AUVs)is crucial for reducing energy waste and improving operational efficiency.However,two main challenges hinder further development:Firstly,existin... Solving the path planning problem of Autonomous Underwater Vehicles(AUVs)is crucial for reducing energy waste and improving operational efficiency.However,two main challenges hinder further development:Firstly,existing algorithms often treat this as a single-objective optimization problem,whereas in reality,it should be multi-objective,considering factors such as distance,safety,and smoothness simultaneously.Secondly,the limited availability of optimization results arises due to they are single-path,which fail to meet real-world conditions.To address these challenges,first of all,an improved AUV path planning model is proposed,in which the collisions of path and obstacles are classified more specifically.Subsequently,a novel Altruistic Nurturing Algorithm(ANA)inspired by natural altruism is introduced.In the algorithm,nurturing cost considering Pareto rank and crowd distance is introduced as guidance of evolution to avoid futile calculation,abandonment threshold is self-adaptive with descendant situation to help individuals escape from local optima and double selection strategy combining crowd and k-nearest neighbors selection helps to get a better-distributed Pareto front.Experimental results comparing ANA with existing algorithms in AUV path planning demonstrate its superiority.Finally,a user-friendly interface,the Multi-Objective AUV Path Planner,is designed to provide users with a group of paths for informed decisionmaking. 展开更多
关键词 altruistic nurturing algorithm AUV path planning double selection strategy
在线阅读 下载PDF
Ship Path Planning Based on Sparse A^(*)Algorithm
10
作者 Yongjian Zhai Jianhui Cui +3 位作者 Fanbin Meng Huawei Xie Chunyan Hou Bin Li 《哈尔滨工程大学学报(英文版)》 2025年第1期238-248,共11页
An improved version of the sparse A^(*)algorithm is proposed to address the common issue of excessive expansion of nodes and failure to consider current ship status and parameters in traditional path planning algorith... An improved version of the sparse A^(*)algorithm is proposed to address the common issue of excessive expansion of nodes and failure to consider current ship status and parameters in traditional path planning algorithms.This algorithm considers factors such as initial position and orientation of the ship,safety range,and ship draft to determine the optimal obstacle-avoiding route from the current to the destination point for ship planning.A coordinate transformation algorithm is also applied to convert commonly used latitude and longitude coordinates of ship travel paths to easily utilized and analyzed Cartesian coordinates.The algorithm incorporates a hierarchical chart processing algorithm to handle multilayered chart data.Furthermore,the algorithm considers the impact of ship length on grid size and density when implementing chart gridification,adjusting the grid size and density accordingly based on ship length.Simulation results show that compared to traditional path planning algorithms,the sparse A^(*)algorithm reduces the average number of path points by 25%,decreases the average maximum storage node number by 17%,and raises the average path turning angle by approximately 10°,effectively improving the safety of ship planning paths. 展开更多
