Science topic

Heuristics - Science topic

Heuristic refers to experience-based techniques for problem solving, learning, and discovery. Where an exhaustive search is impractical, heuristic methods are used to speed up the process of finding a satisfactory solution.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Heuristics (10,000)
Sorted by most recent
Conference Paper
Full-text available
Time-Sensitive Networking (TSN) has been considered the most promising network paradigm for time-critical applications (e.g., industrial control) and traffic scheduling is the core of TSN to ensure low latency and determinism. With the demand for flexible production increases, industrial network topologies and settings change frequently due to pipe...
Conference Paper
Full-text available
Hydrological models are important tools for management of water resources at the basin scale. However, the outputs of these models might come with significant inaccuracies, often due to uncertainties in model parameters. One of the biggest challenges in working with a hydrological model is that these models require rigorous calibration, validation,...
Conference Paper
Full-text available
Agriculture is one of the most vulnerable sectors to changes in climate patterns. Moreover, climate change is a complex and interdisciplinary problem, where natural processes are closely intertwined with socioeconomic aspects, especially in areas where human activities are widespread. Thus, when planning for natural resources management, it becomes...
Article
Full-text available
Much inquiry in psycholinguistics has focused on evidence from the N400 and P600 components of the event-related potential (ERP) signal-and a central theoretical challenge in this area is accounting for the so-called ''semantic P600'', which involves unexpected patterns in these components relative to traditional theories of the underlying mechanis...
Article
Full-text available
‘Collective adaptation’ has recently become a widely used concept in climate change science and advocacy work. Yet, the current engagement with collective adaptation suffers from a few shortcomings: While the debate has been normative for the largest part, a coherent conceptual framing and theoretical engagement have been underdeveloped, hampering...
Article
Full-text available
Split learning (SL) is a collaborative learning framework, which can train an artificial intelligence (AI) model between a device and an edge server by splitting the AI model into a device-side model and a server-side model at a cut layer. The existing SL approach conducts the training process sequentially across devices, which incurs significant t...
Article
Full-text available
There exists a variety of specialized fire dynamics routines, zone fire models, and field fire models. Many of these heuristics and correlations rely on experimental data from fires fueled by gas burners or liquid pool fires and have had minimal, if any, validation against data from fires with solid, more complex fuels, such as upholstered furnitur...
Article
Full-text available
Cooperation is essential for survival and should not be ignored. When making decisions whether to cooperate or not, people usually face conflict between maximizing personal interests at a social cost and maximizing collective interests at a personal cost. Within such context of social dilemmas, numerous studies have explored factors that facilitate...
Article
Full-text available
This paper sets upon the elaboration of two inter-related enquiries: What do being and otherness look like beyond the margins of metanarrativity? What would the crossing of such margins entail? It takes as its basic assumption that prejudice arises from out of the historicity of being. A thesis of prejudice as a pre-reflexive operation or heuristic...
Article
Full-text available
The Maximum Common Subgraph problem has been long proven NP-hard. Nevertheless, it has countless practical applications, and researchers are still searching for exact solutions and scalable heuristic approaches. Driven by applications in molecular science and cyber-security, we concentrate on the Maximum Common Subgraph among an indefinite number o...
Preprint
Full-text available
p>This paper proposes a novel graph-based visualisation approach to incorporating automated graph modelling and generalised graph algorithms from blockchain transactions. Our approach enables users to interact directly with the blockchain data using graph queries and provides exploration capabilities through graph patterns. Four case studies are pr...
Article
Full-text available
Spontaneous synchronization is ubiquitous in natural and man-made systems. It underlies emergent behaviors such as neuronal response modulation and is fundamental to the coordination of robot swarms and autonomous vehicle fleets. Due to its simplicity and physical interpretability, pulse-coupled oscillators has emerged as one of the standard models...
