期刊文献+
共找到381,677篇文章
< 1 2 250 >
每页显示 20 50 100
Time Complexity of the Oracle Phase in Grover’s Algorithm
1
作者 Ying Liu 《American Journal of Computational Mathematics》 2024年第1期1-10,共10页
Since Grover’s algorithm was first introduced, it has become a category of quantum algorithms that can be applied to many problems through the exploitation of quantum parallelism. The original application was the uns... Since Grover’s algorithm was first introduced, it has become a category of quantum algorithms that can be applied to many problems through the exploitation of quantum parallelism. The original application was the unstructured search problems with the time complexity of O(). In Grover’s algorithm, the key is Oracle and Amplitude Amplification. In this paper, our purpose is to show through examples that, in general, the time complexity of the Oracle Phase is O(N), not O(1). As a result, the time complexity of Grover’s algorithm is O(N), not O(). As a secondary purpose, we also attempt to restore the time complexity of Grover’s algorithm to its original form, O(), by introducing an O(1) parallel algorithm for unstructured search without repeated items, which will work for most cases. In the worst-case scenarios where the number of repeated items is O(N), the time complexity of the Oracle Phase is still O(N) even after additional preprocessing. 展开更多
关键词 Quantum Computing ORACLE Amplitude Amplification Grover’s algorithm
下载PDF
Time Complexity of Evolutionary Algorithms for Combinatorial Optimization:A Decade of Results 被引量:5
2
作者 Pietro S.Oliveto 《International Journal of Automation and computing》 EI 2007年第3期281-293,共13页
Computational time complexity analyzes of evolutionary algorithms (EAs) have been performed since the mid-nineties. The first results were related to very simple algorithms, such as the (1+1)-EA, on toy problems.... Computational time complexity analyzes of evolutionary algorithms (EAs) have been performed since the mid-nineties. The first results were related to very simple algorithms, such as the (1+1)-EA, on toy problems. These efforts produced a deeper understanding of how EAs perform on different kinds of fitness landscapes and general mathematical tools that may be extended to the analysis of more complicated EAs on more realistic problems. In fact, in recent years, it has been possible to analyze the (1+1)-EA on combinatorial optimization problems with practical applications and more realistic population-based EAs on structured toy problems. This paper presents a survey of the results obtained in the last decade along these two research lines. The most common mathematical techniques are introduced, the basic ideas behind them are discussed and their elective applications are highlighted. Solved problems that were still open are enumerated as are those still awaiting for a solution. New questions and problems arisen in the meantime are also considered. 展开更多
关键词 Evolutionary algorithms computational complexity combinatorial optimization evolutionary computation theory.
下载PDF
Cellular automation model of faults and algorithmic complexity
3
作者 陆远忠 吕悦军 《Acta Seismologica Sinica(English Edition)》 CSCD 1994年第2期235-244,共10页
In this paper, we use the cellular automation model to imitate earthquake process and draw some conclusionsof general applicability. First, it is confirmed that earthquake process has some ordering characters, and it ... In this paper, we use the cellular automation model to imitate earthquake process and draw some conclusionsof general applicability. First, it is confirmed that earthquake process has some ordering characters, and it isshown that both the existence and their mutual arrangement of faults could obviously influence the overallcharacters of earthquake process. Then the characters of each stage of model evolution are explained withself-organized critical state theory. Finally, earthquake sequences produced by the models are analysed interms pf algorithmic complexity and the result shows that AC-values of algorithmic complexity could be usedto study earthquake process and evolution. 展开更多
关键词 cellular automation model algorithmic complexity self-organized critical state EVOLUTION FAULT
下载PDF
Polynomial Complexity Bounds of Mehrotra-type Predictor-corrector Algorithms for Linear Programming over Symmetric Cones
