Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,856)
  • Open Access

    ARTICLE

    Large-Scale Multi-Objective Optimization Algorithm Based on Weighted Overlapping Grouping of Decision Variables

    Liang Chen1, Jingbo Zhang1, Linjie Wu1, Xingjuan Cai1,2,*, Yubin Xu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 363-383, 2024, DOI:10.32604/cmes.2024.049044

    Abstract The large-scale multi-objective optimization algorithm (LSMOA), based on the grouping of decision variables, is an advanced method for handling high-dimensional decision variables. However, in practical problems, the interaction among decision variables is intricate, leading to large group sizes and suboptimal optimization effects; hence a large-scale multi-objective optimization algorithm based on weighted overlapping grouping of decision variables (MOEAWOD) is proposed in this paper. Initially, the decision variables are perturbed and categorized into convergence and diversity variables; subsequently, the convergence variables are subdivided into groups based on the interactions among different decision variables. If the size of a group surpasses the set… More >

  • Open Access

    ARTICLE

    Decoupling Algorithms for the Gravitational Wave Spacecraft

    Xue Wang1,2, Weizhou Zhu1,2, Zhao Cui2,3, Xingguang Qian2,3, Jinke Yang1,2, Jianjun Jia1,2,*, Yikun Wang2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 325-337, 2024, DOI:10.32604/cmes.2024.048804

    Abstract The gravitational wave spacecraft is a complex multi-input multi-output dynamic system. The gravitational wave detection mission requires the spacecraft to achieve single spacecraft with two laser links and high-precision control. Establishing one spacecraft with two laser links, compared to one spacecraft with a single laser link, requires an upgraded decoupling algorithm for the link establishment. The decoupling algorithm we designed reassigns the degrees of freedom and forces in the control loop to ensure sufficient degrees of freedom for optical axis control. In addressing the distinct dynamic characteristics of different degrees of freedom, a transfer function compensation method is used in… More >

  • Open Access

    ARTICLE

    Predicting Rock Burst in Underground Engineering Leveraging a Novel Metaheuristic-Based LightGBM Model

    Kai Wang1, Biao He2,*, Pijush Samui3, Jian Zhou4

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 229-253, 2024, DOI:10.32604/cmes.2024.047569

    Abstract Rock bursts represent a formidable challenge in underground engineering, posing substantial risks to both infrastructure and human safety. These sudden and violent failures of rock masses are characterized by the rapid release of accumulated stress within the rock, leading to severe seismic events and structural damage. Therefore, the development of reliable prediction models for rock bursts is paramount to mitigating these hazards. This study aims to propose a tree-based model—a Light Gradient Boosting Machine (LightGBM)—to predict the intensity of rock bursts in underground engineering. 322 actual rock burst cases are collected to constitute an exhaustive rock burst dataset, which serves… More >

  • Open Access

    ARTICLE

    Uniaxial Compressive Strength Prediction for Rock Material in Deep Mine Using Boosting-Based Machine Learning Methods and Optimization Algorithms

    Junjie Zhao, Diyuan Li*, Jingtai Jiang, Pingkuang Luo

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 275-304, 2024, DOI:10.32604/cmes.2024.046960

    Abstract Traditional laboratory tests for measuring rock uniaxial compressive strength (UCS) are tedious and time-consuming. There is a pressing need for more effective methods to determine rock UCS, especially in deep mining environments under high in-situ stress. Thus, this study aims to develop an advanced model for predicting the UCS of rock material in deep mining environments by combining three boosting-based machine learning methods with four optimization algorithms. For this purpose, the Lead-Zinc mine in Southwest China is considered as the case study. Rock density, P-wave velocity, and point load strength index are used as input variables, and UCS is regarded… More > Graphic Abstract

    Uniaxial Compressive Strength Prediction for Rock Material in Deep Mine Using Boosting-Based Machine Learning Methods and Optimization Algorithms

  • Open Access

    ARTICLE

    Contact Stress Reliability Analysis Model for Cylindrical Gear with Circular Arc Tooth Trace Based on an Improved Metamodel

    Qi Zhang1,2,4,5, Zhixin Chen3, Yang Wu4,*, Guoqi Xiang2, Guang Wen1, Xuegang Zhang2, Yongchun Xie2, Guangchun Yang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 593-619, 2024, DOI:10.32604/cmes.2023.046319

    Abstract Although there is currently no unified standard theoretical formula for calculating the contact stress of cylindrical gears with a circular arc tooth trace (referred to as CATT gear), a mathematical model for determining the contact stress of CATT gear is essential for studying how parameters affect its contact stress and building the contact stress limit state equation for contact stress reliability analysis. In this study, a mathematical relationship between design parameters and contact stress is formulated using the Kriging Metamodel. To enhance the model’s accuracy, we propose a new hybrid algorithm that merges the genetic algorithm with the Quantum Particle… More >

