In solving multi-objective vehicle routing problems with time windows (MOVRPTW),most existing algorithms focus on the optimization of a single problem formulation. However,little effort has been devoted to exploiting ...
详细信息
In solving multi-objective vehicle routing problems with time windows (MOVRPTW),most existing algorithms focus on the optimization of a single problem formulation. However,little effort has been devoted to exploiting valuable knowledge from the alternate formulations of MOVRPTW for better optimization performance. Aiming at this insufficiency,this study proposes a decomposition-based multi-objective multiform evolutionary algorithm (MMFEA/D),which performs the evolutionary search on multiple alternate formulations of MOVRPTW simultaneously to complement each other. In particular,the main characteristics of MMFEA/D are three folds. First,a multiform construction (MFC) strategy is adopted to construct multiple alternate formulations,each of which is formulated by grouping several adjacent subproblems based on the decomposition of MOVRPTW. Second,a transfer reproduction (TFR) mechanism is designed to generate offspring for each formulation via transferring promising solutions from other formulations,making that the useful traits captured from different formulations can be shared and leveraged to guide the evolutionary search. Third,an adaptive local search (ALS) strategy is developed to invest search effort on different alternate formulations as per their usefulness for MOVRPTW,thus facilitating the efficient allocation of computational resources. Experimental studies have demonstrated the superior performance of MMFEA/D on the classical Solomon instances and the real-world instances.
technology helps producers to collect enormous amounts of customer-product interaction (CPI) data. From the collected CPI data, the importance of the customers and the products can be measured. This study focuses on f...
详细信息
Android devices are popularly available in the commercial market at different price levels for various levels of *** Android stack is more vulnerable compared to other platforms because of its open-source *** are many...
详细信息
Android devices are popularly available in the commercial market at different price levels for various levels of *** Android stack is more vulnerable compared to other platforms because of its open-source *** are many android malware detection techniques available to exploit the source code andfind associated components during execution *** obtain a better result we create a hybrid technique merging static and dynamic *** this paper,in thefirst part,we have proposed a technique to check for correlation between features and classify using a supervised learning approach to avoid Mul-ticollinearity problem is one of the drawbacks in the existing *** the proposed work,a novel PCA(Principal Component Analysis)based feature reduction technique is implemented with conditional dependency features by gathering the functionalities of the application which adds novelty for the given *** Android Sensitive Permission is one major key point to be considered while detecting *** select vulnerable columns based on features like sensitive permissions,application program interface calls,services requested through the kernel,and the relationship between the variables henceforth build the model using machine learning classifiers and identify whether the given application is malicious or *** goal of this paper is to check benchmarking datasets collected from various repositories like virus share,Github,and the Canadian institute of cyber security,compare with models ensuring zero-day exploits can be monitored and detected with better accuracy rate.
Resistive random access memory(RRAM)enables the functionality of operating massively parallel dot prod-ucts and ***-based accelerator is such an effective approach to bridging the gap between Internet of Things device...
详细信息
Resistive random access memory(RRAM)enables the functionality of operating massively parallel dot prod-ucts and ***-based accelerator is such an effective approach to bridging the gap between Internet of Things devices'constrained resources and deep neural networks'tremendous *** to the huge overhead of Analog to Digital(A/D)and digital accumulations,analog RRAM buffer is introduced to extend the processing in analog and in *** analog RRAM buffer offers potential solutions to A/D conversion issues,the energy consumption is still challenging in resource-constrained environments,especially with enormous intermediate data ***,criti-cal concerns over endurance must also be resolved before the RRAM buffer could be frequently used in reality for DNN in-ference *** we propose LayCO,a layer-centric co-optimizing scheme to address the energy and endurance con-cerns altogether while strictly providing an inference accuracy *** relies on two key ideas:1)co-optimizing with reduced supply voltage and reduced bit-width of accelerator architectures to increase the DNN's error tolerance and achieve the accelerator's energy efficiency,and 2)efficiently mapping and swapping individual DNN data to a correspond-ing RRAM partition in a way that meets the endurance *** evaluation with representative DNN models demonstrates that LayCO outperforms the baseline RRAM buffer based accelerator by 27x improvement in energy effi-ciency(over TIMELY-like configuration),308x in lifetime prolongation and 6x in area reduction(over RAQ)while main-taining the DNN accuracy loss less than 1%.
The difficulty of successfully scanning handwritten text arises from variances in style, size, and orientation, which affect handwriting optical character recognition (OCR). This study provides a novel strategy that i...
详细信息
This article affords an innovative type of system for wearable sporting sports that utilises a deep studying algorithm to accurately locate various sports. Two inertial sensor modules are covered within the machine, w...
详细信息
Recently, with the emergence of many image editing tools (photoshop, Topaz studio, etc.), the authenticity of images has been severely challenged. However, the performance of some existing traditional feature extracti...
详细信息
Sentiment analysis has been widely used in various fields of social media, education, and business. Specifically, in the education domain, the usage of sentiment analysis is difficult due to the huge amount of informa...
详细信息
The boundaries and regions between individual classes in biomedical image classification are hazy and overlapping. These overlapping features make predicting the correct classification result for biomedical imaging da...
详细信息
The boundaries and regions between individual classes in biomedical image classification are hazy and overlapping. These overlapping features make predicting the correct classification result for biomedical imaging data a difficult diagnostic task. Thus, in precise classification, it is frequently necessary to obtain all necessary information before making a decision. This paper presents a novel deep-layered design architecture based on Neuro-Fuzzy-Rough intuition to predict hemorrhages using fractured bone images and head CT scans. To deal with data uncertainty, the proposed architecture design employs a parallel pipeline with rough-fuzzy layers. In this case, the rough-fuzzy function functions as a membership function, incorporating the ability to process rough-fuzzy uncertainty information. It not only improves the deep model's overall learning process, but it also reduces feature dimensions. The proposed architecture design improves the model's learning and self-adaptation capabilities. In experiments, the proposed model performed well, with training and testing accuracies of 96.77% and 94.52%, respectively, in detecting hemorrhages using fractured head images. The comparative analysis shows that the model outperforms existing models by an average of 2.6$\pm$0.90% on various performance metrics. IEEE
Software trustworthiness is an essential criterion for evaluating software quality. In componentbased software, different components play different roles and different users give different grades of trustworthiness af...
详细信息
Software trustworthiness is an essential criterion for evaluating software quality. In componentbased software, different components play different roles and different users give different grades of trustworthiness after using the software. The two elements will both affect the trustworthiness of software. When the software quality is evaluated comprehensively, it is necessary to consider the weight of component and user feedback. According to different construction of components, the different trustworthiness measurement models are established based on the weight of components and user feedback. Algorithms of these trustworthiness measurement models are designed in order to obtain the corresponding trustworthiness measurement value automatically. The feasibility of these trustworthiness measurement models is demonstrated by a train ticket purchase system.
暂无评论