4
作者 刘长河 尚有林 李振国 《Chinese Quarterly Journal of Mathematics》 2015年第4期475-494,共20页
We establish polynomial complexity corrector algorithms for linear programming over bounds of the Mehrotra-type predictor- symmetric cones. We first slightly modify the maximum step size in the predictor step of the s... We establish polynomial complexity corrector algorithms for linear programming over bounds of the Mehrotra-type predictor- symmetric cones. We first slightly modify the maximum step size in the predictor step of the safeguard based Mehrotra-type algorithm for linear programming, that was proposed by Salahi et al. Then, using the machinery of Euclidean Jordan algebras, we extend the modified algorithm to symmetric cones. Based on the Nesterov-Todd direction, we obtain O(r log ε1) iteration complexity bound of this algorithm, where r is the rank of the Jordan algebras and ε is the required precision. We also present a new variant of Mehrotra-type algorithm using a new adaptive updating scheme of centering parameter and show that this algorithm enjoys the same order of complexity bound as the safeguard algorithm. We illustrate the numerical behaviour of the methods on some small examples. 展开更多
关键词 linear programming symmetric cone Euclidean Jordan algebra interior-point methods Mehrotra-type algorithm polynomial complexity
下载PDF
Dimensional Complexity and Algorithmic Efficiency
5
作者 Alexander Odilon Ngu 《International Journal of Modern Nonlinear Theory and Application》 2022年第1期1-10,共10页
This paper uses the concept of algorithmic efficiency to present a unified theory of intelligence. Intelligence is defined informally, formally, and computationally. We introduce the concept of dimensional complexity ... This paper uses the concept of algorithmic efficiency to present a unified theory of intelligence. Intelligence is defined informally, formally, and computationally. We introduce the concept of dimensional complexity in algorithmic efficiency and deduce that an optimally efficient algorithm has zero time complexity, zero space complexity, and an infinite dimensional complexity. This algorithm is used to generate the number line. 展开更多
关键词 Symbolic Intelligence Dimensional complexity algorithmic Efficiency Notational Unification Turing Complete Machine Unified Theory
下载PDF
Timing Advanced Estimation Algorithm of Low Complexity Based on DFT Spectrum Analysis for Satellite System 被引量:4
6
作者 HE Yizhou CUI Gaofeng +2 位作者 LI Pengxu CHANG Ruijun WANG Weidong 《China Communications》 SCIE CSCD 2015年第4期140-150,共11页
In satellite mobile communication system, relative movement of the satellite and the terminal will cause a large Doppler offset. Timing advanced estimation with Zadoff-Chu sequence is sensitive to the frequency offset... In satellite mobile communication system, relative movement of the satellite and the terminal will cause a large Doppler offset. Timing advanced estimation with Zadoff-Chu sequence is sensitive to the frequency offset. When the frequency offset is larger than one times subcarrier spacing, the value of peak cannot be detected at the receiving end. To suppress the larger Doppler frequency shift, this paper proposes a novel timing advanced estimation scheme(TAE-MCD) for satellite communication system. In this algorithm, t r a n s m i t t e d s i g n a l i s d i v i d e d i n t o Z C sequence and its conjugate sequence. Using multiplication and DFT operation to find the estimated peak at the receiving end, and make subtraction with the obtained sequences at last. The scheme can not only inhibit the adverse effects of large Doppler frequency shift in timing estimation effectively, but also reduce the computational complexity at the receiving end and improve the work efficiency of the hardware. Simulations results show that TAEMCD outperform the existing timing advanced estimation methods, on the condition of no additional time and frequency resource are needed. 展开更多
关键词 timing estimation zadoff-chu DFT low complexity satellite communi-cations
下载PDF
Low Complexity Precoded Greedy Power Allocation Algorithms for OFDM Communication Systems 被引量:1
7
作者 Najib A. Odhah Moawad I. Dessouky +1 位作者 Waleed Al-Hanafy Fathi E. Abd El-Samie 《Journal of Signal and Information Processing》 2012年第2期185-191,共7页
