Результаты поиска по 'optimization algorithm':
Найдено статей: 108
  1. Shumixin A.G., Boyarshinova A.S.
    Algorithm of artificial neural network architecture and training set size configuration within approximation of dynamic object behavior
    Computer Research and Modeling, 2015, v. 7, no. 2, pp. 243-251

    The article presents an approach to configuration of an artificial neural network architecture and a training set size. Configuration is based on parameter minimization with constraints specifying neural network model quality criteria. The algorithm of artificial neural network architecture and training set size configuration is applied to dynamic object artificial neural network approximation.
    Series of computational experiments were performed. The method is applicable to construction of dynamic object models based on non-linear autocorrelation neural networks.

    Views (last year): 2. Citations: 8 (RSCI).
  2. Sviridenko A.B.
    The correction to Newton's methods of optimization
    Computer Research and Modeling, 2015, v. 7, no. 4, pp. 835-863

    An approach to the decrease of norm of the correction in Newton’s methods of optimization, based on the Cholesky’s factorization is presented, which is based on the integration with the technique of the choice of leading element of algorithm of linear programming as a method of solving the system of equations. We investigate the issues of increasing of the numerical stability of the Cholesky’s decomposition and the Gauss’ method of exception.

    Views (last year): 1. Citations: 6 (RSCI).
  3. Mikhailenko S.A., Sheremet M.A.
    Simulation of convective-radiative heat transfer in a differentially heated rotating cavity
    Computer Research and Modeling, 2018, v. 10, no. 2, pp. 195-207

    Mathematical simulation of unsteady natural convection and thermal surface radiation within a rotating square enclosure was performed. The considered domain of interest had two isothermal opposite walls subjected to constant low and high temperatures, while other walls are adiabatic. The walls were diffuse and gray. The considered cavity rotated with constant angular velocity relative to the axis that was perpendicular to the cavity and crossed the cavity in the center. Mathematical model, formulated in dimensionless transformed variables “stream function – vorticity” using the Boussinesq approximation and diathermic approach for the medium, was performed numerically using the finite difference method. The vorticity dispersion equation and energy equation were solved using locally one-dimensional Samarskii scheme. The diffusive terms were approximated by central differences, while the convective terms were approximated using monotonic Samarskii scheme. The difference equations were solved by the Thomas algorithm. The approximated Poisson equation for the stream function was solved by successive over-relaxation method. Optimal value of the relaxation parameter was found on the basis of computational experiments. Radiative heat transfer was analyzed using the net-radiation method in Poljak approach. The developed computational code was tested using the grid independence analysis and experimental and numerical results for the model problem.

    Numerical analysis of unsteady natural convection and thermal surface radiation within the rotating enclosure was performed for the following parameters: Ra = 103–106, Ta = 0–105, Pr = 0.7, ε = 0–0.9. All distributions were obtained for the twentieth complete revolution when one can find the periodic behavior of flow and heat transfer. As a result we revealed that at low angular velocity the convective flow can intensify but the following growth of angular velocity leads to suppression of the convective flow. The radiative Nusselt number changes weakly with the Taylor number.

    Views (last year): 20.
  4. Fedina A.A., Nurgaliev A.I., Skvortsova D.A.
    Comparison of the results of using various evolution algorithms to solve the problem of route optimization of unmanned vehicles
    Computer Research and Modeling, 2022, v. 14, no. 1, pp. 45-62