Article
Full-text available
Background Marine geological disasters (i.e., catastrophic events occurring in marine environments) may seriously threaten the safety of engineering facilities, life, and property in shallow- and deep-sea areas. The development of marine resources and energy and the protection of the marine geo-environment are topics of intense interest globally, a...
Article
Full-text available
This research study proposes a Q-learning-based metaheuristic algorithm framework for thermal design optimization of a shell-and-tube evaporator operating with different refrigerant mixtures, which is a highly complex real-world design problem and has not been investigated yet, in previous literature approaches before. The proposed method, called Q...
Article
Full-text available
The local reference frame (LRF) plays a vital role in local 3D shape description and matching. Numerous LRF methods have been proposed in recent decades. However, few LRFs can achieve a balance between repeatability and robustness under exposure to a variety of nuisances, including Gaussian noise, mesh resolution variation, clutter, and occlusion....
Preprint
Full-text available
The 2019/20 Black Summer bushfires in Australia demonstrated the brutal and disastrous consequences of changing the technological world without considering linkages with the biophysical, ecological or human worlds. An emerging more-than-human design philosophy encourages designers to consider such interrelations between humans and non-human entitie...
Article
Full-text available
Is my idea creative? This question directs investing in companies and choosing a research agenda. Following previous research, we focus on the originality of ideas and consider their association with self-assessments of idea generators regarding their own originality. We operationalize the originality score as the frequency (%) of each idea within...
Article
Full-text available
Mobile data collectors (MDCs) are very efficient for data collection in internet of things (IoT) sensor networks. These data collectors collect data at rendezvous points to reduce data collection latency. It is paramount to determine these points in an IoT network to collect data in real time. It is important to consider IoT network characteristics...
Preprint
Full-text available
7 The elimination of gatekeepers for scientific publication has been 8 represented as a means to promote the core moral values of open science, 9 including democratic decision-making and inclusiveness. I argue that this 10 framing ignores two realities: the continuing information overload that 11 scientists face, and the social status biases that c...
Preprint
Full-text available
p>This paper proposes a novel graph-based visualisation approach to incorporating automated graph modelling and generalised graph algorithms from blockchain transactions. Our approach enables users to interact directly with the blockchain data using graph queries and provides exploration capabilities through graph patterns. Four case studies are pr...
Article
Full-text available
Roughly 800,000 people die from suicide yearly, with suicide being one of the leading causes of death worldwide. For every death by suicide, there are 20 people attempting suicide. Suicidal ideation is a precursor for suicide, thus requiring intervention. Technologies for detection and daily assisting for people who present suicidal ideation can mi...
Article
Full-text available
Agent-based models (ABMs) are particularly suited for simulating the behaviour of agricultural agents in response to land use (LU) policy. However, there is no evidence of their widespread use by policymakers. Here, we carry out a review of LU ABMs to understand how farmers’ decision-making has been modelled. We found that LU ABMs mainly rely on pr...
Preprint
Full-text available
The use of Allan variance to characterize the stability of optical signals affected by stochastic polarization fluctuations and the identification of the underlying power law noise processes is explored. Allan variance can ease the comparison in terms of polarization stability of optical systems affected by polarization fluctuations and define a ne...
Article
Full-text available
The standard theory of electoral accountability treats the electorate as an appraiser of government performance on a range of complex issues, which re-elects or de-elects depending on its evaluation of that performance. This paper draws from studies on voter knowledge and behaviour to present a dilemma for the standard theory: either voters do not...
Conference Paper
Full-text available
Technological advancement has contributed to the Internet of Things (IoT), resulting in the Internet of Battlefields (IoBT). The IoBT has contributed to the advancement in coordinating various military operations and improving the equipment and battlefield operations. IoBT has overcome the challenges on the battlefield by overcoming the challenges...
Preprint
Full-text available
Heuristic search is a powerful approach that has successfully been applied to a broad class of planning problems, including classical planning, multi-objective planning, and probabilistic planning modelled as a stochastic shortest path (SSP) problem. Here, we extend the reach of heuristic search to a more expressive class of problems, namely multi-...
