首页 > 最新文献

Electrical and Automation Engineering最新文献

英文 中文
Exploring Various Control Systems and Its Application 探索各种控制系统及其应用
Pub Date : 2022-05-01 DOI: 10.46632/eae/1/1/7
The control system is a system that delivers the desired response by controlling the output. The control system manages the behavior of other devices or systems using control rings, executes or regulates commands. It is used to control the first processes of a home heat controller that uses a thermostat to control the boiler in the home. Maybe up to large industrial control systems. Control system a set of mechanical or electronic devices that control other devices or systems through control loops. Typically, control systems are computerized. Control systems are an integral part of industry and automation. Continuous modulated control is a feedback controller used to automatically control a process or process. The control system uses the plant process variable a to compare the process value variable or position (PV) with the desired value or set point (SP). Control signal. Output to the same value. A variable size or set variable sizes are made according to the recommended rule. This will keep the values of the controlled quantities constant or vary as recommended. A control system can be operated by electric, mechanical mixing mechanisms, liquid pressure (liquid or gas) or mechanisms. Although interruptions are most common when a computer is engaged in control circuits, it is generally more convenient to operate all control systems on electricity.
控制系统是通过控制输出来实现预期响应的系统。控制系统使用控制环管理其他设备或系统的行为,执行或调节命令。它用于控制家用热控制器的第一过程,该控制器使用恒温器来控制家中的锅炉。也许是大型工业控制系统。控制系统通过控制回路控制其他设备或系统的一套机械或电子设备。一般来说,控制系统是电脑化的。控制系统是工业和自动化的一个组成部分。连续调制控制是一种用于自动控制一个或多个过程的反馈控制器。控制系统使用工厂过程变量a将过程值变量或位置(PV)与期望值或设定点(SP)进行比较。控制信号。输出相同的值。根据推荐的规则进行可变大小或设置可变大小。这将使控制量的值保持恒定或根据建议变化。控制系统可以通过电动、机械混合机构、液体压力(液体或气体)或机构来操作。虽然中断是最常见的,当计算机从事控制电路,它通常是更方便的操作所有的控制系统的电力。
{"title":"Exploring Various Control Systems and Its Application","authors":"","doi":"10.46632/eae/1/1/7","DOIUrl":"https://doi.org/10.46632/eae/1/1/7","url":null,"abstract":"The control system is a system that delivers the desired response by controlling the output. The control system manages the behavior of other devices or systems using control rings, executes or regulates commands. It is used to control the first processes of a home heat controller that uses a thermostat to control the boiler in the home. Maybe up to large industrial control systems. Control system a set of mechanical or electronic devices that control other devices or systems through control loops. Typically, control systems are computerized. Control systems are an integral part of industry and automation. Continuous modulated control is a feedback controller used to automatically control a process or process. The control system uses the plant process variable a to compare the process value variable or position (PV) with the desired value or set point (SP). Control signal. Output to the same value. A variable size or set variable sizes are made according to the recommended rule. This will keep the values of the controlled quantities constant or vary as recommended. A control system can be operated by electric, mechanical mixing mechanisms, liquid pressure (liquid or gas) or mechanisms. Although interruptions are most common when a computer is engaged in control circuits, it is generally more convenient to operate all control systems on electricity.","PeriodicalId":446446,"journal":{"name":"Electrical and Automation Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128951752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review on Embedded System, Design and Simulation 嵌入式系统、设计与仿真综述
Pub Date : 2022-05-01 DOI: 10.46632/eae/1/1/9
{"title":"A Review on Embedded System, Design and Simulation","authors":"","doi":"10.46632/eae/1/1/9","DOIUrl":"https://doi.org/10.46632/eae/1/1/9","url":null,"abstract":"","PeriodicalId":446446,"journal":{"name":"Electrical and Automation Engineering","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128139015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Exploring Various Applications of Micro Controller 探索微控制器的各种应用
