A dandelion algorithm(DA) is a recently developed intelligent optimization algorithm for function optimization problems. Many of its parameters need to be set by experience in DA,which might not be appropriate for all...
详细信息
A dandelion algorithm(DA) is a recently developed intelligent optimization algorithm for function optimization problems. Many of its parameters need to be set by experience in DA,which might not be appropriate for all optimization problems. A self-adapting and efficient dandelion algorithm is proposed in this work to lower the number of DA's parameters and simplify DA's structure. Only the normal sowing operator is retained;while the other operators are discarded. An adaptive seeding radius strategy is designed for the core dandelion. The results show that the proposed algorithm achieves better performance on the standard test functions with less time consumption than its competitive peers. In addition, the proposed algorithm is applied to feature selection for credit card fraud detection(CCFD), and the results indicate that it can obtain higher classification and detection performance than the-state-of-the-art methods.
Generative Adversarial Networks (GAN) is a popular machine learning method that possesses powerful image generation ability, which is useful for different multimedia applications (e.g., photographic filters, image edi...
详细信息
The area of brain-computer interface research is widely spreading as it has a diverse array of potential applications. Motor imagery classification is a boon to several people with motor impairment. Low accuracy and d...
详细信息
The Stock value forecast is a significant issue to determine the future direction of the financial Markets. Many research works are carried out and design many techniques to predict stock price of Individual stocks. B...
详细信息
Management of vehicular parking in the crowded environment is the indispensable requirement for the smart city scenario. The advent and potential development of information Communication Technologies (ICT) and Interne...
详细信息
For training the present Neural Network(NN)models,the standard technique is to utilize decaying Learning Rates(LR).While the majority of these techniques commence with a large LR,they will decay multiple times over **...
详细信息
For training the present Neural Network(NN)models,the standard technique is to utilize decaying Learning Rates(LR).While the majority of these techniques commence with a large LR,they will decay multiple times over *** has been proved to enhance generalization as well as *** parameters,such as the network’s size,the number of hidden layers,drop-outs to avoid overfitting,batch size,and so on,are solely based on *** work has proposed Adaptive Teaching Learning Based(ATLB)Heuristic to identify the optimal hyperparameters for diverse *** we consider three architec-tures Recurrent Neural Networks(RNN),Long Short Term Memory(LSTM),Bidirectional Long Short Term Memory(BiLSTM)of Deep Neural Networks for *** evaluation of the proposed ATLB is done through the various learning rate schedulers Cyclical Learning Rate(CLR),Hyperbolic Tangent Decay(HTD),and Toggle between Hyperbolic Tangent Decay and Triangular mode with Restarts(T-HTR)*** results have shown the performance improvement on the 20Newsgroup,Reuters Newswire and IMDB dataset.
Introduction: Vehicle crashes can be hazardous to public safety and may cause infrastructure damage. Risky driving significantly raises the possibility of the occurrence of a vehicle crash. As per statistics by the Wo...
详细信息
Introduction: Vehicle crashes can be hazardous to public safety and may cause infrastructure damage. Risky driving significantly raises the possibility of the occurrence of a vehicle crash. As per statistics by the World Health Organization (WHO), approximately 1.35 million people are involved in road traffic crashes resulting in loss of life or physical disability. WHO attributes events like over-speeding, drunken driving, distracted driving, dilapidated road infrastructure and unsafe practices such as non-use of helmets and seatbelts to road traffic accidents. As these driving events negatively affect driving quality and enhance the risk of a vehicle crash, they are termed as negative driving attributes. Methods: A multi-level hierarchical fuzzy rules-based computational model has been designed to capture risky driving by a driver as a driving risk index. Data from the onboard telematics device and vehicle controller area network is used for capturing the required information in a naturalistic way during actual driving conditions. Fuzzy rules-based aggregation and inference mechanisms have been designed to alert about the possibility of a crash due to the onset of risky driving. Results: On-board telematics data of 3213 sub-trips of 19 drivers has been utilized to learn long term risky driving attributes. Furthermore, the current trip assessment of these drivers demonstrates the efficacy of the proposed model in correctly modeling the driving risk index of all of them, including 7 drivers who were involved in a crash after the monitored trip. Conclusion: In this work, risky driving behavior has been associated not just with rash driving but also other contextual data like driver’s long-term risk aptitude and environmental context such as type of roads, traffic volume and weather conditions. Trip-wise risky driving behavior of six out of seven drivers, who had met with a crash during that trip, was correctly predicted during evaluation. Similarly, for the other 12
Detection of color images that have undergone double compression is a critical aspect of digital image *** the existence of various methods capable of detecting double Joint Photographic Experts Group(JPEG) compressio...
