With the increasing dimensionality of the data,High-dimensional Feature Selection(HFS)becomes an increasingly dif-ficult *** is not simple to find the best subset of features due to the breadth of the search space and...
详细信息
With the increasing dimensionality of the data,High-dimensional Feature Selection(HFS)becomes an increasingly dif-ficult *** is not simple to find the best subset of features due to the breadth of the search space and the intricacy of the interactions between *** of the Feature Selection(FS)approaches now in use for these problems perform sig-nificantly less well when faced with such intricate situations involving high-dimensional search *** is demonstrated that meta-heuristic algorithms can provide sub-optimal results in an acceptable amount of *** paper presents a new binary Boosted version of the Spider Wasp Optimizer(BSWO)called Binary Boosted SWO(BBSWO),which combines a number of successful and promising strategies,in order to deal with *** shortcomings of the original BSWO,including early convergence,settling into local optimums,limited exploration and exploitation,and lack of population diversity,were addressed by the proposal of this new variant of *** concept of chaos optimization is introduced in BSWO,where initialization is consistently produced by utilizing the properties of sine chaos mapping.A new convergence parameter was then incorporated into BSWO to achieve a promising balance between exploration and *** exploration mechanisms were then applied in conjunction with several exploitation strategies to effectively enrich the search process of BSWO within the search ***,quantum-based optimization was added to enhance the diversity of the search agents in *** proposed BBSWO not only offers the most suitable subset of features located,but it also lessens the data's redundancy *** was evaluated using the k-Nearest Neighbor(k-NN)classifier on 23 HFS problems from the biomedical domain taken from the UCI *** results were compared with those of traditional BSWO and other well-known meta-heuristics-based *** findings indicate that,in comparison to other competing techn
This paper comprehensively evaluates the efficacy of different large language models (LLMs) in addressing mathematical challenges expressed in natural languages, mainly focusing on low-resource languages like Arabic. ...
详细信息
This work investigates a multi-product parallel disassembly line balancing problem considering multi-skilled workers.A mathematical model for the parallel disassembly line is established to achieve maximized disassemb...
详细信息
This work investigates a multi-product parallel disassembly line balancing problem considering multi-skilled workers.A mathematical model for the parallel disassembly line is established to achieve maximized disassembly profit and minimized workstation cycle *** on a product’s AND/OR graph,matrices for task-skill,worker-skill,precedence relationships,and disassembly correlations are developed.A multi-objective discrete chemical reaction optimization algorithm is *** enhance solution diversity,improvements are made to four reactions:decomposition,synthesis,intermolecular ineffective collision,and wall invalid collision reaction,completing the evolution of molecular *** established model and improved algorithm are applied to ball pen,flashlight,washing machine,and radio combinations,*** a Collaborative Resource Allocation(CRA)strategy based on a Decomposition-Based Multi-Objective Evolutionary Algorithm,the experimental results are compared with four classical algorithms:MOEA/D,MOEAD-CRA,Non-dominated Sorting Genetic Algorithm Ⅱ(NSGA-Ⅱ),and Non-dominated Sorting Genetic Algorithm Ⅲ(NSGA-Ⅲ).This validates the feasibility and superiority of the proposed algorithm in parallel disassembly production lines.
Data-driven cellular network fault diagnosis faces the great challenge of lacking sufficient high-quality labeled data from real networks. Also, how to exploit existing domain knowledge to aid the diagnosis in an effi...
详细信息
This paper proposes a composite design of fuzzy adaptive control scheme based on TMD RC structural system and the gain of two-dimensional fuzzy control is controlled by parameters. Monitoring and learning in LMI then ...
详细信息
Federated learning came into being with the increasing concern of privacy security,as people’s sensitive information is being exposed under the era of big *** is an algorithm that does not collect users’raw data,but...
详细信息
Federated learning came into being with the increasing concern of privacy security,as people’s sensitive information is being exposed under the era of big *** is an algorithm that does not collect users’raw data,but aggregates model parameters from each client and therefore protects user’s ***,due to the inherent distributed nature of federated learning,it is more vulnerable under attacks since users may upload malicious data to break down the federated learning *** addition,some recent studies have shown that attackers can recover information merely from ***,there is still lots of room to improve the current federated learning *** this survey,we give a brief review of the state-of-the-art federated learning techniques and detailedly discuss the improvement of federated *** open issues and existing solutions in federated learning are *** also point out the future research directions of federated learning.
