Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 584-586.
• Interdiscipline & Application • Previous Articles Next Articles
JIANG Rui-zhong, YANG Yi-bo
CLC Number:
[1]BITTENCOURT A C,HORNE R N.Reservoir development and design optimization[C]∥SPE AnnualTechnical Conference and Exhibition.San Antonio,SPE,1997:SPE 38895. [2]MORALES A N,NASRABADI H,ZHU D.A new modified genetic algorithm for well placement optimization under geological uncertainties[C]∥SPE EUROPEC/EAGE Annual Conference and Exhibition.Vienna:SPE,2011:SPE143617. [3]姜瑞忠,刘明明,徐建春,等.遗传算法在苏里格气田井位优化中的应用[J].天然气地球科学,2014,25(10):1603-1609. [4]高雪笛,周丽娟,张树东,等.基于改进遗传算法的测试数据自动生成的研究[J].计算机科学,2017,44(3):209-214. [5]吉根林.遗传算法研究综述[J].计算机应用与软件,2004,21(2):69-73. [6]熊伟清,魏平,赵杰煜.遗传算法的早熟现象研究 [J].计算机应用研究,2001,18(9):12-14. [7]王出航,刘峰.采用遗传算法和WSN的智能灯控方法设计[J].控制工程,2017,24(2):341-345. [8]金希东.遗传算法及其应用 [D].成都:西南交通大学,1996. [9]胡仕成,徐晓飞,李向阳.项目优化调度的病毒协同进化遗传算法[J].软件学报,2004,15(1):49-57. [10]苗金凤,王洪国,邵增珍,等.基于多级搜索区域的协同进化遗传算法 [J].计算机应用研究,2010,27(9):3345-3347. [11]王鸿磊,徐平平,朱文祥,等.WSN低能耗数据收集遗传粒子群算法研究[J].计算机科学,2017,44(3):79-83. [12]袁勇,梁永全.基于协同进化遗传算法的多议题谈判[J].计算机工程,2009,35(4):187-189. [13]王厅长,邱建东,商庆健,等.病毒协同进化遗传算法在自动化立体仓库货位优化中应用的研究[J].计算机科学,2014,41(11A):35-38. [14]宋洵成,邹德永.采用遗传算法的PDC钻头侧向力平衡优化设计[J].中国石油大学学报(自然科学版),2006,30(4):50-52. |
[1] | NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296. |
[2] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[3] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[4] | LYU You, WU Wen-yuan. Privacy-preserving Linear Regression Scheme and Its Application [J]. Computer Science, 2022, 49(9): 318-325. |
[5] | DOU Jia-wei. Privacy-preserving Hamming and Edit Distance Computation and Applications [J]. Computer Science, 2022, 49(9): 355-360. |
[6] | GAO Chun-gang, WANG Yong-jie, XIONG Xin-li. MTDCD:A Hybrid Defense Mechanism Against Network Intrusion [J]. Computer Science, 2022, 49(7): 324-331. |
[7] | LIANG Zhen-zhen, XU Ming. Key Agreement Scheme Based on Ocean Acoustic Channel [J]. Computer Science, 2022, 49(6): 356-362. |
[8] | DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284. |
[9] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[10] | WEI Hong-ru, LI Si-yue, GUO Yong-hao. Secret Reconstruction Protocol Based on Smart Contract [J]. Computer Science, 2022, 49(6A): 469-473. |
[11] | LIANG Yi-wen, DU Yu-song. Timing Attack Resilient Sampling Algorithms for Binary Gaussian Based on Knuth-Yao [J]. Computer Science, 2022, 49(6A): 485-489. |
[12] | YAN Meng, LIN Ying, NIE Zhi-shen, CAO Yi-fan, PI Huan, ZHANG Lan. Training Method to Improve Robustness of Federated Learning [J]. Computer Science, 2022, 49(6A): 496-501. |
[13] | CHEN Yan-bing, ZHONG Chao-ran, ZHOU Chao-ran, XUE Ling-yan, HUANG Hai-ping. Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain [J]. Computer Science, 2022, 49(6A): 537-543. |
[14] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[15] | LIU Lin-yun, CHEN Kai-yan, LI Xiong-wei, ZHANG Yang, XIE Fang-fang. Overview of Side Channel Analysis Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(5): 296-302. |
|