In this paper, an enhanced greedy bit and power allocation algorithms for orthogonal frequency division multiplexing (OFDM) communication systems are introduced. These algorithms combine low complexity greedy power al... In this paper, an enhanced greedy bit and power allocation algorithms for orthogonal frequency division multiplexing (OFDM) communication systems are introduced. These algorithms combine low complexity greedy power allocation algorithms with a simplified maximum ratio combining (MRC) precoding technique at the transmitter for maximizing the average data throughput of OFDM communication systems. Results of computer simulations show that precoding is an effective technique for improving the throughput performance of the proposed bit and power allocation algorithms. 展开更多
关键词 OFDM Uniform Power Allocation GREEDY algorithm THROUGHPUT Enhancement MRC PRECODING
下载PDF
Space Complexity of Algorithm for Modular Multiplicative Inverse
8
作者 Boris S. Verkhovsky 《International Journal of Communications, Network and System Sciences》 2011年第6期357-363,共7页
In certain computational systems the amount of space required to execute an algorithm is even more restrictive than the corresponding time necessary for solution of a problem. In this paper an algorithm for modular mu... In certain computational systems the amount of space required to execute an algorithm is even more restrictive than the corresponding time necessary for solution of a problem. In this paper an algorithm for modular multiplicative inverse is introduced and its computational space complexity is analyzed. A tight upper bound for bit storage required for execution of the algorithm is provided. It is demonstrated that for range of numbers used in public-key encryption systems, the size of bit storage does not exceed a 2K-bit threshold in the worst-case. This feature of the Enhanced-Euclid algorithm allows designing special-purpose hardware for its implementation as a subroutine in communication-secure wireless devices. 展开更多
关键词 MODULAR MULTIPLICATIVE INVERSE Public-Key Encryption SPACE complexity Tight Upper Bound Extended EUCLID algorithm Prefix Coding Enhanced EUCLID algorithm Custom-Built Circuits
下载PDF
Reduction in Complexity of the Algorithm by Increasing the Used Memory - An Example
9
作者 Leonid Kugel Victor A. Gotlib 《American Journal of Computational Mathematics》 2013年第3期38-40,共3页
An algorithm complexity, or its efficiency, meaning its time of evaluation is the focus of primary care in algorithmic problems solving. Raising the used memory may reduce the complexity of algorithm drastically. We p... An algorithm complexity, or its efficiency, meaning its time of evaluation is the focus of primary care in algorithmic problems solving. Raising the used memory may reduce the complexity of algorithm drastically. We present an example of two algorithms on finite set, where change the approach to the same problem and introduction a memory array allows decrease the complexity of the algorithm from the order O(n2) up to the order O(n). 展开更多
关键词 algorithm complexity REDUCTION MEMORY USAGE
下载PDF
Solving A Kind of High Complexity Multi-Objective Problems by A Fast Algorithm
10
作者 Zeng San-you, Ding Li-xin, Kang Li-shanDepartment of Computer Science,China University of GeoSciences, Wuhan 430074, Hubei, China Department of Computer Science, Zhuzhou Institute of Technology , Zhuzhou 412008, Hunan, China State Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072, Hubei, China 《Wuhan University Journal of Natural Sciences》 CAS 2003年第S1期183-188,共6页
A fast algorithm is proposed to solve a kind of high complexity multi-objective problems in this paper. It takes advantages of both the orthogonal design method to search evenly, and the statistical optimal method to ... A fast algorithm is proposed to solve a kind of high complexity multi-objective problems in this paper. It takes advantages of both the orthogonal design method to search evenly, and the statistical optimal method to speed up the computation. It is very suitable for solving high complexity problems, and quickly yields solutions which converge to the Pareto-optimal set with high precision and uniform distribution. Some complicated multi-objective problems are solved by the algorithm and the results show that the algorithm is not only fast but also superior to other MOGAS and MOEAs, such as the currently efficient algorithm SPEA, in terms of the precision, quantity and distribution of solutions. 展开更多