  • Open Access

    ARTICLE

    A Web Application Fingerprint Recognition Method Based on Machine Learning

    Yanmei Shi1, Wei Yu2,*, Yanxia Zhao3,*, Yungang Jia4

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 887-906, 2024, DOI:10.32604/cmes.2024.046140

    Abstract Web application fingerprint recognition is an effective security technology designed to identify and classify web applications, thereby enhancing the detection of potential threats and attacks. Traditional fingerprint recognition methods, which rely on preannotated feature matching, face inherent limitations due to the ever-evolving nature and diverse landscape of web applications. In response to these challenges, this work proposes an innovative web application fingerprint recognition method founded on clustering techniques. The method involves extensive data collection from the Tranco List, employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction. The core of the methodology lies in… More >

  • Open Access

    ARTICLE

    An Image Fingerprint and Attention Mechanism Based Load Estimation Algorithm for Electric Power System

    Qing Zhu1,*, Linlin Gu1,2, Huijie Lin1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 577-591, 2024, DOI:10.32604/cmes.2023.043307

    Abstract With the rapid development of electric power systems, load estimation plays an important role in system operation and planning. Usually, load estimation techniques contain traditional, time series, regression analysis-based, and machine learning-based estimation. Since the machine learning-based method can lead to better performance, in this paper, a deep learning-based load estimation algorithm using image fingerprint and attention mechanism is proposed. First, an image fingerprint construction is proposed for training data. After the data preprocessing, the training data matrix is constructed by the cyclic shift and cubic spline interpolation. Then, the linear mapping and the gray-color transformation method are proposed to… More >

  • Open Access

    ARTICLE

    Unmanned Aerial Vehicles General Aerial Person-Vehicle Recognition Based on Improved YOLOv8s Algorithm

    Zhijian Liu*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3787-3803, 2024, DOI:10.32604/cmc.2024.048998

    Abstract Considering the variations in imaging sizes of the unmanned aerial vehicles (UAV) at different aerial photography heights, as well as the influence of factors such as light and weather, which can result in missed detection and false detection of the model, this paper presents a comprehensive detection model based on the improved lightweight You Only Look Once version 8s (YOLOv8s) algorithm used in natural light and infrared scenes (L_YOLO). The algorithm proposes a special feature pyramid network (SFPN) structure and substitutes most of the neck feature extraction module with the Special deformable convolution feature extraction module (SDCN). Moreover, the model… More >

  • Open Access

    ARTICLE

    Hybrid Optimization Algorithm for Handwritten Document Enhancement

    Shu-Chuan Chu1, Xiaomeng Yang1, Li Zhang2, Václav Snášel3, Jeng-Shyang Pan1,4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3763-3786, 2024, DOI:10.32604/cmc.2024.048594

    Abstract The Gannet Optimization Algorithm (GOA) and the Whale Optimization Algorithm (WOA) demonstrate strong performance; however, there remains room for improvement in convergence and practical applications. This study introduces a hybrid optimization algorithm, named the adaptive inertia weight whale optimization algorithm and gannet optimization algorithm (AIWGOA), which addresses challenges in enhancing handwritten documents. The hybrid strategy integrates the strengths of both algorithms, significantly enhancing their capabilities, whereas the adaptive parameter strategy mitigates the need for manual parameter setting. By amalgamating the hybrid strategy and parameter-adaptive approach, the Gannet Optimization Algorithm was refined to yield the AIWGOA. Through a performance analysis of… More >

  • Open Access

    ARTICLE

    Applying an Improved Dung Beetle Optimizer Algorithm to Network Traffic Identification

    Qinyue Wu, Hui Xu*, Mengran Liu

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4091-4107, 2024, DOI:10.32604/cmc.2024.048461

    Abstract Network traffic identification is critical for maintaining network security and further meeting various demands of network applications. However, network traffic data typically possesses high dimensionality and complexity, leading to practical problems in traffic identification data analytics. Since the original Dung Beetle Optimizer (DBO) algorithm, Grey Wolf Optimization (GWO) algorithm, Whale Optimization Algorithm (WOA), and Particle Swarm Optimization (PSO) algorithm have the shortcomings of slow convergence and easily fall into the local optimal solution, an Improved Dung Beetle Optimizer (IDBO) algorithm is proposed for network traffic identification. Firstly, the Sobol sequence is utilized to initialize the dung beetle population, laying the… More >

Displaying 1-10 on page 1 of 1856. Per Page