Pub Date : 2022-05-01 DOI: 10.46632/eae/1/1/8
{"title":"Exploring Various Applications of Micro Controller","authors":"","doi":"10.46632/eae/1/1/8","DOIUrl":"https://doi.org/10.46632/eae/1/1/8","url":null,"abstract":"","PeriodicalId":446446,"journal":{"name":"Electrical and Automation Engineering","volume":"30 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113980987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Software Defect Prediction and Software Quality Assessment Using Dlr-Lvq and Fuzzy Rules 基于Dlr-Lvq和模糊规则的软件缺陷预测和软件质量评估
Pub Date : 2022-04-01 DOI: 10.46632/eae/1/1/4
V. S. Prasad, K. Sasikala
Recently, Software development has been considerably grown. Fault in the software causes fault and interrupts the output. Characteristics like these make it much challenging to avert software flaws. Spontaneously forecasting the amount of flaws within the software modules is essential and also can assist developers to proficiently allot restricted resources. Recently, numerous Software Defect Prediction (SDP) techniques are developed. But, the accuracy and time consuming challenges still remain to be solved. Also, a few top-notch techniques don't properly classify the software whereas it is a needed metric to ensure quality standards. This work proffers a novel Decaying Learning Rate – Learning vector Quantization (DLR-LVQ) classifier to forecast the software defect. The proposed methods consist of the following steps: redundant data removal, feature extraction (FE), feature oversampling, data normalization, defect prediction (DP), and quality prediction. The proposed DLR-LVQ’s attained outcome is assessed with the existent methodologies. The outcomes exhibit that the methodology proposed attains efficient classification outcomes are examined. Keywords: Software Defect Prediction (SDP), Non defective software quality prediction, BM-SMOTE, Decaying Learning Rate, Learning Vector Quantization, Fuzzy rules, HDFS and Map Reduce.
最近,软件开发得到了相当大的发展。软件故障导致故障,导致输出中断。像这样的特征使得避免软件缺陷变得非常具有挑战性。自发地预测软件模块中的缺陷数量是必要的,并且还可以帮助开发人员熟练地分配有限的资源。近年来,开发了许多软件缺陷预测(SDP)技术。但是,准确性和耗时的挑战仍然有待解决。此外,一些一流的技术没有正确地对软件进行分类,而这是确保质量标准所需的度量标准。本文提出了一种新的学习率衰减-学习向量量化(DLR-LVQ)分类器来预测软件缺陷。提出的方法包括以下几个步骤:冗余数据去除、特征提取、特征过采样、数据归一化、缺陷预测和质量预测。采用现有的方法对所提出的DLR-LVQ所达到的结果进行评估。结果表明,所提出的方法达到了有效的分类结果进行了检验。关键词:软件缺陷预测(SDP)、无缺陷软件质量预测、BM-SMOTE、衰减学习率、学习向量量化、模糊规则、HDFS和Map Reduce
{"title":"Software Defect Prediction and Software Quality Assessment Using Dlr-Lvq and Fuzzy Rules","authors":"V. S. Prasad, K. Sasikala","doi":"10.46632/eae/1/1/4","DOIUrl":"https://doi.org/10.46632/eae/1/1/4","url":null,"abstract":"Recently, Software development has been considerably grown. Fault in the software causes fault and interrupts the output. Characteristics like these make it much challenging to avert software flaws. Spontaneously forecasting the amount of flaws within the software modules is essential and also can assist developers to proficiently allot restricted resources. Recently, numerous Software Defect Prediction (SDP) techniques are developed. But, the accuracy and time consuming challenges still remain to be solved. Also, a few top-notch techniques don't properly classify the software whereas it is a needed metric to ensure quality standards. This work proffers a novel Decaying Learning Rate – Learning vector Quantization (DLR-LVQ) classifier to forecast the software defect. The proposed methods consist of the following steps: redundant data removal, feature extraction (FE), feature oversampling, data normalization, defect prediction (DP), and quality prediction. The proposed DLR-LVQ’s attained outcome is assessed with the existent methodologies. The outcomes exhibit that the methodology proposed attains efficient classification outcomes are examined. Keywords: Software Defect Prediction (SDP), Non defective software quality prediction, BM-SMOTE, Decaying Learning Rate, Learning Vector Quantization, Fuzzy rules, HDFS and Map Reduce.","PeriodicalId":446446,"journal":{"name":"Electrical and Automation Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126448466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Secure Data Deduplication and Portability In Distributed Cloud Server Using Whirlpool-Hct And Lf-Wdo 基于Whirlpool-Hct和Lf-Wdo的分布式云服务器中高效安全的重复数据删除和可移植性