关键词 evolutionary algorithms orthogonal design multi-objective optimization Pareto-optimal set
下载PDF
Low Complexity Detection Algorithms Based on ADMIN for Massive MIMO
11
作者 Shuchao Mi Jianyong Zhang +2 位作者 Fengju Fan Baorui Yan Muguang Wang 《China Communications》 SCIE CSCD 2023年第11期67-77,共11页
This paper proposes the alternating direction method of multipliers-based infinity-norm(ADMIN) with threshold(ADMIN-T) and with percentage(ADMIN-P) detection algorithms,which make full use of the distribution of the s... This paper proposes the alternating direction method of multipliers-based infinity-norm(ADMIN) with threshold(ADMIN-T) and with percentage(ADMIN-P) detection algorithms,which make full use of the distribution of the signal to interference plus noise ratio(SINR) for an uplink massive MIMO system.The ADMIN-T and ADMIN-P detection algorithms are improved visions of the ADMIN detection algorithm,in which an appropriate SINR threshold in the ADMIN-T detection algorithm and a certain percentage in the ADMIN-P detection algorithm are designed to reduce the overall computational complexity.The detected symbols are divided into two parts by the SINR threshold which is based on the cumulative probability density function(CDF) of SINR and a percentage,respectively.The symbols in higher SINR part are detected by MMSE.The interference of these symbols is then cancelled by successive interference cancellation(SIC).Afterwards the remaining symbols with low SINR are iteratively detected by ADMIN.The simulation results show that the ADMIIN-T and the ADMIN-P detection algorithms provide a significant performance gain compared with some recently proposed detection algorithms.In addition,the computational complexity of ADMIN-T and ADMIN-P are significantly reduced.Furthermore,in the case of same number of transceiver antennas,the proposed algorithms have a higher performance compared with the case of asymmetric transceiver antennas. 展开更多
关键词 ADMIN low complexity detection algo-rithm massive MIMO MMSE SINR
下载PDF
Low complexity user scheduling algorithms for uplink multiuser MIMO systems
12
作者 李亮 邱玲 卫国 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2012年第2期105-112,共8页
Two efficient and low complexity multiuser scheduling algorithms are proposed for the uplink multi- ple-input multiple-output systems in this paper. Conventionally, the exhaustive search algorithm (ESA) can give the... Two efficient and low complexity multiuser scheduling algorithms are proposed for the uplink multi- ple-input multiple-output systems in this paper. Conventionally, the exhaustive search algorithm (ESA) can give the optimal performance; however, it is complexity prohibitive for practical implementation. Aiming at re- ducing the complexity while keeping the achievable sum rate performance, two heuristic algorithms are proposed for the multiuser scheduling problems: the improved genetic algorithm and simplified norm-based greedy algo- rithm. Moreover, we also consider the heterogeneity scenario where a modified grouping-based user selection al- gorithm is given to guarantee the user' s fairness. Specifically, the asymptotic behavior of the norm-based greed- y algorithm is given when each user is equipped with one antenna. Numerical examples demonstrate the superi- ority of our proposed schedulin~ and ~rouoin~ algorithms. 展开更多
关键词 Genetic algorithm (GA) multiuser scheduling muhiple-input multiple-output (MIMO)
下载PDF
A Theoretical Comparison among Recursive Algorithms for Fast Computation of Zernike Moments Using the Concept of Time Complexity
13
作者 Nasrin Bastani Alireza Vard +1 位作者 Mehdi Jabalameli Vahid Bastani 《American Journal of Computational Mathematics》 2021年第4期304-326,共23页
