software quality prediction is used at various stages of projects. There are several metrics that provide the quality measure with respect to different types of software. In this study, defect density is used as the f...
详细信息
Pre-trained Language Models have been shown to be able to emulate deductive reasoning in natural language. However, PLMs are easily affected by irrelevant information (e.g., entity) in instance-level proofs when learn...
详细信息
COVID-19 can only be detected by a few different methods at this time. This article discusses how to recognize infected tissues in CT lung images and how to treat them. We investigated the ability of SegNet and U-NET ...
详细信息
In order to solve huge-scale optimization problems, many evolutionary algorithms have been proposed. In this paper, we introduce Block Differential Evolution (BDE) algorithm. The BDE can be categorized into the class ...
详细信息
ISBN:
(纸本)9798350314588
In order to solve huge-scale optimization problems, many evolutionary algorithms have been proposed. In this paper, we introduce Block Differential Evolution (BDE) algorithm. The BDE can be categorized into the class of memory-efficient optimization algorithms. The main contribution is to solve large and huge-scale problems effectively and efficiently by reducing the problem dimension by utilizing a dimension-blocking scheme. With respect to the block size times reduced memory usage, furthermore, the proposed algorithm is computationally more efficient because DE operations (i.e., mutation, crossover, and selection) are performed on much smaller vector sizes. In fact, the employed blocking approach helps us to map the higher-dimensional problems into a lower-dimensional one which is more convenient to process during the optimization steps. There is a great demanding potential for the proposed approach to be utilized in embedded systems with low computational resources as a compressed optimization algorithm. This strategy is instantiated and evaluated on some well-known benchmark problems and compared with the baseline classic DE algorithm;the reported results are promising and encouraging for conducting further investigations. To the best of our knowledge, that is the first time a variable blocking scheme has been used in any meta-heuristic algorithm. A detailed explanation of the geometrical behavior of the proposed blocking approach is provided which explains how in a higher search space, a blocking approach is meaningful and applicable to accelerate convergence rate while the memory saving is huge. The reported results in this paper show the experiments on Large-Scale Global Optimization Problems proposed in CEC-2013 benchmark suite with 1,000, 10,000, and 100,000 dimensions and clearly are evidence of the possibility of satisfying two conflicting objectives, namely, efficiency and effectiveness, simultaneously. In order to utilize CEC-2013 benchmark problems for
As stated by the United Arab Emirates's (UAE) Community Development Authority (CDA), there are around 3,065 individuals with hearing disabilities in the country. These individuals often struggle to communicate wit...
详细信息
Reconfigurable intelligent surface (RIS) is one of the promising technology for the next-generation wireless networks. The RIS reflects the received signal with phase shift introduced by reflecting elements without an...
详细信息
In recent years, the gaming industry has witnessed exponential growth, with an increasing focus on enhancing player experience and engagement. To achieve this, we propose a method that recognizes game experience trait...
详细信息
In light of increased constraints on healthcare systems, particularly as a result of the pandemic, the importance of directing patients to the appropriate healthcare departments for individualized treatment based on t...
详细信息
Web-based Geographical Information Systems (Web-GIS) aim to store, analyze, and disseminate geospatial information, enabling effective decision-making. However, their development requires professional expertise and in...
详细信息
Zero-knowledge proof systems are becoming increasingly prevalent and being widely used to secure decentralized financial systems and protect the privacy of users. Given the sensitivity of these applications, zero-know...
详细信息
暂无评论