The rapid advancement of smart home technologies necessitates efficient human activity recognition (HAR) systems while ensuring user privacy. This research presents a novel architecture that integrates deep learning a...
详细信息
We present GauKGT5, a sequence-to-sequence model proposed for knowledge graph completion (KGC). Our research extends the KGT5 model, a recent sequence-to-sequence link prediction (LP) model. GauKGT5 takes advantage of...
详细信息
Though the Butterfly Bptimization Algorithm(BOA)has already proved its effectiveness as a robust optimization algorithm,it has certain ***,a new variant of BOA,namely mLBOA,is proposed here to improve its *** proposed...
详细信息
Though the Butterfly Bptimization Algorithm(BOA)has already proved its effectiveness as a robust optimization algorithm,it has certain ***,a new variant of BOA,namely mLBOA,is proposed here to improve its *** proposed algorithm employs a self-adaptive parameter setting,Lagrange interpolation formula,and a new local search strategy embedded with Levy flight search to enhance its searching ability to make a better trade-off between exploration and ***,the fragrance generation scheme of BOA is modified,which leads for exploring the domain effectively for better *** evaluate the performance,it has been applied to solve the IEEE CEC 2017 benchmark *** results have been compared to that of six state-of-the-art algorithms and five BOA ***,various statistical tests,such as the Friedman rank test,Wilcoxon rank test,convergence analysis,and complexity analysis,have been conducted to justify the rank,significance,and complexity of the proposed ***,the mLBOA has been applied to solve three real-world engineering design *** all the analyses,it has been found that the proposed mLBOA is a competitive algorithm compared to other popular state-of-the-art algorithms and BOA variants.
This paper proposes a modified version of the Dwarf Mongoose Optimization Algorithm (IDMO) for constrained engineering design problems. This optimization technique modifies the base algorithm (DMO) in three simple but...
详细信息
This paper proposes a modified version of the Dwarf Mongoose Optimization Algorithm (IDMO) for constrained engineering design problems. This optimization technique modifies the base algorithm (DMO) in three simple but effective ways. First, the alpha selection in IDMO differs from the DMO, where evaluating the probability value of each fitness is just a computational overhead and contributes nothing to the quality of the alpha or other group members. The fittest dwarf mongoose is selected as the alpha, and a new operator ω is introduced, which controls the alpha movement, thereby enhancing the exploration ability and exploitability of the IDMO. Second, the scout group movements are modified by randomization to introduce diversity in the search process and explore unvisited areas. Finally, the babysitter's exchange criterium is modified such that once the criterium is met, the babysitters that are exchanged interact with the dwarf mongoose exchanging them to gain information about food sources and sleeping mounds, which could result in better-fitted mongooses instead of initializing them afresh as done in DMO, then the counter is reset to zero. The proposed IDMO was used to solve the classical and CEC 2020 benchmark functions and 12 continuous/discrete engineering optimization problems. The performance of the IDMO, using different performance metrics and statistical analysis, is compared with the DMO and eight other existing algorithms. In most cases, the results show that solutions achieved by the IDMO are better than those obtained by the existing algorithms.
Machine Learning researchers have been attempting to accurately predict stock price trends. Moreover, financial researchers use Technical Analysis with optimization models [1] to achieve the same task by extracting an...
详细信息
With rising dropout rates and extended degree completion times in South African institutions, there's a pressing need to better understand and address the hurdles faced by students during their academic journey. T...
详细信息
Intrusion detection is crucial for modern cyber-security, aiming to detect and mitigate unauthorized access and malicious activities within networks. Traditional systems often rely on linear models, which may fail to ...
详细信息
In recent times,sixth generation(6G)communication technologies have become a hot research topic because of maximum throughput and low delay services for mobile *** encompasses several heterogeneous resource and commun...
详细信息
In recent times,sixth generation(6G)communication technologies have become a hot research topic because of maximum throughput and low delay services for mobile *** encompasses several heterogeneous resource and communication standard in ensuring incessant availability of *** the same time,the development of 6G enables the Unmanned Aerial Vehicles(UAVs)in offering cost and time-efficient solution to several applications like healthcare,surveillance,disaster management,*** UAV networks,energy efficiency and data collection are considered the major process for high quality network *** these procedures are found to be challenging because of maximum mobility,unstable links,dynamic topology,and energy restricted *** issues are solved by the use of artificial intelligence(AI)and energy efficient clustering techniques for UAVs in the 6G *** this inspiration,this work designs an artificial intelligence enabled cooperative cluster-based data collection technique for unmanned aerial vehicles(AECCDC-UAV)in 6G *** proposed AECCDC-UAV technique purposes for dividing the UAV network as to different clusters and allocate a cluster head(CH)to each cluster in such a way that the energy consumption(ECM)gets *** presented AECCDC-UAV technique involves a quasi-oppositional shuffled shepherd optimization(QOSSO)algorithm for selecting the CHs and construct *** QOSSO algorithm derives a fitness function involving three input parameters residual energy of UAVs,distance to neighboring UAVs,and degree of *** performance of the AECCDC-UAV technique is validated in many aspects and the obtained experimental values demonstration promising results over the recent state of art methods.
Application of blockchain in financial services has opened new ways of efficiency in transaction processing, assets management and security. The application of parallel, distributed, and grid computing with blockchain...
详细信息
Weed detection is crucial for the healthy growth of crops, yet existing detection models struggle to perform high-accuracy real-time detection of weeds in natural environments on edge computing devices. This paper int...
详细信息
暂无评论