Zernike polynomials have been used in different fields such as optics, astronomy, and digital image analysis for many years. To form these polynomials, Zernike moments are essential to be determined. One of the main i... Zernike polynomials have been used in different fields such as optics, astronomy, and digital image analysis for many years. To form these polynomials, Zernike moments are essential to be determined. One of the main issues in realizing the moments is using factorial terms in their equation which cause</span><span style="font-size:10.0pt;font-family:"">s</span><span style="font-size:10.0pt;font-family:""> higher time complexity. As a solution, several methods have been presented to reduce the time complexity of these polynomials in recent years. The purpose of this research is to study several methods among the most popular recursive methods for fast Zernike computation and compare them <span>together by a global theoretical evaluation system called worst-case time co</span><span>mplexity. In this study, we have analyzed the selected algorithms and calculate</span>d the worst-case time complexity for each one. After that, the results are represented and explained and finally, a conclusion has been made by comparing th</span><span style="font-size:10.0pt;font-family:"">ese</span><span style="font-size:10.0pt;font-family:""> criteria among the studied algorithms. According to time complexity, we have observed that although some algorithms </span><span style="font-size:10.0pt;font-family:"">such </span><span style="font-size:10.0pt;font-family:"">as Wee method and Modified Prata method were successful in having the smaller time complexit<span>ies, some other approaches did not make any significant difference compa</span>r</span><span style="font-size:10.0pt;font-family:"">ed</span><span style="font-size:10.0pt;font-family:""> to the classical algorithm. 展开更多
关键词 Time complexity Uniform Model Zernike Moments Zernike Polynomi-als
下载PDF
Fusion Algorithm Based on Improved A^(*)and DWA for USV Path Planning
14
作者 Changyi Li Lei Yao Chao Mi 《哈尔滨工程大学学报(英文版)》 2025年第1期224-237,共14页
The traditional A^(*)algorithm exhibits a low efficiency in the path planning of unmanned surface vehicles(USVs).In addition,the path planned presents numerous redundant inflection waypoints,and the security is low,wh... The traditional A^(*)algorithm exhibits a low efficiency in the path planning of unmanned surface vehicles(USVs).In addition,the path planned presents numerous redundant inflection waypoints,and the security is low,which is not conducive to the control of USV and also affects navigation safety.In this paper,these problems were addressed through the following improvements.First,the path search angle and security were comprehensively considered,and a security expansion strategy of nodes based on the 5×5 neighborhood was proposed.The A^(*)algorithm search neighborhood was expanded from 3×3 to 5×5,and safe nodes were screened out for extension via the node security expansion strategy.This algorithm can also optimize path search angles while improving path security.Second,the distance from the current node to the target node was introduced into the heuristic function.The efficiency of the A^(*)algorithm was improved,and the path was smoothed using the Floyd algorithm.For the dynamic adjustment of the weight to improve the efficiency of DWA,the distance from the USV to the target point was introduced into the evaluation function of the dynamic-window approach(DWA)algorithm.Finally,combined with the local target point selection strategy,the optimized DWA algorithm was performed for local path planning.The experimental results show the smooth and safe path planned by the fusion algorithm,which can successfully avoid dynamic obstacles and is effective and feasible in path planning for USVs. 展开更多
关键词 Improved A^(*)algorithm Optimized DWA algorithm Unmanned surface vehicles Path planning Fusion algorithm
下载PDF
A Complexity Analysis and Entropy for Different Data Compression Algorithms on Text Files 被引量:1
15
作者 Mohammad Hjouj Btoush Ziad E. Dawahdeh 《Journal of Computer and Communications》 2018年第1期301-315,共15页
In this paper, we analyze the complexity and entropy of different methods of data compression algorithms: LZW, Huffman, Fixed-length code (FLC), and Huffman after using Fixed-length code (HFLC). We test those algorith... In this paper, we analyze the complexity and entropy of different methods of data compression algorithms: LZW, Huffman, Fixed-length code (FLC), and Huffman after using Fixed-length code (HFLC). We test those algorithms on different files of different sizes and then conclude that: LZW is the best one in all compression scales that we tested especially on the large files, then Huffman, HFLC, and FLC, respectively. Data compression still is an important topic for research these days, and has many applications and uses needed. Therefore, we suggest continuing searching in this field and trying to combine two techniques in order to reach a best one, or use another source mapping (Hamming) like embedding a linear array into a Hypercube with other good techniques like Huffman and trying to reach good results. 展开更多