关键词 Sparse A^(%mUL%)algorithm Path planning RASTERIZATIoN Coordinate transformation Image preprocessing
在线阅读 下载PDF
An improved fluid flow algorithm for hydraulic fracturing:Optimizing domain volume and crack pressure update strategies
11
作者 Wei Zhang Jing Bi +3 位作者 Yu Zhao Yongfa Zhang Chaolin Wang Yang Pan 《International Journal of Mining Science and Technology》 2025年第4期639-657,共19页
With the widespread adoption of hydraulic fracturing technology in oil and gas resource development,improving the accuracy and efficiency of fracturing simulations has become a critical research focus.This paper propo... With the widespread adoption of hydraulic fracturing technology in oil and gas resource development,improving the accuracy and efficiency of fracturing simulations has become a critical research focus.This paper proposes an improved fluid flow algorithm,aiming to enhance the computational efficiency of hydraulic fracturing simulations while ensuring computational accuracy.The algorithm optimizes the aperture law and iteration criteria,focusing on improving the domain volume and crack pressure update strategy,thereby enabling precise capture of dynamic borehole pressure variations during injection tests.The effectiveness of the algorithm is verified through three flow-solid coupling cases.The study also analyzes the effects of borehole size,domain volume,and crack pressure update strategy on fracturing behavior.Furthermore,the performance of the improved algorithm in terms of crack propagation rate,micro-crack formation,and fluid pressure distribution was further evaluated.The results indicate that while large-size boreholes delay crack initiation,the cracks propagate more rapidly once formed.Additionally,the optimized domain volume calculation and crack pressure update strategy significantly shorten the pressure propagation stage,promote crack propagation,and improve computational efficiency. 展开更多
关键词 Hydraulic fracturing Fluid flow algorithm Domain volume optimization Crack pressure update Borehole size
在线阅读 下载PDF
Power forecasting method of ultra-short-term wind power cluster based on the convergence cross mapping algorithm
12
作者 Yuzhe Yang Weiye Song +5 位作者 Shuang Han Jie Yan Han Wang Qiangsheng Dai Xuesong Huo Yongqian Liu 《Global Energy Interconnection》 2025年第1期28-42,共15页