Article
Full-text available
Adopting electric vehicles is essential to reducing greenhouse gas emissions and achieving climate goals. However, the existing electrical grid can easily be overloaded with more electric vehicles on the road. For this reason, many researchers are working on developing relevant charging infrastructures that include charging scheduling strategies. T...
Article
Full-text available
The existing research on the two-workshop integrated scheduling problem with symmetrical resources does not consider the complex product attribute structure and the objective situation of plant equipment resources. This results in the prolongation of the product makespan and the reduction of the utilization rate of the general equipment in the work...
Article
Full-text available
Highway monitoring with traffic counting stations can provide data for the transportation planning such as the origin–destination (O-D) trip tables. These O-D trip tables are important in the process of estimating traffic flow on the highways, indicating where new investments are required. This paper presents a hybrid solution method for the Bi-obj...
Preprint
Full-text available
Vision is more than object recognition: In order to interact with the physical world, we estimate object properties such as mass, fragility, or elasticity by sight. The computational basis of this ability is poorly understood. Here, we propose a model based on the statistical appearance of objects, i.e., how they typically move, flow, or fold. We t...
Preprint
Full-text available
Multitask learning is widely used in practice to train a low-resource target task by augmenting it with multiple related source tasks. Yet, naively combining all the source tasks with a target task does not always improve the prediction performance for the target task due to negative transfers. Thus, a critical problem in multitask learning is iden...
Article
Full-text available
Information-Centric Networking (ICN) essentially supports multipath transmission. However, current multipath schemes in ICN either necessitate major network infrastructure updates or necessitate specific network settings for terminal devices. To solve these problems, we propose MPTS-ICN, a multipath transmission system for ICN that realizes end-to-...
Preprint
Full-text available
Event extraction is a complex information extraction task that involves extracting events from unstructured text. Prior classification-based methods require comprehensive entity annotations for joint training, while newer generation-based methods rely on heuristic templates containing oracle information such as event type, which is often unavailabl...
Preprint
Full-text available
This work proposes a robot task planning framework for retrieving a target object in a confined workspace among multiple stacked objects that obstruct the target. The robot can use prehensile picking and in-workspace placing actions. The method assumes access to 3D models for the visible objects in the scene. The key contribution is in achieving de...
Article
Full-text available
Optimal power flow (OPF) is a crucial aspect of distribution network planning and operation. Conventional heuristic algorithms fail to meet the system requirements for speed and accuracy, while linearized OPF approaches are inadequate for distribution networks with high R/X ratios. To address these issues and cater to multi-period scenarios, this s...
Article
Full-text available
Motivation: Pairwise sequence alignment is a very time-consuming step in common bioinformatics pipelines. Speeding up this step requires heuristics, efficient implementations, and/or hardware acceleration. A promising candidate for all of the above is the recently proposed GenASM algorithm. We identify and address three inefficiencies in the GenAS...
Article
Full-text available
We address the problem of evolutionary system design (ESD) by means of answer set programming modulo difference constraints (AMT). The goal of this design approach is to synthesize new product variants or generations from existing products. We start by formalizing the underlying system synthesis problem and design space exploration process, which c...
Article
Full-text available
Disease ecologists now recognize the limitation behind examining host-parasite interactions in isolation: community members-especially predators-dramatically affect host-parasite dynamics. Although the initial paradigm was that predation should reduce disease in prey populations ("healthy herds hypothesis"), researchers have realized that predators...
Article
Full-text available
Quantum coherences characterize the ability of particles to quantum mechanically interfere within some given distances. In the context of noisy many-body quantum systems, these coherences can fluctuate. A simple toy model to study such fluctuations in an out-of-equilibrium setting is the open quantum symmetric simple exclusion process (Q-SSEP), whi...