关键词 TEXT FILES Data Compression HUFFMAN Coding LZW Hamming ENTROPY complexity
下载PDF
Research on Euclidean Algorithm and Reection on Its Teaching
16
作者 ZHANG Shaohua 《应用数学》 北大核心 2025年第1期308-310,共3页
In this paper,we prove that Euclid's algorithm,Bezout's equation and Divi-sion algorithm are equivalent to each other.Our result shows that Euclid has preliminarily established the theory of divisibility and t... In this paper,we prove that Euclid's algorithm,Bezout's equation and Divi-sion algorithm are equivalent to each other.Our result shows that Euclid has preliminarily established the theory of divisibility and the greatest common divisor.We further provided several suggestions for teaching. 展开更多
关键词 Euclid's algorithm Division algorithm Bezout's equation
下载PDF
DDoS Attack Autonomous Detection Model Based on Multi-Strategy Integrate Zebra Optimization Algorithm
17
作者 Chunhui Li Xiaoying Wang +2 位作者 Qingjie Zhang Jiaye Liang Aijing Zhang 《Computers, Materials & Continua》 SCIE EI 2025年第1期645-674,共30页
Previous studies have shown that deep learning is very effective in detecting known attacks.However,when facing unknown attacks,models such as Deep Neural Networks(DNN)combined with Long Short-Term Memory(LSTM),Convol... Previous studies have shown that deep learning is very effective in detecting known attacks.However,when facing unknown attacks,models such as Deep Neural Networks(DNN)combined with Long Short-Term Memory(LSTM),Convolutional Neural Networks(CNN)combined with LSTM,and so on are built by simple stacking,which has the problems of feature loss,low efficiency,and low accuracy.Therefore,this paper proposes an autonomous detectionmodel for Distributed Denial of Service attacks,Multi-Scale Convolutional Neural Network-Bidirectional Gated Recurrent Units-Single Headed Attention(MSCNN-BiGRU-SHA),which is based on a Multistrategy Integrated Zebra Optimization Algorithm(MI-ZOA).The model undergoes training and testing with the CICDDoS2019 dataset,and its performance is evaluated on a new GINKS2023 dataset.The hyperparameters for Conv_filter and GRU_unit are optimized using the Multi-strategy Integrated Zebra Optimization Algorithm(MIZOA).The experimental results show that the test accuracy of the MSCNN-BiGRU-SHA model based on the MIZOA proposed in this paper is as high as 0.9971 in the CICDDoS 2019 dataset.The evaluation accuracy of the new dataset GINKS2023 created in this paper is 0.9386.Compared to the MSCNN-BiGRU-SHA model based on the Zebra Optimization Algorithm(ZOA),the detection accuracy on the GINKS2023 dataset has improved by 5.81%,precisionhas increasedby 1.35%,the recallhas improvedby 9%,and theF1scorehas increasedby 5.55%.Compared to the MSCNN-BiGRU-SHA models developed using Grid Search,Random Search,and Bayesian Optimization,the MSCNN-BiGRU-SHA model optimized with the MI-ZOA exhibits better performance in terms of accuracy,precision,recall,and F1 score. 展开更多
关键词 Distributed denial of service attack intrusion detection deep learning zebra optimization algorithm multi-strategy integrated zebra optimization algorithm
下载PDF
Low Complexity Multiuser Detection Algorithm for Multi-Beam Satellite Systems
18
作者 Yang Wang Danfeng Zhao Xi Liao 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2015年第5期105-109,共5页
The minimum mean square error-successive interference cancellation( MMSE-SIC) multiuser detection algorithm has high complexity and long processing latency. A multiuser detection algorithm is proposed for multi-beam s... The minimum mean square error-successive interference cancellation( MMSE-SIC) multiuser detection algorithm has high complexity and long processing latency. A multiuser detection algorithm is proposed for multi-beam satellite systems in order to decrease the complexity and latency. The spot beams are grouped base on the distance between them in the proposed algorithm. Some groups are detected in parallel after a crucial group-wise interference cancellation. Furthermore, the multi-stage structure is introduced to improve the performance. Simulation results show that the proposed algorithm can achieve better performance with less complexity compared with the existing group detection algorithm. Moreover,the proposed algorithm using one stage can reduce the complexity over the fast MMSE-SIC and existing group detection algorithm by 9% and20. 9%. The processing latency is reduced significantly compared with the MMSE-SIC. 展开更多