Pub Date : 2022-04-01 DOI: 10.46632/eae/1/1/5
A. Athira, P. Sasikala
Distributed Cloud Computing Storage has come up as a service that can expedite data owners (DO) to store their data remotely according to their application or data or file environment. However, insecure data storage, high uploading bandwidth, integration issues of DCS has breached the trustworthiness of the user to store data. In order toconquer the challenge, the work has developed a data Deduplication and portability-based secure data storage in DCS. The work aids to remove unwanted data and selects the most relevant features to avoid data loss by using GK-QDA Feature Reduction Method and HFG feature selection method. The selected cloud server for the respective data or application is analyzed for redundant data by data duplication using a whirlpool hashing algorithm followed by a hash chaining algorithm. Finally, to minimize the integration issues while moving the encrypted data between the DCS, the work has developed an LF-WDO technique. An experimental analysis has showed an enormous result by achieving acomputation time of 2987 ms as compared to the existing methods
分布式云计算存储已经作为一种服务出现,它可以加速数据所有者(DO)根据他们的应用程序或数据或文件环境远程存储他们的数据。但是DCS的数据存储不安全、上传带宽高、集成化等问题已经违背了用户存储数据的可信度。为了克服这一挑战,研究人员开发了一种基于重复数据删除和可移植性的安全数据存储系统。采用GK-QDA特征约简方法和HFG特征选择方法,去除不需要的数据,选择最相关的特征,避免数据丢失。通过使用旋涡散列算法和散列链算法进行数据复制,分析为各自数据或应用程序选择的云服务器是否存在冗余数据。最后,为了在DCS之间移动加密数据时最大限度地减少集成问题,研究人员开发了LF-WDO技术。实验分析表明,与现有方法相比,计算时间达到2987 ms,取得了巨大的成果
{"title":"An Efficient Secure Data Deduplication and Portability In Distributed Cloud Server Using Whirlpool-Hct And Lf-Wdo","authors":"A. Athira, P. Sasikala","doi":"10.46632/eae/1/1/5","DOIUrl":"https://doi.org/10.46632/eae/1/1/5","url":null,"abstract":"Distributed Cloud Computing Storage has come up as a service that can expedite data owners (DO) to store their data remotely according to their application or data or file environment. However, insecure data storage, high uploading bandwidth, integration issues of DCS has breached the trustworthiness of the user to store data. In order to\u0000conquer the challenge, the work has developed a data Deduplication and portability-based secure data storage in DCS. The work aids to remove unwanted data and selects the most relevant features to avoid data loss by using GK-QDA Feature Reduction Method and HFG feature selection method. The selected cloud server for the respective data or application is analyzed for redundant data by data duplication using a whirlpool hashing algorithm followed by a hash chaining algorithm. Finally, to minimize the integration issues while moving the encrypted data between the DCS, the work has developed an LF-WDO technique. An experimental analysis has showed an enormous result by achieving a\u0000computation time of 2987 ms as compared to the existing methods","PeriodicalId":446446,"journal":{"name":"Electrical and Automation Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128206289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review On Memetic Algorithms and Its Developments 模因算法及其发展综述
Pub Date : 2022-03-01 DOI: 10.46632/eae/1/1/2
A. J. Wilson, D. Pallavi, M Ramachandran, Sathiyaraj Chinnasamy, S. Sowmiya