Article
Full-text available
Wang tiles enable efficient pattern compression while avoiding the periodicity in tile distribution via programmable matching rules. However, most research in Wang tilings has considered tiling the infinite plane. Motivated by emerging applications in materials engineering, we consider the bounded version of the tiling problem and offer four intege...
Article
Full-text available
The Maximum Entropy Production Principle (MEPP) stands out as an overarching principle that rules life phenomena in Nature. However, its explanatory power beyond heuristics remains controversial. On the one hand, the MEPP has been successfully applied principally to non-living systems far from thermodynamic equilibrium. On the other hand, the under...
Article
Full-text available
A high gain antenna array with reduced side lobe level (SLL) needs to be optimized and designed to meet the requirement of modern wireless communication systems. To achieve this goal, a newly developed natural heuristic algorithm namely sparrow search algorithm (SSA) and its modification are introduced and utilized to the field of electromagnetic o...
Article
Full-text available
The spread of an undesirable contact process, such as an infectious disease (e.g. COVID-19), is contained through testing and isolation of infected nodes. The temporal and spatial evolution of the process (along with containment through isolation) render such detection as fundamentally different from active search detection strategies. In this work...
Article
Full-text available
For path planning problems based on Rapidly exploring Random Trees (RRT), most new nodes merely explore the environment unless they are sampled directly from the subset that can optimize the path. This paper proposes the Dynamic RRT algorithm, which aims to plan a feasible path while balancing the convergence time and path length in an environment...
Preprint
Full-text available
Reconfigurable intelligent surfaces (RISs) have received considerable attention as a key enabler for envisioned 6G networks, for the purpose of improving the network capacity, coverage, efficiency, and security with low energy consumption and low hardware cost. However, integrating RISs into the existing infrastructure greatly increases the network...
Article
Full-text available
This study explored the interaction between cognition and emotion in blended collaborative learning. The participants (n = 30) of this study were undergraduate students enrolled in a 16-week course on information technology teaching. These students were divided into six groups of five people each. The behavior modes of the participants were analyze...
Article
Full-text available
Data preparation is a vital step in the web usage mining process since it provides structured data for the subsequent stages. Hence, it is necessary to convert raw server logs into user sessions to generate structured data for pattern discovery phase. In recent decade, popular websites’ server log production has risen to many terabytes to petabytes...
Article
Full-text available
Robotic football has long been seen as a grand challenge in artificial intelligence. Despite recent success of learned policies over heuristics and handcrafted rules in general, current teams in the simulated RoboCup football leagues, where autonomous agents compete against each other, still rely on handcrafted strategies with only a few using rein...
Article
Full-text available
Structural variants (SVs) are a major driver of genetic diversity and disease in the human genome and their discovery is imperative to advances in precision medicine. Existing SV callers rely on hand-engineered features and heuristics to model SVs, which cannot scale to the vast diversity of SVs nor fully harness the information available in sequen...
Preprint
Full-text available
Planning as theorem proving in situation calculus was abandoned 50 years ago as an impossible project. But we have developed a Theorem Proving Lifted Heuristic (TPLH) planner that searches for a plan in a tree of situations using the A* search algorithm. It is controlled by a delete relaxation-based domain independent heuristic. We compare TPLH wit...
Article
Full-text available
Shared bikes can help cities achieve carbon neutrality goals. Cleaning and disinfection are vital procedures of the maintenance of shared bikes, especially during the COVID-19 pandemic because shared bikes could be a transmission intermediary of viruses. This study proposes an optimization model of the cleaning and disinfection scheme of the dockle...
Article
Full-text available
This paper conceptualizes 'presence' to analyse the volumetric growth of Chinese investment and development in Nepal from 2014 to 2021 in material, territorial and discursive terms. From physical experiences with earthquake disaster to the symbolic potency of Chinese infrastructure, this paper offers presence as a heuristic to evaluate China's risi...
