Research into automatically searching for an optimal neural network(NN)by optimi-sation algorithms is a significant research topic in deep learning and artificial ***,this is still challenging due to two issues:Both t...
详细信息
Research into automatically searching for an optimal neural network(NN)by optimi-sation algorithms is a significant research topic in deep learning and artificial ***,this is still challenging due to two issues:Both the hyperparameter and ar-chitecture should be optimised and the optimisation process is computationally *** tackle these two issues,this paper focusses on solving the hyperparameter and architecture optimization problem for the NN and proposes a novel light‐weight scale‐adaptive fitness evaluation‐based particle swarm optimisation(SAFE‐PSO)***,the SAFE‐PSO algorithm considers the hyperparameters and architectures together in the optimisation problem and therefore can find their optimal combination for the globally best ***,the computational cost can be reduced by using multi‐scale accuracy evaluation methods to evaluate ***,a stagnation‐based switch strategy is proposed to adaptively switch different evaluation methods to better balance the search performance and computational *** SAFE‐PSO algorithm is tested on two widely used datasets:The 10‐category(i.e.,CIFAR10)and the 100−cate-gory(i.e.,CIFAR100).The experimental results show that SAFE‐PSO is very effective and efficient,which can not only find a promising NN automatically but also find a better NN than compared algorithms at the same computational cost.
Due to limited memory and computing resources, the application of deep neural networks on embedded and mobile devices is still a great challenge. To tackle this problem, this paper proposes a lightweight super-resolut...
详细信息
End-to-end training has emerged as a prominent trend in speech recognition, with Conformer models effectively integrating Transformer and CNN architectures. However, their complexity and high computational cost pose d...
详细信息
This paper proposes a YOLOv5s deep learning algorithm incorporating the SE attention mechanism to address the issue of workers failing to wear reflective clothing on duty, which has resulted in casualties from time to...
详细信息
News text is an important branch of natural language processing. Compared to ordinary texts, news text has significant economic and scientific value. The characteristics of news text include structural hierarchy, dive...
详细信息
In response to the shortcomings of existing rail transit grid planning methods such as longer route lengths and longer travel times, this paper applies a hybrid genetic algorithm to design a large-scale urban rail tra...
详细信息
Music source separation aims to disentangle individual sources from the mixture of musical signals. Existing generative adversarial network (GAN) based methods generally work on the spectrogram domain only. However, t...
详细信息
To solve the problems of feature loss and color difference after image dehazing and poor dehazing effect in real hazy images, a method UVCGAN-Dehaze is proposed for unpaired image dehazing. In the proposed model, the ...
详细信息
Because of the increasing number of threats in the IoT cloud, an advanced security mechanism is needed to guard data against hacking or attacks. A user authentication mechanism is also required to authenticate the use...
详细信息
Because of the increasing number of threats in the IoT cloud, an advanced security mechanism is needed to guard data against hacking or attacks. A user authentication mechanism is also required to authenticate the user accessing the cloud services. The conventional cryptographic algorithms used to provide security mechanisms in cloud networks are often vulnerable to various cyber-attacks and inefficient against new attacks. Therefore,developing new solutions based on different mechanisms from traditional cryptography methods is required to protect data and users' privacy from attacks. Different from the conventional cryptography method, we suggest a secure mutual authentication protocol based on the visual cryptography technique in this paper. We use visual cryptography to encrypt and decrypt the secret images. The mutual authentication is based on two secret images and *** user requests the ticket from the authentication server(AS) to obtain the permission for accessing the cloud services. Three shared secret keys are used for encrypting and decrypting the authentication process. We analyze the protocol using the Barrows-Abadi-Needham(BAN)-logic method and the results show that the protocol is robust and can protect the user against various attacks. Also, it can provide a secure mutual authentication mechanism.
One of the impacts of the COVID pandemic has been to force people to find alternates sources for daily supplies, turning to online to offline (O2O) platforms. The service quality of the O2O platform naturally affects ...
详细信息
暂无评论