: A memetic algorithm in computer science and functional research an extension of the traditional genetic algorithm. Multiple target Memetic Algorithm for Design Improvement. The study of memes sees magical ideas as a kind of virus that sometimes spreads beyond fact and logic. Its pronunciation: Survival beliefs do not have to be true, survival rules are not fair, and survival rituals are not necessary. The term mimetic algorithm was first coined by Moscow (1989) to describe population-based hybrid evolutionary mechanisms integrated with local purification techniques. Magic the study of information and culture in terms of its analogy with Darwinian evolution. Spiritualists describe this as an approach to evolutionary models of cultural interactions. Mimetic describes how to successfully propagate an idea, but it may not be true. Evolutionary methods are Based on the concepts of biological evolution. The 'population' of possible solutions to the problem will be created first, and each solution will be evaluated using a 'fitness function'. The population develops over time and identifies the best solutions. Differential evolution is a population-based Meet Heuristic search algorithm that improves the problem by repeatedly improving a candidate solution based on the evolutionary process. Such algorithms make little or no assumption about the basic optimization problem, and genetic programming is a domain-independent system that quickly explores enormous design gaps and builds genetically multiple computer programs to solve a problem. In particular, genetic programming converts the population of a computer program into new generation programs using analogies of naturally occurring genetic functions. My metric algorithm in computer science and functional research is an extension of traditional genetics. Algorithm this will provide a good enough solution to an optimization problem. This reduces the chance of pre-joining using local search technology. Gene algorithms are commonly used to develop advanced solutions for biologically motivated operators, i.e. mutations, shortcuts and selective updates and search issues. Starting with the basic process of a genetic algorithm - creating an initial population estimate - we evaluate each member to calculate ‘fitness’ for population and personal preference - we want to continue to improve our overall fitness. The study of population memes sees magical ideas as a kind of virus that sometimes spreads beyond fact and logic. Its pronunciation is that survival beliefs do not have to be true, survival rules are not fair, and survival rituals are not required. The advantages of genetic systems integration are global optimization. A large package solution provides many solutions that require less information in space. Probability in nature is the genetic representation using chromosomes. Biometric algorithms are one of the latest research areas in evolution. The term MA is now used in conjunction with evolution or a po
模因算法在计算机科学和函数研究中的应用,是传统遗传算法的扩展。设计改进的多目标模因算法。对迷因的研究将神奇的想法视为一种病毒,有时会超越事实和逻辑传播。它的发音是:生存信念不一定是正确的,生存规则不公平,生存仪式也没有必要。模仿算法这个术语最初是由莫斯科(1989)创造的,用来描述基于种群的混合进化机制与局部净化技术的结合。魔术是对信息和文化的研究,它与达尔文进化论的类比。通灵者将其描述为一种文化互动进化模型的方法。Mimetic描述的是如何成功地传播一个想法,但这可能不是真的。进化方法是以生物进化的概念为基础的。首先创建问题的可能解决方案的“总体”,然后使用“适应度函数”评估每个解决方案。人口随着时间的推移而发展,并确定最佳解决方案。差分进化是一种基于种群的相遇启发式搜索算法,它根据进化过程反复改进候选解来改进问题。这些算法对基本的优化问题很少或没有假设,遗传规划是一个领域独立的系统,它可以快速探索巨大的设计差距,并构建遗传多个计算机程序来解决问题。特别地,遗传编程利用自然发生的遗传功能的类比将计算机程序的种群转换为新一代程序。我在计算机科学和功能研究中的度量算法是传统遗传学的延伸。这种算法将为优化问题提供足够好的解决方案。这减少了使用本地搜索技术预先加入的机会。基因算法通常用于开发生物驱动算子的高级解决方案,即突变,捷径和选择性更新和搜索问题。从遗传算法的基本过程开始——创建一个初始的种群估计——我们评估每个成员来计算种群和个人偏好的“适应度”——我们想继续提高我们的整体适应度。对群体迷因的研究将神奇的想法视为一种病毒,有时会超越事实和逻辑传播。它的发音是生存信念不一定是正确的,生存规则不公平,生存仪式也不需要。遗传系统集成的优点是全局优化。大型包解决方案提供了许多需要较少空间信息的解决方案。概率在本质上是使用染色体的遗传表示。生物识别算法是进化领域的最新研究领域之一。现在,MA一词与进化或以人口为基础的方法结合使用,以解决个别学习或问题的地方发展实践。
{"title":"A Review On Memetic Algorithms and Its Developments","authors":"A. J. Wilson, D. Pallavi, M Ramachandran, Sathiyaraj Chinnasamy, S. Sowmiya","doi":"10.46632/eae/1/1/2","DOIUrl":"https://doi.org/10.46632/eae/1/1/2","url":null,"abstract":": A memetic algorithm in computer science and functional research an extension of the traditional genetic algorithm. Multiple target Memetic Algorithm for Design Improvement. The study of memes sees magical ideas as a kind of virus that sometimes spreads beyond fact and logic. Its pronunciation: Survival beliefs do not have to be true, survival rules are not fair, and survival rituals are not necessary. The term mimetic algorithm was first coined by Moscow (1989) to describe population-based hybrid