    In this paper, a comparative analysis of the exact and heuristic algorithms presented by the method of branches and boundaries, genetic and ant algorithms, respectively, is carried out to find the optimal solution to the traveling salesman problem using the example of a courier robot. The purpose of the work is to determine the running time, the length of the obtained route and the amount of memory required for the program to work, using the method of branches and boundaries and evolutionary heuristic algorithms. Also, the most appropriate of the listed methods for use in the specified conditions is determined. This article uses the materials of the conducted research, implemented in the format of a computer program, the program code for which is implemented in Python. In the course of the study, a number of criteria for the applicability of algorithms were selected (the time of the program, the length of the constructed route and the amount of memory necessary for the program to work), the results of the algorithms were obtained under specified conditions and conclusions were drawn about the degree of expediency of using one or another algorithm in various specified conditions of the courier robot. During the study, it turned out that for a small number of points  $\leqslant10$, the method of branches and boundaries is the most preferable, since it finds the optimal solution faster. However, when calculating the route by this method, provided that the points increase by more than 10, the operating time increases exponentially. In this case, more effective results are obtained by a heuristic approach using a genetic and ant algorithm. At the same time, the ant algorithm is distinguished by solutions that are closest to the reference ones and with an increase of more than 16 points. Its relative disadvantage is the greatest resource intensity among the considered algorithms. The genetic algorithm gives similar results, but after increasing the points more than 16, the length of the found route increases relative to the reference one. The advantage of the genetic algorithm is its lower resource intensity compared to other algorithms.

    The practical significance of this article lies in the potential possibility of using the results obtained for the optimal solution of logistics problems by an automated system in various fields: warehouse logistics, transport logistics, «last mile» logistics, etc.

  5. Gladin E.L., Zainullina K.E.
    Ellipsoid method for convex stochastic optimization in small dimension
    Computer Research and Modeling, 2021, v. 13, no. 6, pp. 1137-1147

    The article considers minimization of the expectation of convex function. Problems of this type often arise in machine learning and a variety of other applications. In practice, stochastic gradient descent (SGD) and similar procedures are usually used to solve such problems. We propose to use the ellipsoid method with mini-batching, which converges linearly and can be more efficient than SGD for a class of problems. This is verified by our experiments, which are publicly available. The algorithm does not require neither smoothness nor strong convexity of the objective to achieve linear convergence. Thus, its complexity does not depend on the conditional number of the problem. We prove that the method arrives at an approximate solution with given probability when using mini-batches of size proportional to the desired accuracy to the power −2. This enables efficient parallel execution of the algorithm, whereas possibilities for batch parallelization of SGD are rather limited. Despite fast convergence, ellipsoid method can result in a greater total number of calls to oracle than SGD, which works decently with small batches. Complexity is quadratic in dimension of the problem, hence the method is suitable for relatively small dimensionalities.

  6. Meleshko E.V., Afanasenko T.S., Gadzhimirzayev Sh.M., Pashkov R.A., Gilya-Zetinov A.A., Tsybulko E.A., Zaitseva A.S., Khelvas A.V.
    Discrete simulation of the road restoration process
    Computer Research and Modeling, 2022, v. 14, no. 6, pp. 1255-1268

    This work contains a description of the results of modeling the process of maintaining the readiness of a section of the road network under strikes of with specified parameters. A one-dimensional section of road up to 40 km long with a total number of strikes up to 100 during the work of the brigade is considered. A simulation model has been developed for carrying out work to maintain it in working condition by several groups (engineering teams) that are part of the engineering and road division. A multicopter-type unmanned aerial vehicle is used to search for the points of appearance of obstacles. Life cycle schemes of the main participants of the tactical scene have been developed and an event-driven model of the tactical scene has been built. The format of the event log generated as a result of simulation modeling of the process of maintaining a road section is proposed. To visualize the process of maintaining the readiness of a road section, it is proposed to use visualization in the cyclogram format.

    An XSL style has been developed for building a cyclogram based on an event log. As an algorithm for making a decision on the assignment of barriers to brigades, the simplest algorithm has been adopted, prescribing choosing the nearest barrier. A criterion describing the effectiveness of maintenance work on the site based on the assessment of the average speed of vehicles on the road section is proposed. Graphs of the dependence of the criterion value and the root-meansquare error depending on the length of the maintained section are plotted and an estimate is obtained for the maximum length of the road section maintained in a state of readiness with specified values for the selected quality indicator with specified characteristics of striking and performance of repair crews. The expediency of carrying out work to maintain readiness by several brigades that are part of the engineering and road division operating autonomously is shown.

