Computer Science ›› 2019, Vol. 46 ›› Issue (6A): 605-608.
• Interdiscipline & Application • Previous Articles
LIU Sheng-wa1, SUN Jun-ming2, GAO Xiang2, WANG Min2
CLC Number:
[1]ZHANG N N,WANG Q,WANG J J,et al.Characteristics of oil and gas discoveries in recent 20 years and future exploration in the world.China Petroleum Exploration,2018,23(1):44-53.[2]HU W R,BAO J W.Development trends of oil industry and China’s countermeasures.Journal of China University of Petroleum(Edition of Natural Science) ,2018,42(4):1-10. [3]Yi C,Li G S,SHEN Z H.Experimental study on drilling rate improvement by self-resonating cavitating jet[J]. Natural Gas Industry,2006,26(5):52-54. [4]Yaralia O.Assessment of relationships between drilling rate index and mechanical properties of rocks.Tunnelling & Underground Space Technology Incorporating Trenchless Technology Research,2013,33(33):46-53. [5]LI C S.Study of Method for Predict Rate of Penetration Based of Multiple Regression Analysis.Science Technology & Engineering,2013,13(7):1740-1744. [6]Njobuenwu D O,Wobo C A.Effect of drilled solids on drilling rate and performance.Journal of Petroleum Science & Engineering,2007,55(3):271-276. [7]Rashidi B,Hareland G ,Wu Z .Performance,simulation and field application modeling of rollercone bits.Journal of Petroleum Science and Engineering,2015,133:507-517. [8]BI X L,YAN T,TAO L J.Research on optimizing bit by neural network in Qingshen Oilfield.Journal of Harbin Engineering University,2006,27(z1):111-114. [9]LI J,LI K,WANG B.An Evaluation Model of Drilling Safety Based on Combined Rough Set and Neural Network.Journal of Southwest Petroleum University,2017,39(5):120-128. [10]ZHONG J B ,SHI Y J ,ZHANG H T,et al.Construction and Application of Log Data Transmission and Cooperative Evaluation System Based on Network.Well Logging Technology,2016,40(3):356-363. [11]GUAN Z C,SHENG Y N,XU Y Q,et al.Dynamic risk assessment method of drilling based on PSO optimized BP neural network.Journal of Safety Science & Technology,2017,13(8):5-11. [12]GUO Z M,ZHOU A Y.Research on Data Quality and Data Cleaning:a Surve.Journal of Software,2002,13(11):2076-2082. [13]PIAO J S,YIN K,FAN L M.Neural Network Method in the Penetration Rate Prediction of Percussive Drilling.Journal of Jilin University,2009,39(5):882-886. [14]Reich Y ,Barai S V .Evaluating machine learning models for engineering problems.Artificial Intelligence in Engineering,1999,13(3):257-272. [15]ZHU Q S,ZHOU D D,HUANG W.Application Research of Preprocess in BP Neural Network Sample Data .World Sci-Tech R & D ,2012,34(4):624-626. [16]Hinton G,Vinyals O,Dean J.Distilling the Knowledge in a Neural Network.Computer Science,2015,14(7):38-39. [17]WANG R B,XU H Y,LI B,et al.Research on Method of Determining Hidden Layer Nodes in BP Neural Network.Computer Technology and Development,2018,28(4):31-35. |
[1] | ZHOU Fang-quan, CHENG Wei-qing. Sequence Recommendation Based on Global Enhanced Graph Neural Network [J]. Computer Science, 2022, 49(9): 55-63. |
[2] | ZHOU Le-yuan, ZHANG Jian-hua, YUAN Tian-tian, CHEN Sheng-yong. Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion [J]. Computer Science, 2022, 49(9): 155-161. |
[3] | NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296. |
[4] | WANG Run-an, ZOU Zhao-nian. Query Performance Prediction Based on Physical Operation-level Models [J]. Computer Science, 2022, 49(8): 49-55. |
[5] | CHEN Yong-quan, JIANG Ying. Analysis Method of APP User Behavior Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(8): 78-85. |
[6] | CHEN Jing, WU Ling-ling. Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment [J]. Computer Science, 2022, 49(8): 108-112. |
[7] | ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119. |
[8] | YAN Jia-dan, JIA Cai-yan. Text Classification Method Based on Information Fusion of Dual-graph Neural Network [J]. Computer Science, 2022, 49(8): 230-236. |
[9] | HE Qiang, YIN Zhen-yu, HUANG Min, WANG Xing-wei, WANG Yuan-tian, CUI Shuo, ZHAO Yong. Survey of Influence Analysis of Evolutionary Network Based on Big Data [J]. Computer Science, 2022, 49(8): 1-11. |
[10] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[11] | PENG Shuang, WU Jiang-jiang, CHEN Hao, DU Chun, LI Jun. Satellite Onboard Observation Task Planning Based on Attention Neural Network [J]. Computer Science, 2022, 49(7): 242-247. |
[12] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[13] | QI Xiu-xiu, WANG Jia-hao, LI Wen-xiong, ZHOU Fan. Fusion Algorithm for Matrix Completion Prediction Based on Probabilistic Meta-learning [J]. Computer Science, 2022, 49(7): 18-24. |
[14] | YANG Bing-xin, GUO Yan-rong, HAO Shi-jie, Hong Ri-chang. Application of Graph Neural Network Based on Data Augmentation and Model Ensemble in Depression Recognition [J]. Computer Science, 2022, 49(7): 57-63. |
[15] | ZHANG Ying-tao, ZHANG Jie, ZHANG Rui, ZHANG Wen-qiang. Photorealistic Style Transfer Guided by Global Information [J]. Computer Science, 2022, 49(7): 100-105. |
|