evolutionary mechanisms integrated with local purification techniques. Magic the study of information and culture in terms of its analogy with Darwinian evolution. Spiritualists describe this as an approach to evolutionary models of cultural interactions. Mimetic describes how to successfully propagate an idea, but it may not be true. Evolutionary methods are Based on the concepts of biological evolution. The 'population' of possible solutions to the problem will be created first, and each solution will be evaluated using a 'fitness function'. The population develops over time and identifies the best solutions. Differential evolution is a population-based Meet Heuristic search algorithm that improves the problem by repeatedly improving a candidate solution based on the evolutionary process. Such algorithms make little or no assumption about the basic optimization problem, and genetic programming is a domain-independent system that quickly explores enormous design gaps and builds genetically multiple computer programs to solve a problem. In particular, genetic programming converts the population of a computer program into new generation programs using analogies of naturally occurring genetic functions. My metric algorithm in computer science and functional research is an extension of traditional genetics. Algorithm this will provide a good enough solution to an optimization problem. This reduces the chance of pre-joining using local search technology. Gene algorithms are commonly used to develop advanced solutions for biologically motivated operators, i.e. mutations, shortcuts and selective updates and search issues. Starting with the basic process of a genetic algorithm - creating an initial population estimate - we evaluate each member to calculate ‘fitness’ for population and personal preference - we want to continue to improve our overall fitness. The study of population memes sees magical ideas as a kind of virus that sometimes spreads beyond fact and logic. Its pronunciation is that survival beliefs do not have to be true, survival rules are not fair, and survival rituals are not required. The advantages of genetic systems integration are global optimization. A large package solution provides many solutions that require less information in space. Probability in nature is the genetic representation using chromosomes. Biometric algorithms are one of the latest research areas in evolution. The term MA is now used in conjunction with evolution or a po","PeriodicalId":446446,"journal":{"name":"Electrical and Automation Engineering","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114967055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Investigation on Tabu Search Algorithms Optimization 禁忌搜索算法优化研究
Pub Date : 2022-03-01 DOI: 10.46632/1/1/3
N. Subash, M. Ramachandran, Vimala Saravanan, Vidhya Prasanth
: Tabu Search is one of the local search methods used for mathematical optimization Metaheuristics search method. It was founded in 1986 by Fred W. Developed by Clover and in 1989 Formalized. Local (nearby) searches take a potential solution to a problem and its immediate neighbor Check countries (i.e., similar solutions except for very small details). Improved solution Diagnosis. Local search methods on plateaus where subdivisions or multiple solutions are equally applicable Tend to get entangled. Tabu Search is the local search by relaxing its basic rule Improves performance. First, any moves that get worse with each step Will be accepted if not upgraded (if the search is stuck in a strict local minimum). In addition, obstacles (hereinafter referred to as taboo) prevent the return to previously visited solutions Introduced in the category. The implementation of the tab search, the solutions visited or the user Uses memory systems that describe sets of rules provided. [2] A certain short If the possible solution within the period has been visited before or if it violates a rule, it is Will be referred to as "taboo" (blocked) so that the algorithm does not reconsider that possibility.