Article
Full-text available
Recently, non-orthogonal multiple access (NOMA)-enabled cognitive satellite-unmanned aerial vehicle (UAV)-terrestrial networks have attracted extensive attention for the advantages of enhancing spectrum efficiency and coping with the exponential growth of access users. In this paper, we propose a joint subchannel assignment and power allocation alg...
Article
Full-text available
Landslide susceptibility analysis has become a necessary means of pre-disaster portal positioning and scientific early warning. How can an effective zoning model of landslide susceptibility be established to examine the important factors affecting landslide development in coal mine areas? Focusing on the need for a reliability analysis of landslide...
Article
Full-text available
Management of humanitarian logistics operations is one of the most critical planning problems to be addressed immediately after a disaster. The response phase covers the first 12 hours after the disaster and is prone to uncertainties because of debris and gridlock traffic influencing the dispatching operations of relief logistics teams in the areas...
Preprint
Full-text available
Generating and maintaining API documentation with integrity and consistency can be time-consuming and expensive for evolving APIs. To solve this problem, several approaches have been proposed to automatically generate high-quality API documentation based on a combination of knowledge from different web sources. However, current researches are weak...
Preprint
Full-text available
The original German version can be found in a separate RG research item. Summary On the way to an integrative need- and therefore affect-focused treatment heuristic in psychotherapy ("Affect-focused Transtheoretical Experiential Model of Change", ATEM), this second part takes up the foundations of the first part and derives fundamental implicatio...
Article
Full-text available
This paper focuses on the precast supply chain scheduling problem with time-dependent transportation time to minimize the total weighted tardiness (PSCSP_TDT |TWT). In the problem, an order sequence and several job sequences are to be determined simultaneously. At first, through in-depth analysis of problem structure and real data from a precast ma...
Article
Full-text available
The software defined network (SDN) is a novel flexible network architecture. For the purpose of facilitating management, multiple controllers need to be placed in large‐scale SDN. When a link failure occurs, the path can be re‐planned by the control layer. However, unreasonable controller placement scheme brings about a sharp latency increase betwe...
Article
Full-text available
The performance growth in processors has been continuing toward increasing the number of processing cores on the chip and scaling the feature size of transistors. However, in the nanoera, side effects of the scaling, such as induced heterogeneities in the performance, power, and soft error rate of identically designed cores, prevent the potential p...
Article
Full-text available
The phenomenon of psychopathic behavior that occurs in society has unconsciously inspired various forms of art, one of which is poetry. More poets write about their mental illness through indirect expression. Poetry is one of the popular ways to express it. This research aims to analyze the word or phrase in “Not To Live” to find the psychopath of...
Article
Full-text available
This paper addresses the drop-and-pickup container drayage problem with empty container constraints. In this problem, a truck is allowed to drop off the container at the customer and then leave. After the container has been packed/unpacked, the truck returns to pick it up. The problem is further complicated by the fact that empty containers at the...
Article
Full-text available
Autonomous unmanned systems have become an attractive vehicle for a myriad of military and civilian applications. This can be partly attributed to their ability to bring payloads for utility, sensing, and other uses for various applications autonomously. However, a key challenge in realizing autonomous unmanned systems is the ability to perform com...
Article
Full-text available
An Extractive Multi-Document Summarizer must select the most informative units and prevents duplication in extraction. In order to achieve this goal, a new technique, called “comprising at least one Representative Term at the Highest Frequency”, called RTHF, is proposed in this work. The units which include representative terms, but with low freque...
Article
Full-text available
To lessen the cognitive burden and effort required by blind and visually impaired (BVI) users while utilizing mobile applications, the study highlighted accessibility issues. The ability of smartphones to address issues with organization, presentation, and behavior (OPB) is assessed. Users who are blind or visually impaired are given additional con...
Preprint
Full-text available
The COVID-19 pandemic has been a recent example for the spread of a harmful contagion in large populations. Moreover, the spread of harmful contagions is not only restricted to an infectious disease, but is also relevant to computer viruses and malware in computer networks. Furthermore, the spread of fake news and propaganda in online social networ...