Recently,multimodal multiobjective optimization problems(MMOPs)have received increasing *** goal is to find a Pareto front and as many equivalent Pareto optimal solutions as *** some evolutionary algorithms for them h...
详细信息
Recently,multimodal multiobjective optimization problems(MMOPs)have received increasing *** goal is to find a Pareto front and as many equivalent Pareto optimal solutions as *** some evolutionary algorithms for them have been proposed,they mainly focus on the convergence rate in the decision space while ignoring solutions *** this paper,we propose a new multiobjective fireworks algorithm for them,which is able to balance exploitation and exploration in the decision *** first extend a latest single-objective fireworks algorithm to handle *** we make improvements by incorporating an adaptive strategy and special archive guidance into it,where special archives are established for each firework,and two strategies(i.e.,explosion and random strategies)are adaptively selected to update the positions of sparks generated by fireworks with the guidance of special ***,we compare the proposed algorithm with eight state-of-the-art multimodal multiobjective algorithms on all 22 MMOPs from CEC2019 and several imbalanced distance minimization *** results show that the proposed algorithm is superior to compared algorithms in solving ***,its runtime is less than its peers'.
Banks play a pivotal role in generating significant profits through loan operations. However, the challenge lies in accurately identifying genuine loan applicants who are likely to repay their loans. Manual processes ...
详细信息
Unpredictable fruit and vegetable prices create significant challenges for farmer livelihoods. This research proposes an innovative approach using recurrent neural networks (RNNs) to predict both minimum and maximum p...
详细信息
The analysis using Social Network Analysis (SNA) is focusing more on the number or the frequency of social interactions based on adjacency matrix. This method cannot be used to observe the semantic relationship among ...
详细信息
Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions (TLA+), into com...
详细信息
ISBN:
(纸本)9798350351507
Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions (TLA+), into computer science education, targeting undergraduate juniors/seniors and graduate students. Many safety-critical systems and services crucially depend on correct and reliable behavior. Formal methods can play a key role in ensuring correct and safe system behavior, yet remain underutilized in educational and industry contexts. Aims: We aim to (1) qualitatively assess the state of formal methods in computer science programs, (2) construct level-appropriate examples that could be included midway into one's undergraduate studies, (3) demonstrate how to address successive 'failuresy' through progressively stringent safety and liveness requirements, and (4) establish an ongoing framework for assessing interest and relevance among students. Methods: We detail our pedagogical strategy for embedding TLA+ into an intermediate course on formal methods at our institution. After starting with a refresher on mathematical logic, students specify the rules of simple puzzles in TLA+ and use its included model checker (known as TLC) to find a solution. We gradually escalate to more complex, dynamic, event-driven systems, such as the control logic of a microwave oven, where students will study safety and liveness requirements. We subsequently discuss explicit concurrency, along with thread safety and deadlock avoidance, by modeling bounded counters and buffers. Results: Our initial findings suggest that through careful curricular design and choice of examples and tools, it is possible to inspire and cultivate a new generation of software engineers proficient in formal methods. Conclusions: Our initial efforts suggest that 84% of our students had a positive experience in our formal methods course. Our future plans include a longitudinal analysis within our own institution and
software frequently needs to adapt its behavior at run time to respond to changes in its execution environment. Different software components may use different approaches to adaptation. Composing a single adaptive sys...
ISBN:
(纸本)1581139497
software frequently needs to adapt its behavior at run time to respond to changes in its execution environment. Different software components may use different approaches to adaptation. Composing a single adaptive system from existing adaptive components requires an "adaptation infrastructure" to integrate and arbitrate adaptive behaviors. This paper proposes a model for such an infrastructure and describes the design and operation of M2, a prototype implementation. M2 uses a technique called transparent shaping to modify existing components so that they can report events of interest to the M2 core and implement appropriate responses. The architecture and communication infrastructure of M2 are described, followed by a case study in which M2 is used to construct an adaptive multimedia conferencing application from otherwise incompatible components. Copyright 2004 ACM.
Today's marketing strategies place a high priority on comprehending customer sentiments. It will not only give businesses a better understanding of how their clients view their goods and/or services, but it will a...
详细信息
Reprogramming is an essential service for wireless sensor networks. Authenticating reprogramming process is important as sensors need to verify that the code image is truly from a trusted source. There are two ways to...
详细信息
As the Unified Modeling Language (UML) and model-driven development (MDD) become increasingly common in industry, many developers are faced with the difficult task of understanding how an existing UML model realizes s...
详细信息
Logic locking proposed to protect integrated circuits from serious hardware threats has been studied extensively over a decade. In these years, many logic locking techniques have been proven to be broken. The state-of...
详细信息
暂无评论