The flourish of deep learning frameworks and hardware platforms has been demanding an efficient compiler that can shield the diversity in both software and hardware in order to provide application *** the existing dee...
详细信息
The flourish of deep learning frameworks and hardware platforms has been demanding an efficient compiler that can shield the diversity in both software and hardware in order to provide application *** the existing deep learning compilers,TVM is well known for its efficiency in code generation and optimization across diverse hardware *** the meanwhile,the Sunway many-core processor renders itself as a competitive candidate for its attractive computational power in both scientific computing and deep learning *** paper combines the trends in these two ***,we propose swTVM that extends the original TVM to support ahead-of-time compilation for architecture requiring cross-compilation such as *** addition,we leverage the architecture features during the compilation such as core group for massive parallelism,DMA for high bandwidth memory transfer and local device memory for data locality,in order to generate efficient codes for deep learning workloads on *** experiment results show that the codes generated by swTVM achieve 1.79x improvement of inference latency on average compared to the state-of-the-art deep learning framework on Sunway,across eight representative *** work is the first attempt from the compiler perspective to bridge the gap of deep learning and Sunway processor particularly with productivity and efficiency in *** believe this work will encourage more people to embrace the power of deep learning and Sunwaymany-coreprocessor.
To address the scale variance and uneven distribution of objects in scenarios of object-counting tasks,an algorithm called Refinement Network(RefNet) is *** proposed top-down scheme sequentially aggregates multiscale ...
详细信息
To address the scale variance and uneven distribution of objects in scenarios of object-counting tasks,an algorithm called Refinement Network(RefNet) is *** proposed top-down scheme sequentially aggregates multiscale features,which are laterally connected with low-level *** by a multiresolution density regression loss,a set of intermediate-density maps are estimated on each scale in a multiscale feature pyramid,and the detailed information of the density map is gradually added through coarse-to-fine granular refinement progress to predict the final density *** evaluate our RefNet on three crowd-counting benchmark datasets,namely,ShanghaiTech,UCFC0,and UCSD,and our method achieves competitive performances on the mean absolute error and root mean squared error compared to the state-of-the-art *** further extend our RefNet to cell counting,illustrating its effectiveness on relative counting tasks.
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large nu...
详细信息
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large number of devices,thus realizing richer application scenarios and constructing 5G-enabled vehicular ***,due to the vulnerability of wireless communication,vehicle privacy and communication security have become the key problems to be solved in vehicular ***,the large-scale communication in the vehicular networks also makes the higher communication efficiency an inevitable *** order to achieve efficient and secure communication while protecting vehicle privacy,this paper proposes a lightweight key agreement and key update scheme for 5G vehicular networks based on ***,the key agreement is accomplished using certificateless public key cryptography,and based on the aggregate signature and the cooperation between the vehicle and the trusted authority,an efficient key updating method is proposed,which reduces the overhead and protects the privacy of the vehicle while ensuring the communication ***,by introducing blockchain and using smart contracts to load the vehicle public key table for key management,this meets the requirements of vehicle traceability and can dynamically track and revoke misbehaving ***,the formal security proof under the eck security model and the informal security analysis is conducted,it turns out that our scheme is more secure than other authentication schemes in the vehicular *** analysis shows that our scheme has lower overhead than existing schemes in terms of communication and computation.
Searchable encryption provides an effective way for data security and privacy in cloud *** can retrieve encrypted data in the cloud under the premise of protecting their own data security and ***,most of the current c...
详细信息
Searchable encryption provides an effective way for data security and privacy in cloud *** can retrieve encrypted data in the cloud under the premise of protecting their own data security and ***,most of the current content-based retrieval schemes do not contain enough semantic information of the article and cannot fully reflect the semantic information of the *** this paper,we propose two secure and semantic retrieval schemes based on BERT(bidirectional encoder representations from transformers)named SSRB-1,*** training the documents with BERT,the keyword vector is generated to contain more semantic information of the documents,which improves the accuracy of retrieval and makes the retrieval result more consistent with the user’s ***,through testing on real data sets,it is shown that both of our solutions are feasible and effective.
暂无评论