A large number of metaheuristics have been proposed and shown high performance in solving complex optimization problems. While most variation operators in existing metaheuristics are empirically designed,new operators...
详细信息
A large number of metaheuristics have been proposed and shown high performance in solving complex optimization problems. While most variation operators in existing metaheuristics are empirically designed,new operators are automatically designed in this work,which are expected to be search space independent and thus exhibit robust performance on different *** work first investigates the influence of translation invariance, scale invariance, and rotation invariance on the search behavior and performance of some representative operators. This work then deduces the generic form of translation, scale, and rotation invariant operators, and proposes a principled approach for the automated design of operators, which searches for high-performance operators based on the deduced generic form. The experimental results demonstrate that the operators generated by the proposed approach outperform state-of-the-art ones on a variety of problems with complex landscapes and up to 1000decision variables.
Graph neural network (GNN) has gained increasing popularity in recent years owing to its capability and flexibility in modeling complex graph structure data. Among all graph learning methods, hypergraph learning is a ...
详细信息
Under the general trend of the rapid development of smart grids,data security and privacy are facing serious challenges;protecting the privacy data of single users under the premise of obtaining user-aggregated data h...
详细信息
Under the general trend of the rapid development of smart grids,data security and privacy are facing serious challenges;protecting the privacy data of single users under the premise of obtaining user-aggregated data has attracted widespread *** this study,we propose an encryption scheme on the basis of differential privacy for the problem of user privacy leakage when aggregating data from multiple smart ***,we use an improved homomorphic encryption method to realize the encryption aggregation of users’***,we propose a double-blind noise addition protocol to generate distributed noise through interaction between users and a cloud platform to prevent semi-honest participants from stealing data by colluding with one ***,the simulation results show that the proposed scheme can encrypt the transmission of multi-intelligent meter data under the premise of satisfying the differential privacy *** if an attacker has enough background knowledge,the security of the electricity information of one another can be ensured.
This paper investigates the implementation of the Koopman framework to quadrotor by numerical simulations. Initially, the nonlinear dynamics of a quadrotor is modelled in MATLAB/SIMULINK. The attitude and altitude con...
详细信息
In many fields, such as healthcare, finance, and scientific research, data sharing and collaboration are critical to achieving better outcomes. However, the sharing of personal data often involves privacy risks, so pr...
详细信息
Coverage tasks have garnered significant interest in recent years due to their applications in fields such as environmental monitoring, search and rescue, and robotic exploration. Swarm robotics has emerged as a promi...
详细信息
Diabetes is a common disease that causes complications in the eyes known as Diabetic Retinopathy (DR). It aids in discovering the DR and tends to be the main cause behind people’s blindness amidst the previous decade...
详细信息
This paper deals with numerical methods for solving one-dimensional(1D)and twodimensional(2D)initial-boundary value problems(IBVPs)of space-fractional sine-Gordon equations(SGEs)with distributed *** 1D problems,we con...
详细信息
This paper deals with numerical methods for solving one-dimensional(1D)and twodimensional(2D)initial-boundary value problems(IBVPs)of space-fractional sine-Gordon equations(SGEs)with distributed *** 1D problems,we construct a kind of oneparameter finite difference(OPFD)*** is shown that,under a suitable condition,the proposed method is convergent with second order accuracy both in time and *** implementation,the preconditioned conjugate gradient(PCG)method with the Strang circulant preconditioner is carried out to improve the computational efficiency of the OPFD *** 2D problems,we develop another kind of OPFD *** such a method,two classes of accelerated schemes are suggested,one is alternative direction implicit(ADI)scheme and the other is ADI-PCG *** particular,we prove that ADI scheme can arrive at second-order accuracy in time and *** some numerical experiments,the computational effectiveness and accuracy of the methods are further ***,for the suggested methods,a numerical comparison in computational efficiency is presented.
With the development of modern society, the demand for electricity consumption is also gradually increasing, timely power inspection, the removal of foreign bodies at the power line is very important. Aiming at the pr...
详细信息
Educational Documents and Certificates are a proof of professional achievements for anyone. Without these documents, it is not possible to start your career and hence play a very important role in everyone's profe...
详细信息
暂无评论