Evolutionary computation is a rapidly evolving field and the related algorithms have been successfully used to solve various real-world optimization *** past decade has also witnessed their fast progress to solve a cl...
详细信息
Evolutionary computation is a rapidly evolving field and the related algorithms have been successfully used to solve various real-world optimization *** past decade has also witnessed their fast progress to solve a class of challenging optimization problems called high-dimensional expensive problems(HEPs).The evaluation of their objective fitness requires expensive resource due to their use of time-consuming physical experiments or computer ***,it is hard to traverse the huge search space within reasonable resource as problem dimension *** evolutionary algorithms(EAs)tend to fail to solve HEPs competently because they need to conduct many such expensive evaluations before achieving satisfactory *** reduce such evaluations,many novel surrogate-assisted algorithms emerge to cope with HEPs in recent *** there lacks a thorough review of the state of the art in this specific and important *** paper provides a comprehensive survey of these evolutionary algorithms for *** start with a brief introduction to the research status and the basic concepts of ***,we present surrogate-assisted evolutionary algorithms for HEPs from four main *** also give comparative results of some representative algorithms and application ***,we indicate open challenges and several promising directions to advance the progress in evolutionary optimization algorithms for HEPs.
The use of convolutional neural networks (CNN) in the preservation of cultural heritage monuments, especially in conflict-affected regions such as Gaza, Ukraine, Iraq and others, represents a significant advancement i...
详细信息
Annotation tools are the starting point for creating Natural Language Processing (NLP) datasets. There is a wide variety of tools available;setting up these tools is however a hindrance. We propose EEVEE, an annotatio...
详细信息
Cryo-Electron Microscopy(Cryo-EM)images are characterized by the low signal-to-noise ratio,low contrast,serious background noise,more impurities,less data,difficult data labeling,simpler image semantics,and relatively...
详细信息
Cryo-Electron Microscopy(Cryo-EM)images are characterized by the low signal-to-noise ratio,low contrast,serious background noise,more impurities,less data,difficult data labeling,simpler image semantics,and relatively fixed structure,while U-Net obtains low resolution when downsampling rate information to complete object category recognition,obtains highresolution information during upsampling to complete precise segmentation and positioning,fills in the underlying information through skip connection to improve the accuracy of image segmentation,and has advantages in biological image processing like Cryo-EM *** article proposes A U-Net based residual intensive neural network(Urdnet),which combines point-level and pixel-level tags,used to accurately and automatically locate particles from cryo-electron microscopy images,and solve the bottleneck that cryo-EM Single-particle biologicalmacromolecule reconstruction requires tens of thousands of automatically picked *** 80S ribosome,HCN1 channel and TcdA1 toxin subunits,and other public protein datasets have been trained and tested on *** experimental results show that Urdnet could reach the same excellent particle picking performances as the mainstream methods of RELION,DeepPicker,and acquire the 3Dstructure of picked particleswith higher resolution.
Mobile Edge Computing (MEC) offers low-latency and high-bandwidth support for Internet-of-Vehicles (IoV) applications. However, due to high vehicle mobility and finite communication coverage of base stations, it is ha...
详细信息
When an accident has occurred, first aid before a professional response arrives can improve the outcome for the victims. However, little research has been done on the effect of coordination and leadership on first aid...
详细信息
Spiking neural networks (SNNs) have gained sig-nificant attention as a promising framework in computational neuroscience and artificial intelligence, offering benefits such as low energy consumption and minimal memory...
详细信息
Wireless Sensor Networks (WSNs) are essential for various applications, but their architecture makes them vulnerable to attacks. While traditional security methods like authentication and encryption offer some protect...
详细信息
Data with missing values,or incomplete information,brings some challenges to the development of classification,as the incompleteness may significantly affect the performance of *** this paper,we handle missing values ...
详细信息
Data with missing values,or incomplete information,brings some challenges to the development of classification,as the incompleteness may significantly affect the performance of *** this paper,we handle missing values in both training and test sets with uncertainty and imprecision reasoning by proposing a new belief combination of classifier(BCC)method based on the evidence *** proposed BCC method aims to improve the classification performance of incomplete data by characterizing the uncertainty and imprecision brought by *** BCC,different attributes are regarded as independent sources,and the collection of each attribute is considered as a ***,multiple classifiers are trained with each subset independently and allow each observed attribute to provide a sub-classification result for the query ***,these sub-classification results with different weights(discounting factors)are used to provide supplementary information to jointly determine the final classes of query *** weights consist of two aspects:global and *** global weight calculated by an optimization function is employed to represent the reliability of each classifier,and the local weight obtained by mining attribute distribution characteristics is used to quantify the importance of observed attributes to the pattern *** comparative experiments including seven methods on twelve datasets are executed,demonstrating the out-performance of BCC over all baseline methods in terms of accuracy,precision,recall,F1 measure,with pertinent computational costs.
The security of IoT that is based on layered approaches has shortcomings such as the redundancy, inflexibility, and inefficiently of security solutions. There are many harmful attacks in IoT networks such as DoS and D...
详细信息
暂无评论