详细信息
Detection of color images that have undergone double compression is a critical aspect of digital image *** the existence of various methods capable of detecting double Joint Photographic Experts Group(JPEG) compression,they are unable to address the issue of mixed double compression resulting from the use of different compression *** particular,the implementation of Joint Photographic Experts Group 2000(JPEG2000)as the secondary compression standard can result in a decline or complete loss of performance in existing *** tackle this challenge of JPEG+JPEG2000 compression,a detection method based on quaternion convolutional neural networks(QCNN) is *** QCNN processes the data as a quaternion,transforming the components of a traditional convolutional neural network(CNN) into a quaternion *** relationships between the color channels of the image are preserved,and the utilization of color information is ***,the method includes a feature conversion module that converts the extracted features into quaternion statistical features,thereby amplifying the evidence of double *** results indicate that the proposed QCNN-based method improves,on average,by 27% compared to existing methods in the detection of JPEG+JPEG2000 compression.
The widespread adoption of cloud computing has underscored the critical importance of efficient resource allocation and management, particularly in task scheduling, which involves assigning tasks to computing resource...
详细信息
The widespread adoption of cloud computing has underscored the critical importance of efficient resource allocation and management, particularly in task scheduling, which involves assigning tasks to computing resources for optimized resource utilization. Several meta-heuristic algorithms have shown effectiveness in task scheduling, among which the relatively recent Willow Catkin Optimization (WCO) algorithm has demonstrated potential, albeit with apparent needs for enhanced global search capability and convergence speed. To address these limitations of WCO in cloud computing task scheduling, this paper introduces an improved version termed the Advanced Willow Catkin Optimization (AWCO) algorithm. AWCO enhances the algorithm’s performance by augmenting its global search capability through a quasi-opposition-based learning strategy and accelerating its convergence speed via sinusoidal mapping. A comprehensive evaluation utilizing the CEC2014 benchmark suite, comprising 30 test functions, demonstrates that AWCO achieves superior optimization outcomes, surpassing conventional WCO and a range of established meta-heuristics. The proposed algorithm also considers trade-offs among the cost, makespan, and load balancing objectives. Experimental results of AWCO are compared with those obtained using the other meta-heuristics, illustrating that the proposed algorithm provides superior performance in task scheduling. The method offers a robust foundation for enhancing the utilization of cloud computing resources in the domain of task scheduling within a cloud computing environment.
The future Sixth-Generation (6G) wireless systems are expected to encounter emerging services with diverserequirements. In this paper, 6G network resource orchestration is optimized to support customized networkslicin...
详细信息
The future Sixth-Generation (6G) wireless systems are expected to encounter emerging services with diverserequirements. In this paper, 6G network resource orchestration is optimized to support customized networkslicing of services, and place network functions generated by heterogeneous devices into available *** is a combinatorial optimization problem that is solved by developing a Particle Swarm Optimization (PSO)based scheduling strategy with enhanced inertia weight, particle variation, and nonlinear learning factor, therebybalancing the local and global solutions and improving the convergence speed to globally near-optimal *** show that the method improves the convergence speed and the utilization of network resourcescompared with other variants of PSO.
暂无评论