    The influence of the speed of the unmanned aerial vehicle on the ability to maintain the readiness of the road section is analyzed. The speed range for from 10 to 70 km/h is considered, which corresponds to the technical capabilities of multicoptertype reconnaissance unmanned aerial vehicles. The simulation results can be used as part of a complex simulation model of an army offensive or defensive operation and for solving the problem of optimizing the assignment of tasks to maintain the readiness of road sections to engineering and road brigades. The proposed approach may be of interest for the development of military-oriented strategy games.

  7. Nefedova O.A., Spevak L.P., Kazakov A.L., Lee M.G.
    Solution to a two-dimensional nonlinear heat equation using null field method
    Computer Research and Modeling, 2023, v. 15, no. 6, pp. 1449-1467

    The paper deals with a heat wave motion problem for a degenerate second-order nonlinear parabolic equation with power nonlinearity. The considered boundary condition specifies in a plane the motion equation of the circular zero front of the heat wave. A new numerical-analytical algorithm for solving the problem is proposed. A solution is constructed stepby- step in time using difference time discretization. At each time step, a boundary value problem for the Poisson equation corresponding to the original equation at a fixed time is considered. This problem is, in fact, an inverse Cauchy problem in the domain whose initial boundary is free of boundary conditions and two boundary conditions (Neumann and Dirichlet) are specified on a current boundary (heat wave). A solution of this problem is constructed as the sum of a particular solution to the nonhomogeneous Poisson equation and a solution to the corresponding Laplace equation satisfying the boundary conditions. Since the inhomogeneity depends on the desired function and its derivatives, an iterative solution procedure is used. The particular solution is sought by the collocation method using inhomogeneity expansion in radial basis functions. The inverse Cauchy problem for the Laplace equation is solved by the null field method as applied to a circular domain with a circular hole. This method is used for the first time to solve such problem. The calculation algorithm is optimized by parallelizing the computations. The parallelization of the computations allows us to realize effectively the algorithm on high performance computing servers. The algorithm is implemented as a program, which is parallelized by using the OpenMP standard for the C++ language, suitable for calculations with parallel cycles. The effectiveness of the algorithm and the robustness of the program are tested by the comparison of the calculation results with the known exact solution as well as with the numerical solution obtained earlier by the authors with the use of the boundary element method. The implemented computational experiment shows good convergence of the iteration processes and higher calculation accuracy of the proposed new algorithm than of the previously developed one. The solution analysis allows us to select the radial basis functions which are most suitable for the proposed algorithm.

  8. Gaber M.I., Nechaevskiy A.V.
    Development of advanced intrusion detection approach using machine and ensemble learning for industrial internet of things networks
    Computer Research and Modeling, 2025, v. 17, no. 5, pp. 799-827

    The Industrial Internet of Things (IIoT) networks plays a significant role in enhancing industrial automation systems by connecting industrial devices for real time data monitoring and predictive maintenance. However, this connectivity introduces new vulnerabilities which demand the development of advanced intrusion detection systems. The nuclear facilities are considered one of the closest examples of critical infrastructures that suffer from high vulnerability through the connectivity of IIoT networks. This paper develops a robust intrusion detection approach using machine and ensemble learning algorithms specifically determined for IIoT networks. This approach can achieve optimal performance with low time complexity suitable for real-time IIoT networks. For each algorithm, Grid Search is determined to fine-tune the hyperparameters for optimizing the performance while ensuring time computational efficiency. The proposed approach is investigated on recent IIoT intrusion detection datasets, WUSTL-IIOT-2021 and Edge-IIoT-2022 to cover a wider range of attacks with high precision and minimum false alarms. The study provides the effectiveness of ten machine and ensemble learning models on selected features of the datasets. Synthetic Minority Over-sampling Technique (SMOTE)-based multi-class balancing is used to manipulate dataset imbalances. The ensemble voting classifier is used to combine the best models with the best hyperparameters for raising their advantages to improve the performance with the least time complexity. The machine and ensemble learning algorithms are evaluated based on accuracy, precision, recall, F1 Score, and time complexity. This evaluation can discriminate the most suitable candidates for further optimization. The proposed approach is called the XCL approach that is based on Extreme Gradient Boosting (XGBoost), CatBoost (Categorical Boosting), and Light Gradient- Boosting Machine (LightGBM). It achieves high accuracy, lower false positive rate, and efficient time complexity. The results refer to the importance of ensemble strategies, algorithm selection, and hyperparameter optimization in enhancing the performance to detect the different intrusions across the IIoT datasets over the other models. The developed approach produced a higher accuracy of 99.99% on the WUSTL-IIOT-2021 dataset and 100% on the Edge-IIoTset dataset. Our experimental evaluations have been extended to the CIC-IDS-2017 dataset. These additional evaluations not only highlight the applicability of the XCL approach on a wide spectrum of intrusion detection scenarios but also confirm its scalability and effectiveness in real-world complex network environments.