The development of wind power clusters has scaled in terms of both scale and coverage,and the impact of weather fluctuations on cluster output changes has become increasingly complex.Accurately identifying the forward... The development of wind power clusters has scaled in terms of both scale and coverage,and the impact of weather fluctuations on cluster output changes has become increasingly complex.Accurately identifying the forward-looking information of key wind farms in a cluster under different weather conditions is an effective method to improve the accuracy of ultrashort-term cluster power forecasting.To this end,this paper proposes a refined modeling method for ultrashort-term wind power cluster forecasting based on a convergent cross-mapping algorithm.From the perspective of causality,key meteorological forecasting factors under different cluster power fluctuation processes were screened,and refined training modeling was performed for different fluctuation processes.First,a wind process description index system and classification model at the wind power cluster level are established to realize the classification of typical fluctuation processes.A meteorological-cluster power causal relationship evaluation model based on the convergent cross-mapping algorithm is pro-posed to screen meteorological forecasting factors under multiple types of typical fluctuation processes.Finally,a refined modeling meth-od for a variety of different typical fluctuation processes is proposed,and the strong causal meteorological forecasting factors of each scenario are used as inputs to realize high-precision modeling and forecasting of ultra-short-term wind cluster power.An example anal-ysis shows that the short-term wind power cluster power forecasting accuracy of the proposed method can reach 88.55%,which is 1.57-7.32%higher than that of traditional methods. 展开更多
关键词 Ultra-short-term wind power forecasting Wind power cluster Causality analysis Convergence cross mapping algorithm
在线阅读 下载PDF
A novel heuristic pathfinding algorithm for 3D security modeling and vulnerability assessment
13
作者 Jun Yang Yue-Ming Hong +2 位作者 Yu-Ming Lv Hao-Ming Ma Wen-Lin Wang 《Nuclear Science and Techniques》 2025年第5期152-166,共15页
Vulnerability assessment is a systematic process to identify security gaps in the design and evaluation of physical protection systems.Adversarial path planning is a widely used method for identifying potential vulner... Vulnerability assessment is a systematic process to identify security gaps in the design and evaluation of physical protection systems.Adversarial path planning is a widely used method for identifying potential vulnerabilities and threats to the security and resilience of critical infrastructures.However,achieving efficient path optimization in complex large-scale three-dimensional(3D)scenes remains a significant challenge for vulnerability assessment.This paper introduces a novel A^(*)-algorithmic framework for 3D security modeling and vulnerability assessment.Within this framework,the 3D facility models were first developed in 3ds Max and then incorporated into Unity for A^(*)heuristic pathfinding.The