禁忌搜索是用于数学优化的局部搜索方法之一。元启发式搜索方法。它由Fred W.于1986年创立,由Clover开发,并于1989年正式成立。本地(附近)搜索获取问题的潜在解决方案及其近邻Check国家(即,除了非常小的细节之外的类似解决方案)。改进的解决方案诊断。在细分或多个解同样适用的高原上,局部搜索方法容易产生纠缠。禁忌搜索是通过放宽其基本规则的局部搜索来提高性能。首先,如果不升级(如果搜索陷入严格的局部最小值),那么每一步变得更糟的任何移动都将被接受。此外,障碍(以下简称禁忌)阻止返回到以前访问的解决方案中介绍的类别。实现选项卡搜索、访问的解决方案或用户使用的内存系统提供的描述规则集。[2]如果在此期间可能的解决方案之前已经被访问过,或者如果它违反了规则,它将被称为“禁忌”(阻止),这样算法就不会重新考虑这种可能性。
{"title":"An Investigation on Tabu Search Algorithms Optimization","authors":"N. Subash, M. Ramachandran, Vimala Saravanan, Vidhya Prasanth","doi":"10.46632/1/1/3","DOIUrl":"https://doi.org/10.46632/1/1/3","url":null,"abstract":": Tabu Search is one of the local search methods used for mathematical optimization Metaheuristics search method. It was founded in 1986 by Fred W. Developed by Clover and in 1989 Formalized. Local (nearby) searches take a potential solution to a problem and its immediate neighbor Check countries (i.e., similar solutions except for very small details). Improved solution Diagnosis. Local search methods on plateaus where subdivisions or multiple solutions are equally applicable Tend to get entangled. Tabu Search is the local search by relaxing its basic rule Improves performance. First, any moves that get worse with each step Will be accepted if not upgraded (if the search is stuck in a strict local minimum). In addition, obstacles (hereinafter referred to as taboo) prevent the return to previously visited solutions Introduced in the category. The implementation of the tab search, the solutions visited or the user Uses memory systems that describe sets of rules provided. [2] A certain short If the possible solution within the period has been visited before or if it violates a rule, it is Will be referred to as \"taboo\" (blocked) so that the algorithm does not reconsider that possibility.","PeriodicalId":446446,"journal":{"name":"Electrical and Automation Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128225987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Study on Evolutionary Algorithms and Its Applications 进化算法及其应用研究
Pub Date : 2022-03-01 DOI: 10.46632/eae/1/1/1
P. Bharathi, D. Pallavi, M. Ramachandran, Kurinjimalar Ramu, Chinnasami Sivaji
. Evolutionary methods are a horror-based approach to solving problems that are not easily solved in polynomial time, for example, classical NP-heart problems and take longer to complete. Evolutionary methods are commonly used to provide good approximate solutions to problems that cannot be easily solved using other techniques. Many optimization issues fall into this category. It can be very calculated- finding a suitable solution is serious but sometimes the optimal solution is enough. Major classes of contemporaries (in the order of popularity) E.A. Genetic algorithms (GAs), evolutionary strategies (ESs), differential evolution (DE) and distribution algorithm evaluation (EDAs) are used. Evolutionary methods are based on the concepts of biological evolution. The 'population' of possible solutions to the problem will be created first, and each solution will be evaluated using a 'fitness function'. The population develops over time and (hopefully) identifies the best solutions.
. 进化方法是一种基于恐惧的方法,用于解决不容易在多项式时间内解决的问题,例如,经典的NP-heart问题,需要更长的时间来完成。进化方法通常用于为使用其他技术无法轻松解决的问题提供良好的近似解决方案。许多优化问题都属于这一类。它可能是经过精心计算的——找到一个合适的解决方案是很严肃的,但有时最优解决方案就足够了。主要类别的同时代(按受欢迎程度排序)E.A.遗传算法(GAs),进化策略(ESs),差分进化(DE)和分布算法评估(EDAs)被使用。进化方法是以生物进化的概念为基础的。首先创建问题的可能解决方案的“总体”,然后使用“适应度函数”评估每个解决方案。人口随着时间的推移而发展,并(希望)确定最佳解决方案。
{"title":"A Study on Evolutionary Algorithms and Its Applications","authors":"P. Bharathi, D. Pallavi, M. Ramachandran, Kurinjimalar Ramu, Chinnasami Sivaji","doi":"10.46632/eae/1/1/1","DOIUrl":"https://doi.org/10.46632/eae/1/1/1","url":null,"abstract":". Evolutionary methods are a horror-based approach to solving problems that are not easily solved in polynomial time, for example, classical NP-heart problems and take longer to complete. Evolutionary methods are commonly used to provide good approximate solutions to problems that cannot be easily solved using other techniques. Many optimization issues fall into this category. It