In order to solve huge-scale optimization problems, many evolutionary algorithms have been proposed. In this paper, we introduce Block Differential Evolution (BDE) algorithm. The BDE can be categorized into the class ...
详细信息
ISBN:
(纸本)9798350314588
In order to solve huge-scale optimization problems, many evolutionary algorithms have been proposed. In this paper, we introduce Block Differential Evolution (BDE) algorithm. The BDE can be categorized into the class of memory-efficient optimization algorithms. The main contribution is to solve large and huge-scale problems effectively and efficiently by reducing the problem dimension by utilizing a dimension-blocking scheme. With respect to the block size times reduced memory usage, furthermore, the proposed algorithm is computationally more efficient because DE operations (i.e., mutation, crossover, and selection) are performed on much smaller vector sizes. In fact, the employed blocking approach helps us to map the higher-dimensional problems into a lower-dimensional one which is more convenient to process during the optimization steps. There is a great demanding potential for the proposed approach to be utilized in embedded systems with low computational resources as a compressed optimization algorithm. This strategy is instantiated and evaluated on some well-known benchmark problems and compared with the baseline classic DE algorithm;the reported results are promising and encouraging for conducting further investigations. To the best of our knowledge, that is the first time a variable blocking scheme has been used in any meta-heuristic algorithm. A detailed explanation of the geometrical behavior of the proposed blocking approach is provided which explains how in a higher search space, a blocking approach is meaningful and applicable to accelerate convergence rate while the memory saving is huge. The reported results in this paper show the experiments on Large-Scale Global Optimization Problems proposed in CEC-2013 benchmark suite with 1,000, 10,000, and 100,000 dimensions and clearly are evidence of the possibility of satisfying two conflicting objectives, namely, efficiency and effectiveness, simultaneously. In order to utilize CEC-2013 benchmark problems for
The methodologies based on neural networks are substantial to accomplish sentiment analysis in the Social Internet of Things (SIoT). With social media sentiment analysis, significant insights can produce efficient and...
详细信息
The concept of Digital Twin has been widely used by researchers to represent physical entities in computer-generated reality in the metaverse. In this research, a novel concept of 'Mobile Twin' is coined. Mobi...
详细信息
The continuous revolution in Artificial Intelligence (AI) has played a significant role in the development of key consumer applications, including Industry 5.0, autonomous decision-making, fault diagnosis, etc. In pra...
详细信息
The implementation of a patient monitoring system and infusion automation which aims to ensure regular and periodic monitoring of inpatient conditions are applied in this system. This embedded system is applied in hos...
详细信息
Zero-knowledge proof systems are becoming increasingly prevalent and being widely used to secure decentralized financial systems and protect the privacy of users. Given the sensitivity of these applications, zero-know...
详细信息
Condition Monitoring (CM) is an important approach to extending the life of complex equipment by forecasting the outcome of an event before catastrophic failure occurs. Recent advancements in digital twins (DT) offer ...
详细信息
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ...
详细信息
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency.
Reconfigurable intelligent surface (RIS) is one of the promising technology for the next-generation wireless networks. The RIS reflects the received signal with phase shift introduced by reflecting elements without an...
详细信息
To analyze the physiological information within the acquired EEG signal is very cumbersome due to the possibility of several factors, viz. noise and artifacts, complexity of brain dynamics, and inter-subject variabili...
详细信息
暂无评论