关键词 satellite COMMUNICATIONS MULTI-BEAM SATELLITES MULTIUSER detection complexity
下载PDF
An Algorithm for Cloud-based Web Service Combination Optimization Through Plant Growth Simulation
19
作者 Li Qiang Qin Huawei +1 位作者 Qiao Bingqin Wu Ruifang 《系统仿真学报》 北大核心 2025年第2期462-473,共12页
In order to improve the efficiency of cloud-based web services,an improved plant growth simulation algorithm scheduling model.This model first used mathematical methods to describe the relationships between cloud-base... In order to improve the efficiency of cloud-based web services,an improved plant growth simulation algorithm scheduling model.This model first used mathematical methods to describe the relationships between cloud-based web services and the constraints of system resources.Then,a light-induced plant growth simulation algorithm was established.The performance of the algorithm was compared through several plant types,and the best plant model was selected as the setting for the system.Experimental results show that when the number of test cloud-based web services reaches 2048,the model being 2.14 times faster than PSO,2.8 times faster than the ant colony algorithm,2.9 times faster than the bee colony algorithm,and a remarkable 8.38 times faster than the genetic algorithm. 展开更多
关键词 cloud-based service scheduling algorithm resource constraint load optimization cloud computing plant growth simulation algorithm
原文传递
Short-TermWind Power Forecast Based on STL-IAOA-iTransformer Algorithm:A Case Study in Northwest China
20
作者 Zhaowei Yang Bo Yang +5 位作者 Wenqi Liu Miwei Li Jiarong Wang Lin Jiang Yiyan Sang Zhenning Pan 《Energy Engineering》 2025年第2期405-430,共26页
Accurate short-term wind power forecast technique plays a crucial role in maintaining the safety and economic efficiency of smart grids.Although numerous studies have employed various methods to forecast wind power,th... Accurate short-term wind power forecast technique plays a crucial role in maintaining the safety and economic efficiency of smart grids.Although numerous studies have employed various methods to forecast wind power,there remains a research gap in leveraging swarm intelligence algorithms to optimize the hyperparameters of the Transformer model for wind power prediction.To improve the accuracy of short-term wind power forecast,this paper proposes a hybrid short-term wind power forecast approach named STL-IAOA-iTransformer,which is based on seasonal and trend decomposition using LOESS(STL)and iTransformer model optimized by improved arithmetic optimization algorithm(IAOA).First,to fully extract the power data features,STL is used to decompose the original data into components with less redundant information.The extracted components as well as the weather data are then input into iTransformer for short-term wind power forecast.The final predicted short-term wind power curve is obtained by combining the predicted components.To improve the model accuracy,IAOA is employed to optimize the hyperparameters of iTransformer.The proposed approach is validated using real-generation data from different seasons and different power stations inNorthwest China,and ablation experiments have been conducted.Furthermore,to validate the superiority of the proposed approach under different wind characteristics,real power generation data fromsouthwestChina are utilized for experiments.Thecomparative results with the other six state-of-the-art prediction models in experiments show that the proposed model well fits the true value of generation series and achieves high prediction accuracy. 展开更多
关键词 Short-termwind power forecast improved arithmetic optimization algorithm iTransformer algorithm SimuNPS
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部