A^(*)-heuristic pathfinding algorithm was implemented with a geometric probability model to refine the detection and distance fields and achieve a rational approximation of the cost to reach the goal.An admissible heuristic is ensured by incorporating the minimum probability of detection(P_(D)^(min))and diagonal distance to estimate the heuristic function.The 3D A^(*)heuristic search was demonstrated using a hypothetical laboratory facility,where a comparison was also carried out between the A^(*)and Dijkstra algorithms for optimal path identification.Comparative results indicate that the proposed A^(*)-heuristic algorithm effectively identifies the most vulnerable adversarial pathfinding with high efficiency.Finally,the paper discusses hidden phenomena and open issues in efficient 3D pathfinding for security applications. 展开更多
关键词 Physical protection system 3D modeling and simulation Vulnerability assessment A^(%mUL%)Heuristic Pathfinding Dijkstra algorithm
在线阅读 下载PDF
基于MIC-NNG-LSTM的有机废液焚烧SCR入口NO_(x)浓度动态预测
14
作者 李艳 史艳华 +2 位作者 戴庆瑜 刘嫣 马晓燕 《工程科学与技术》 北大核心 2025年第3期21-30,共10页
针对高盐有机废液焚烧及烟气处理过程中普遍存在的延迟、非线性和动态特性,提出一种基于自适应变量选择与长短期记忆神经网络(MIC-NNG-LSTM)的动态预测方法,对选择性催化还原法(SCR)脱硝塔入口NO_(x)浓度进行预测,解决当工况发生变化时... 针对高盐有机废液焚烧及烟气处理过程中普遍存在的延迟、非线性和动态特性,提出一种基于自适应变量选择与长短期记忆神经网络(MIC-NNG-LSTM)的动态预测方法,对选择性催化还原法(SCR)脱硝塔入口NO_(x)浓度进行预测,解决当工况发生变化时,脱硝系统不能及时调整喷氨量的问题。该预测方法在传统长短期记忆神经网络(LSTM)的基础上,利用最大互信息系数(MIC)法确定相关辅助变量的延迟时间,以全面捕捉变量之间的动态关系。其次,利用MIC可以反映各输入变量相对于目标变量的重要程度,结合能够收缩变量系数的非负绞杀(NNG)算法,设计MIC-NNG算法来压缩LSTM网络的输入节点数,剔除冗余变量,实现辅助变量的自适应选择。最后,将包含延迟时间的辅助变量集作为LSTM网络的输入变量集,从而建立SCR入口NO_(x)浓度动态预测模型。并与LSTM、MICLSTM、NNG-LSTM 3种预测SCR入口NO_(x)浓度的方法进行实验对比,浓度预测精度可达到93%,均方根误差减小为约1.5 mg/Nm^(3)。结果表明:通过引入输入变量的延迟时间特性,能够更好地体现各变量之间的动态关系;MIC-NNG算法相对于NNG算法能更准确地选择输入变量以缩短模型预测时间,提高预测精度和泛化能力。基于MIC-NNG算法和LSTM网络的动态预测模型综合考虑了有机废液焚烧过程中变量的延迟特性和各参数之间的动态时序关系,可以为降低NO_(x)排放量提供新思路。 展开更多
关键词 有机废液 动态预测 变量选择 长短期记忆神经网络 mIC-NNG算法
在线阅读 下载PDF
基于融合劣化指标和VMD-Informer的水电机组劣化趋势预测
15
作者 宋阿妮 陈亦真 +2 位作者 詹云峰 李超顺 付波 《中国农村水利水电》 北大核心 2025年第5期90-96,共7页
水电机组长期运行在恶劣环境下,异常振动更加频繁,逐渐出现疲劳、磨损,导致机组性能劣化。为保障机组的安全稳定运行,需要准确直观地反映水电机组运行并预测机组未来劣化状况,为机组状态检修提供重要依据。提出了一种基于融合劣化指标和... 水电机组长期运行在恶劣环境下,异常振动更加频繁,逐渐出现疲劳、磨损,导致机组性能劣化。为保障机组的安全稳定运行,需要准确直观地反映水电机组运行并预测机组未来劣化状况,为机组状态检修提供重要依据。提出了一种基于融合劣化指标和VMD-Informer的机组劣化趋势预测方法。首先构建KAN健康模型拟合工况参数与振摆值之间的映射关系,然后通过对比模型输出值与实测振摆值在不同指标下的差异得到多个劣化序列,运用遗传算法对多个劣化序列进行寻优获取融合劣化指标,兼顾多个指标的优势,更为准确地反映机组劣化趋势。之后用变分模态分解(VMD)将融合劣化序列分解为多个分量,最后利用Informer预测模型对分解后的各个分量进行多步预测并重构得到最终的预测结果,从而实现对机组运行状况的准确评估和预测。实例分析表明,所提方法能够生成可靠的劣化趋势,同时在预测上能学习劣化趋势序列的长期趋势和局部特征,预测精度更高。 展开更多
关键词 水电机组 劣化评估 退化预测 Kolmogorov-Arnold Network 遗传算法 INFoRmER
在线阅读 下载PDF
基于RIME-IAOA的混合模型短期光伏功率预测
16
作者 王仁明 魏逸明 席磊 《三峡大学学报(自然科学版)》 CAS 北大核心 2025年第1期81-88,共8页
光伏发电在如今的新能源发展中逐渐成为重点,其中光伏功率预测成为研究的主要方向.为了提升光伏功率预测的精度和效率,提出了RIME-VMD-IAOA-LSTM模型.该模型通过霜冰优化算法(RIME)优化变分模态分解(VMD)的参数来提升分解效率;引入余弦... 光伏发电在如今的新能源发展中逐渐成为重点,其中光伏功率预测成为研究的主要方向.为了提升光伏功率预测的精度和效率,提出了RIME-VMD-IAOA-LSTM模型.该模型通过霜冰优化算法(RIME)优化变分模态分解(VMD)的参数来提升分解效率;引入余弦控制因子的动态边界策略来控制算数优化算法(AOA)数值的增长速率从而提升算法的精度和稳定性;利用自适应T分布变异策略来改进AOA的局部搜索能力和全局开发能力,更好地避免局部最优解.两种智能优化算法的加入使得整体模型的预测效率和速度都有很大提升,实验结果表明组合模型RIMEVMD-IAOA-LSTM相比于其他预测模型有较高的光伏功率预测精度. 展开更多
