The growing necessity for enhanced processing capabilities in edge devices with limited resources has led us to develop effective methods for improving high-performance computing (HPC) applications. In this paper, we ...
详细信息
This paper presents an efficient enhanced snake optimizer termed BEESO for global optimization and engineering *** a newly mooted meta-heuristic algorithm,snake optimizer(SO)mathematically models the mating characteri...
详细信息
This paper presents an efficient enhanced snake optimizer termed BEESO for global optimization and engineering *** a newly mooted meta-heuristic algorithm,snake optimizer(SO)mathematically models the mating characteristics of snakes to find the optimal *** has a simple structure and offers a delicate balance between exploitation and ***,it also has some shortcomings to be *** proposed BEESO consequently aims to lighten the issues of lack of population diversity,convergence slowness,and the tendency to be stuck in local optima in *** presentation of Bi-Directional Search(BDS)is to approach the global optimal value along the direction guided by the best and the worst individuals,which makes the convergence speed *** increase in population diversity in BEESO benefits from Modified Evolutionary Population Dynamics(MEPD),and the replacement of poorer quality individuals improves population *** Elite Opposition-Based Learning(EOBL)provides improved local exploitation ability of BEESO by utilizing solid solutions with good *** performance of BEESO is illustrated by comparing its experimental results with several algorithms on benchmark functions and engineering ***,the results of the experiment are analyzed again from a statistical point of view using the Friedman and Wilcoxon rank sum *** findings show that these introduced strategies provide some improvements in the performance of SO,and the accuracy and stability of the optimization results provided by the proposed BEESO are competitive among all *** conclude,the proposed BEESO offers a good alternative to solving optimization issues.
The implementation of secure communication in the Industrial Internet of Things (IIoT) has made and it is a significant security concern. Identity-based generalized signcryption scheme is one among the cryptographic t...
详细信息
From the perspective of majorization theory, we study how to enhance the entanglement of a two-mode squeezed vacuum (TMSV) state by using local filtration operations. We present several schemes achieving entanglement ...
详细信息
From the perspective of majorization theory, we study how to enhance the entanglement of a two-mode squeezed vacuum (TMSV) state by using local filtration operations. We present several schemes achieving entanglement enhancement with photon addition and subtraction, and then consider filtration as a general probabilistic procedure consisting in acting with local (nonunitary) operators on each mode. From this, we identify a sufficient set of two conditions for these filtration operators to successfully enhance the entanglement of a TMSV state, namely, the operators must be Fock orthogonal (i.e., preserving the orthogonality of Fock states) and Fock amplifying (i.e., giving larger amplitudes to larger Fock states). Our results notably prove that ideal photon addition, subtraction, and any concatenation thereof always enhance the entanglement of a TMSV state in the sense of majorization theory. We further investigate the case of realistic photon addition (subtraction) and are able to upper bound the distance between a realistic photon-added (-subtracted) TMSV state and a nearby state that is provably more entangled than the TMSV, thus extending entanglement enhancement to practical schemes via the use of a notion of approximate majorization. Finally, we consider the state resulting from k-photon addition (on each of the two modes) on a TMSV state. We prove analytically that the state corresponding to k=1 majorizes any state corresponding to 2≤k≤8 and we conjecture the validity of the statement for all k≥9.
Sensors based Human Activity Recognition(HAR)have numerous applications in eHeath,sports,fitness assessments,ambient assisted living(AAL),human-computer interaction and many *** human physical activity can be monitore...
详细信息
Sensors based Human Activity Recognition(HAR)have numerous applications in eHeath,sports,fitness assessments,ambient assisted living(AAL),human-computer interaction and many *** human physical activity can be monitored by using wearable sensors or external *** usage of external devices has disadvantages in terms of cost,hardware installation,storage,computational time and lighting conditions ***,most of the researchers used smart devices like smart phones,smart bands and watches which contain various sensors like accelerometer,gyroscope,GPS etc.,and adequate processing *** the task of recognition,human activities can be broadly categorized as basic and complex human *** of complex activities have received very less attention of researchers due to difficulty of problem by using either smart phones or smart *** reasons include lack of sensor-based labeled dataset having several complex human daily life *** of the researchers have worked on the smart phone’s inertial sensors to perform human activity recognition,whereas a few of them used both pocket and wrist *** this research,we have proposed a novel framework which is capable to recognize both basic and complex human activities using builtin-sensors of smart phone and smart *** have considered 25 physical activities,including 20 complex ones,using smart device’s built-in *** the best of our knowledge,the existing literature consider only up to 15 activities of daily life.
Generally, the inductively coupled plasma-reactive ion etching (ICP-RIE) mesa technology was used to remove p-GaN/MQWs and expose n-GaN for electrical contact in a fabricated micro light-emitting diode (μLED). In thi...
详细信息
In the last decade, Convolutional Neural Networks (CNNs) have been the de facto approach for automated medical image detection. Recently, Vision Transformers have emerged in computer vision as an alternative to CNNs. ...
详细信息
Codes in the Damerau-Levenshtein metric have received some attention by the research community recently owing to their applications in DNA-based data storage. In particular, Gabrys, Yaakobi, and Milenkovic (2017) desi...
详细信息
Uncovering the mathematical structure of unknown chaotic systems from limited time series data poses a significant challenge in the field of dynamical systems, with broad applications across various domains. In this p...
详细信息
暂无评论