Swarm intelligence is a class of nature-inspired metaheuristic algorithms, that is specifically derived from biological systems in nature with an emphasis on their social interactions. These algorithms have been prima...
Swarm intelligence is a class of nature-inspired metaheuristic algorithms, that is specifically derived from biological systems in nature with an emphasis on their social interactions. These algorithms have been primarily developed to solve complex combinatorial optimization problems and are extremely popular among researchers in metaheuristic algorithms. This is evident from the numerous published scientific papers describing algorithms inspired by biological systems, ranging from insects such as ants and bees to the largest animals on the planet like whales. All these algorithms share some common concepts and relationships that can be explicitly identified, named, and formalized. These shared concepts and relationships can be organized and represented through the construction of an ontology. The goal of this paper is to present a formal ontology that standardizes vocabulary, as well as a set of rules enabling precise communication and reasoning about these algorithms. Ultimately, this will improve our understanding, analysis, research processes, and utilization of these computational approaches.
The constant rise of e-commerce coupled with extremely fast deliveries is a significant contributor to saturate city centers' mobility. To address this issue, the development of a convenient Automated Parcel Locke...
详细信息
ISBN:
(纸本)9781665476621
The constant rise of e-commerce coupled with extremely fast deliveries is a significant contributor to saturate city centers' mobility. To address this issue, the development of a convenient Automated Parcel Lockers (APLs) network improves last-mile distribution by reducing the number of transportation vehicles, the distances driven, and the delivery stops. This article aims to define and compare APL networks in the cities of Pamplona (Spain), Zakopane and Krakow (Poland). Thereby, a bi-criteria weighted-sum simulation optimization model is developed for a representative year for the aforementioned cities. The simulation forecasts the e-commerce demands whereas the optimal APL network is obtained with a bi-criteria maximum APL revenues and minimum network costs. Meaningful results are obtained from the multi-criteria hybrid model outcomes as well as from the cities comparison. These outcomes suggest efficient APLs networks considering cultural and demographic factors for a massive use of APLs in high-demand periods.
Accessing the secured data through the network is a major task in emerging technology. Data needs to be protected from the network vulnerabilities, malicious users, hackers, sniffers, intruders. The novel framework ha...
详细信息
Gait recognition is one of the few introductory biometrics used in security systems to identify humans. In this research, optimizing the accuracy by improving the extraction features of previous research. The gait dat...
详细信息
A key challenge in clinical recommendation systems is the problem of aberrant patient profiles in social networks. As a result of a person's abnormal profile, numerous vests might be used to make fake remarks abou...
详细信息
We introduce RetinaRegNet, a zero-shot image registration model designed to register retinal images with minimal overlap, large deformations, and varying image quality. RetinaRegNet addresses these challenges and achi...
详细信息
Society currently faces more security threats in the cyberspace which is most harmful due to the cyberattacks development responsible for the complexity and volumes growth of mobile applications as well as Internet te...
Society currently faces more security threats in the cyberspace which is most harmful due to the cyberattacks development responsible for the complexity and volumes growth of mobile applications as well as Internet technologies. By conceptually defined as the domains for employee's cyber security behaviour as well as the development and the testing of operational measures, this study has advanced cyber security behaviour and research for awareness and investigation are added to the body of published literature on cybersecurity. Based on survey data from 579 corporate managers and professionals, the investigation for the impact of cyber security policy and awareness. The presented hypotheses are tested using ANOVA techniques and structural equation modeling. The findings indicate that employees familiar with the information and security terms and conditions of the company can have the ability to handle the jobs related to cyber security than the employees who do not have enough knowledge. Additionally, the study shows that an organizational environment as favourable for investigating that employee for the impact of cyber security policy that has positive impact on the cyber security behaviour.
Build scripts play an important role in transforming the source code into executable artifacts. However, the development of build scripts is typically error-prone. As one kind of the most prevalent errors in build scr...
详细信息
ISBN:
(纸本)9781450394758
Build scripts play an important role in transforming the source code into executable artifacts. However, the development of build scripts is typically error-prone. As one kind of the most prevalent errors in build scripts, the dependency-related errors, including missing dependencies and redundant dependencies, draw the attention of many researchers. A variety of build dependency analysis techniques have been proposed to tackle them. Unfortunately, most of these techniques, even the state-of-the-art ones, suffer from efficiency issues due to the expensive cost of monitoring the complete build process to build dynamic dependencies. Especially for large-scale projects, such the cost would not be affordable. This work presents a new technique to accelerate the build dependency error detection by reducing the time cost of the build monitoring. Our key idea is to reduce the size of a program while still preserving the same dynamic dependencies as the original one. Building the reduced program does not generate a real software artifact, but it yields the same list of dependency errors and meanwhile speeds up the process. We implement the tool VirtualBuild and evaluate it on real-world projects. It is shown that it detects all the dependency errors found by existing tools at a low cost. Compared with the state-of-the-art technique, VirtualBuild accelerates the build process by 8.74 times, and improves the efficiency of error detection by 6.13 times on average. Specifically, in the large-scale project LLVM that contains 5.67 MLoC, VirtualBuild reduces the overall time from over four hours to 38.63 minutes.
作者:
Denninnart, ChavitSalehi, Mohsen AminiLaboratory
School of Computing and Informatics University of Louisiana LafayetteLA70503 United States Laboratory
Computer Science and Engineering Department University of North Texas United States
Along with the rise of domain-specific computing (ASICs hardware) and domain-specific programming languages, we envision that the next step is the emergence of domain-specific cloud platforms. Considering multimedia s...
详细信息
We propose the Multimodal Clinical Benchmark for Emergency Care (MC-BEC), a comprehensive benchmark for evaluating foundation models in Emergency Medicine using a dataset of 100K+ continuously monitored Emergency Depa...
详细信息
暂无评论