can be very calculated- finding a suitable solution is serious but sometimes the optimal solution is enough. Major classes of contemporaries (in the order of popularity) E.A. Genetic algorithms (GAs), evolutionary strategies (ESs), differential evolution (DE) and distribution algorithm evaluation (EDAs) are used. Evolutionary methods are based on the concepts of biological evolution. The 'population' of possible solutions to the problem will be created first, and each solution will be evaluated using a 'fitness function'. The population develops over time and (hopefully) identifies the best solutions.","PeriodicalId":446446,"journal":{"name":"Electrical and Automation Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125387237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection of Breast Cancer Using Deep Learning Techniques 使用深度学习技术检测乳腺癌
Pub Date : 2021-06-30 DOI: 10.46632/eae/2/1/9
G. S. Chandrasekhar, N. Thirupathi Rao
Evaluation of Histopathology images are a vital approach that is used for the breast cancer detection. To build up the efficiency of breast cancer detection and to reduce the burden of doctors and specialists, we layout various Deep Learning algorithms to recognize most cancers with the usage of histopathology scans. This paper follows several deep learning models like Convolutional Neural network (CNN) and Vgg16 for the recognition method. The dataset we used for class manner is Breast Histopathology Images which contain positive and negative images. We examined breast Histopathology images of 2,77,524 patients of which 198,748 images are IDC (-) and 78,786 images are IDC (+). This shows the deep learning algorithms can greatly facilitate the breast cancer detection, improving the accuracy and speed of detection. One of the most common cancers is Invasive Ductal Carcinoma (IDC). To determine the aggressiveness score to whole-mount specimen, doctors typically focus on areas containing IDC. Therefore, one of the common pre-processing steps for automatic aggressive categorization is to identify the exact region of IDC along the mounting side.
组织病理学图像的评估是乳腺癌检测的重要手段。为了提高乳腺癌检测的效率,减轻医生和专家的负担,我们设计了各种深度学习算法,利用组织病理学扫描来识别大多数癌症。本文采用卷积神经网络(CNN)和Vgg16等几种深度学习模型作为识别方法。我们用于分类方式的数据集是包含阳性和阴性图像的乳腺组织病理学图像。我们检查了277,524例患者的乳腺组织病理学图像,其中198,748张图像为IDC(-), 78,786张图像为IDC(+)。这说明深度学习算法可以极大地促进乳腺癌的检测,提高检测的准确性和速度。浸润性导管癌(Invasive Ductal Carcinoma, IDC)是最常见的癌症之一。为了确定整个标本的侵袭性评分,医生通常关注包含IDC的区域。因此,自动主动分类的常见预处理步骤之一是确定沿安装侧的IDC的确切区域。
{"title":"Detection of Breast Cancer Using Deep Learning Techniques","authors":"G. S. Chandrasekhar, N. Thirupathi Rao","doi":"10.46632/eae/2/1/9","DOIUrl":"https://doi.org/10.46632/eae/2/1/9","url":null,"abstract":"Evaluation of Histopathology images are a vital approach that is used for the breast cancer detection. To build up the efficiency of breast cancer detection and to reduce the burden of doctors and specialists, we layout various Deep Learning algorithms to recognize most cancers with the usage of histopathology scans. This paper follows several deep learning models like Convolutional Neural network (CNN) and Vgg16 for the recognition method. The dataset we used for class manner is Breast Histopathology Images which contain positive and negative images. We examined breast Histopathology images of 2,77,524 patients of which 198,748 images are IDC (-) and 78,786 images are IDC (+). This shows the deep learning algorithms can greatly facilitate the breast cancer detection, improving the accuracy and speed of detection. One of the most common cancers is Invasive Ductal Carcinoma (IDC). To determine the aggressiveness score to whole-mount specimen, doctors typically focus on areas containing IDC. Therefore, one of the common pre-processing steps for automatic aggressive categorization is to identify the exact region of IDC along the mounting side.","PeriodicalId":446446,"journal":{"name":"Electrical and Automation Engineering","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117271453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Electrical and Automation Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1