关键词 霜冰优化算法 变分模态分解 算术优化算法 余弦控制因子策略 自适应T分布策略 短期光伏功率预测
在线阅读 下载PDF
基于BWO和WOA的VMD-LSTM短期风速预测
17
作者 贾世会 刘立夫 +1 位作者 迟晓妮 李高西 《郑州大学学报(工学版)》 北大核心 2025年第3期59-66,共8页
针对风电机组组网运行存在的功率波动性和随机性,为提高风速预测的精度和风电机组运行的稳定性,提出了一种基于白鲸优化算法和鲸鱼优化算法的VMD-LSTM短期风速预测模型。首先,利用白鲸优化算法对VMD中的模态数及惩罚因子进行优化,得到... 针对风电机组组网运行存在的功率波动性和随机性,为提高风速预测的精度和风电机组运行的稳定性,提出了一种基于白鲸优化算法和鲸鱼优化算法的VMD-LSTM短期风速预测模型。首先,利用白鲸优化算法对VMD中的模态数及惩罚因子进行优化,得到分解的子序列;其次,对于LSTM中的隐含层节点数、最大训练次数和初始学习率等参数,使用鲸鱼优化算法进行确定;最后,利用LSTM的非线性拟合能力对数据进行预测。结果表明:所提预测模型在测试集上的RMSE、MAE、MAPE分别为0.2234,0.1727,0.0837,均低于其他对比模型,验证了所提模型在短期风速预测问题上的有效性。 展开更多
关键词 白鲸优化算法 鲸鱼优化算法 变分模态分解 LSTm 风速预测
在线阅读 下载PDF
基于WOA-VMD和贝叶斯估计的保护测量回路误差评估
18
作者 李振兴 柳灿 +2 位作者 翁汉琍 李振华 龚世玉 《三峡大学学报(自然科学版)》 北大核心 2025年第2期97-105,共9页
变电站保护测量回路受测量误差影响,保护灵敏度降低,对于重载线路可能引起保护误动,会造成严重后果.为推动保护测量的状态监视,提出一种基于鲸鱼优化(whale optimization algorithm,WOA)的变分模态分解(variational mode decomposition,... 变电站保护测量回路受测量误差影响,保护灵敏度降低,对于重载线路可能引起保护误动,会造成严重后果.为推动保护测量的状态监视,提出一种基于鲸鱼优化(whale optimization algorithm,WOA)的变分模态分解(variational mode decomposition,VMD)和贝叶斯估计的保护测量回路误差评估方法.针对保护测量回路的电流数据,引入WOA并结合包络熵作为适应度函数确定VMD的关键参数,基于WOA-VMD将原电流数据分解为本征模态;进一步为解决特征数目过多所带来的复杂数据分析问题,引入皮尔逊相关系数方法计算其各组系数优选特征量;最终利用贝叶斯估计法量化分析优选后的特征量信号实现误差判定.实验结果表明,本文的评估方法能够准确监测保护测量回路2%的误差偏移. 展开更多
关键词 保护测量回路 误差评估 鲸鱼优化算法 包络熵 皮尔逊相关系数 贝叶斯估计法
在线阅读 下载PDF
DNTrans:基于Transformer的黑产域名变换生成方法
19
作者 王博 施凡 《信息安全学报》 2025年第2期163-179,共17页
目前很多黑产团伙为了对抗监管部门对其网站域名的封锁,会批量搭建黑产网站和注册大量的黑产域名。这些批量注册的域名之间存在着一定的相似性,这种相似性使得研究者可以对已知域名进行分析,进而研究未知域名的生成。本文研究区别于以... 目前很多黑产团伙为了对抗监管部门对其网站域名的封锁,会批量搭建黑产网站和注册大量的黑产域名。这些批量注册的域名之间存在着一定的相似性,这种相似性使得研究者可以对已知域名进行分析,进而研究未知域名的生成。本文研究区别于以往研究对黑产域名生成的处理方法,我们将域名生成任务转变为翻译任务。首先,我们采用Bi-LSTM将训练数据中的域名转为表征向量后进行层次聚类,将相似的域名聚为一类,并且通过参数设置,使得聚类簇中的域名个数尽量分布均匀。然后,根据聚类结果生成翻译模型所需的域名对数据。最后,使用Transformer模型自动学习相似域名之间潜在的变化规则进行黑产域名的变换生成。其中域名生成结果检验采用的是我们自己提出的两阶段黑产网站检测模型,模型通过设置置信度阈值的方式控制检测模型大小以及所需数据来平衡识别准确率和效率。实验表明,生成算法生成的域名中,可访问域名中黑产域名比率为19.1%,黑产域名的扩展倍数达到了359.98,即通过一个黑产域名可以平均扩展出近360个新的黑产域名。实验结果证明了该方法在黑产域名变换生成上的有效性,并解决了现有公害域名生成方法难以控制域名生成的范围,存在大量的无效域名的问题。 展开更多
关键词 域名生成算法 翻译模型 聚类 多模态
在线阅读 下载PDF
基于改进K-means算法的室内可见光通信O-OFDM系统信道均衡技术
20
作者 贾科军 连江龙 +1 位作者 张常瑞 蔺莹 《电讯技术》 北大核心 2025年第1期96-102,共7页
在室内可见光通信中符号间干扰和噪声会严重影响系统性能,K均值(K-means)均衡方法可以抑制光无线信道的影响,但其复杂度较高,且在聚类边界处易出现误判。提出了改进聚类中心点的K-means(Improved Center K-means,IC-Kmeans)算法,通过随... 在室内可见光通信中符号间干扰和噪声会严重影响系统性能,K均值(K-means)均衡方法可以抑制光无线信道的影响,但其复杂度较高,且在聚类边界处易出现误判。提出了改进聚类中心点的K-means(Improved Center K-means,IC-Kmeans)算法,通过随机生成足够长的训练序列,然后将训练序列每一簇的均值作为K-means聚类中心,避免了传统K-means反复迭代寻找聚类中心。进一步,提出了基于神经网络的IC-Kmeans(Neural Network Based IC-Kmeans,NNIC-Kmeans)算法,使用反向传播神经网络将接收端二维数据映射至三维空间,以增加不同簇之间混合数据的距离,提高了分类准确性。蒙特卡罗误码率仿真表明,IC-Kmeans均衡和传统K-means算法的误码率性能相当,但可以显著降低复杂度,特别是在信噪比较小时。同时,在室内多径信道模型下,与IC-Kmeans和传统Kmeans均衡相比,NNIC-Kmeans均衡的光正交频分复用系统误码率性能最好。 展开更多
关键词 可见光通信 光正交频分复用 多径信道 信道均衡 K-means算法 反向传播神经网络
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部