  9. Sviridenko A.B., Zelenkov G.A.
    Correlation and realization of quasi-Newton methods of absolute optimization
    Computer Research and Modeling, 2016, v. 8, no. 1, pp. 55-78

    Newton and quasi-Newton methods of absolute optimization based on Cholesky factorization with adaptive step and finite difference approximation of the first and the second derivatives. In order to raise effectiveness of the quasi-Newton methods a modified version of Cholesky decomposition of quasi-Newton matrix is suggested. It solves the problem of step scaling while descending, allows approximation by non-quadratic functions, and integration with confidential neighborhood method. An approach to raise Newton methods effectiveness with finite difference approximation of the first and second derivatives is offered. The results of numerical research of algorithm effectiveness are shown.

    Views (last year): 7. Citations: 5 (RSCI).
  10. Loenko D.S., Sheremet M.A.
    Numerical modeling of the natural convection of a non-Newtonian fluid in a closed cavity
    Computer Research and Modeling, 2020, v. 12, no. 1, pp. 59-72

    In this paper, a time-dependent natural convective heat transfer in a closed square cavity filled with non- Newtonian fluid was considered in the presence of an isothermal energy source located on the lower wall of the region under consideration. The vertical boundaries were kept at constant low temperature, while the horizontal walls were completely insulated. The behavior of a non-Newtonian fluid was described by the Ostwald de Ville power law. The process under study was described by transient partial differential equations using dimensionless non-primitive variables “stream function – vorticity – temperature”. This method allows excluding the pressure field from the number of unknown parameters, while the non-dimensionalization allows generalizing the obtained results to a variety of physical formulations. The considered mathematical model with the corresponding boundary conditions was solved on the basis of the finite difference method. The algebraic equation for the stream function was solved by the method of successive lower relaxation. Discrete analogs of the vorticity equation and energy equation were solved by the Thomas algorithm. The developed numerical algorithm was tested in detail on a class of model problems and good agreement with other authors was achieved. Also during the study, the mesh sensitivity analysis was performed that allows choosing the optimal mesh.

    As a result of numerical simulation of unsteady natural convection of a non-Newtonian power-law fluid in a closed square cavity with a local isothermal energy source, the influence of governing parameters was analyzed including the impact of the Rayleigh number in the range 104–106, power-law index $n = 0.6–1.4$, and also the position of the heating element on the flow structure and heat transfer performance inside the cavity. The analysis was carried out on the basis of the obtained distributions of streamlines and isotherms in the cavity, as well as on the basis of the dependences of the average Nusselt number. As a result, it was established that pseudoplastic fluids $(n < 1)$ intensify heat removal from the heater surface. The increase in the Rayleigh number and the central location of the heating element also correspond to the effective cooling of the heat source.

Pages: « first previous next last »

Indexed in Scopus

Full-text version of the journal is also available on the web site of the scientific electronic library eLIBRARY.RU

The journal is included in the Russian Science Citation Index

The journal is included in the RSCI

International Interdisciplinary Conference "Mathematics. Computing. Education"