The Android virtualization technique allows an app to create independent virtual environments running on top of the Android native one, where multiple apps can be executed simultaneously. While the technique has legit...
详细信息
Artificial Intelligence (AI) is a vast field that allows the development of programs capable of simulating human intelligence. One of the most used AI techniques that is very important the preparation of raw data whic...
详细信息
We show that the simplest local search heuristics for two natural Euclidean clustering problems are PLS-hard. First, we show that the Hartigan-Wong method, which is essentially the Flip heuristic, for k-Means clusteri...
详细信息
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ...
详细信息
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny *** it comes to deploying IoT,everyone agrees that security is the biggest *** is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square *** research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted *** lightweight cryptography,the information sent between these gadgets may be *** order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance *** also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio.
In stock market forecasting,the identification of critical features that affect the performance of machine learning(ML)models is crucial to achieve accurate stock price *** review papers in the literature have focused...
详细信息
In stock market forecasting,the identification of critical features that affect the performance of machine learning(ML)models is crucial to achieve accurate stock price *** review papers in the literature have focused on various ML,statistical,and deep learning-based methods used in stock market ***,no survey study has explored feature selection and extraction techniques for stock market *** survey presents a detailed analysis of 32 research works that use a combination of feature study and ML approaches in various stock market *** conduct a systematic search for articles in the Scopus and Web of science databases for the years 2011–*** review a variety of feature selection and feature extraction approaches that have been successfully applied in the stock market analyses presented in the *** also describe the combination of feature analysis techniques and ML methods and evaluate their ***,we present other survey articles,stock market input and output data,and analyses based on various *** find that correlation criteria,random forest,principal component analysis,and autoencoder are the most widely used feature selection and extraction techniques with the best prediction accuracy for various stock market applications.
Speed-robust scheduling is the following two-stage problem of scheduling n jobs on m uniformly related machines. In the first stage, the algorithm receives the value of m and the processing times of n jobs;it has to p...
详细信息
作者:
Kim, Jon-LarkEor, EunjeeSogang University
Department of Mathematics Korea and Institute for Mathematical and Data Sciences Seoul Korea Republic of Sogang University
Department of Computer Science and Engineering Korea Republic of
In this paper, we introduce a Genetic Algorithm based Upper Confidence Bound (GA-UCB), an innovative hybrid genetic algorithm integrating Multi-Armed Bandit (MAB). It effectively addresses the challenges of solving la...
详细信息
A tournament is an orientation of a complete graph. A vertex that can reach every other vertex within two steps is called a king. We study the complexity of finding k kings in a tournament graph. We show that the rand...
详细信息
The development of emerging consumer technologies such as the Internet of Things (IoT), artificial intelligence (AI), and cloud computing brings convenience but also raises critical concerns about securing communicati...
详细信息
The two-stage hybridflow shop problem under setup times is addressed in this *** problem is *** the other hand,the studied problem is modeling different real-life applications especially in manufacturing and high *** ...
详细信息
The two-stage hybridflow shop problem under setup times is addressed in this *** problem is *** the other hand,the studied problem is modeling different real-life applications especially in manufacturing and high *** this kind of problem requires the development of adapted *** this context,a metaheuristic using the genetic algorithm and three heuristics are proposed in this *** approximate solutions are using the optimal solution of the parallel machines under release and delivery ***,these solutions are iterative procedures focusing each time on a particular stage where a parallel machines problem is called to be *** general solution is then a concatenation of all the solutions in each *** addition,three lower bounds based on the relaxation method are *** lower bounds present a means to evaluate the efficiency of the developed algorithms throughout the measurement of the relative *** experimental result is discussed to evaluate the performance of the developed *** total,8960 instances are implemented and tested to show the results given by the proposed lower bounds and *** indicators are given to compare between *** results illustrated in this paper show the performance of the developed algorithms in terms of gap and running time.
暂无评论