The status of current various swarm intelligence algorithms contains many strategies which cover their core issues, therefore, a new swarm intelligence algorithm by simulating sheep behaviors optimization (SO) is *** ...
详细信息
In order to maximize the influence of commodity profits in e-commerce platforms, designing and improving the K-shell algorithm to select the more influential seed node sets in this paper. The new algorithm improves th...
In order to maximize the influence of commodity profits in e-commerce platforms, designing and improving the K-shell algorithm to select the more influential seed node sets in this paper. The new algorithm improves the number of active nodes by setting node threshold and edge weight attributes. To obtain more commodity profits, a strategy IRDSN (Strategy for Improving Repeat Degree of Seed Nodes) is proposed to select initial seed nodes and improve the repeat degree of seed nodes. The profit maximization based on linear threshold model is realized by setting different propagation modes. The improved algorithm and strategy IRDSN are analysed and verified in real data set and e-commerce platform. The results show that the algorithm effectively improves the profit of commodities.
This article proposes a stochastic multilevel-state framework to model the animal’s behavior. The motivation of this article is the variety behavior influenced by several factors, which can lead to the state explosio...
详细信息
ISBN:
(纸本)9789811308925
This article proposes a stochastic multilevel-state framework to model the animal’s behavior. The motivation of this article is the variety behavior influenced by several factors, which can lead to the state explosion. The proposed framework processes data from an automated sensing system and constructs the model. The data gathered from captive Antelope goral (Naemorhedusgriseus) in Chiang Mai Night Safari, Thailand. The data is gathered from the activity and the environmental factors in the cage by none invasive method. The model separated observed data into two main classes: the upper-level data and the lower-level data. The upper-level data represents the environment data such as temperature, humidity, and light density. Moreover, the landscape of the captivity area also takes into consideration. On the other hand, the lower-level represents the location of the animal of interested in the captivity area. The working strategy of this work is to cluster the each type of data and link them together by a stochastic approach. Both layers of data will be handled independently in clustering algorithm and determine probabilistic of state transaction. From the data observed from the sensor, the Probabilistic Automaton (PA) function is constructed. It is a function of producing the next stage based on the previous behavior states. The initial state of the framework is in the lower-level data (the current location of the animal). Then, the PA using the current lower stage and the current upper stage generates the next stage, location of the animal. Both the lower stage and the upper stage are traverse along the constructed automaton. The result can suggest computing methods, which can utilize to zoo research, which performs behavior monitoring, and in the other studies area, or subject of study, such as, air pollution dispersion that tracks the movement of pollutant according to the environment. The benefits of the proposed methods also can be used to create the application
The polarization states of scattered photons can be used to map or image the anisotropic features of a nanostructure. However, the scattering strength depends heavily on the refractivity contrast in the near field und...
详细信息
The polarization states of scattered photons can be used to map or image the anisotropic features of a nanostructure. However, the scattering strength depends heavily on the refractivity contrast in the near field under measurement, which limits the imaging sensitivity for viral particles which have little refractivity contrast with their nano-ambientes. In this paper, we show the photon scattering signal strength can be magnified by introducing a more abrupt change of refractivity at the virus particle using antibody-conjugated gold nanoparticles (AuNPs), allowing the presence of such viruses to be detected. Using two different deep learning methods to minimize scattering noise, the photon states scattering signal of a AuNPs ligated virus is enhanced significantly compared to that of a bare virus particle. This is confirmed by Finite Difference Time Domain (FDTD) numerical simulations. The sensitivity of the polarization state scattering spectra from a virus-gold particle doublet is 5.4 times higher than that of a conventional microscope image.
With the research of influence maximization algorithm, many researchers have found that the existing algorithm has the problem of overlapping influence of seed nodes. In order to solve the problem of overlapping influ...
With the research of influence maximization algorithm, many researchers have found that the existing algorithm has the problem of overlapping influence of seed nodes. In order to solve the problem of overlapping influence of seed nodes, this paper proposes an IMCS algorithm based on community structure. Firstly, we divide the community through the central node, and the quality of community division is ensured by defining community fitness and node contribution. Then through the analysis of the community division results, the seed node selects the one with the largest degree. Since most of the nodes activated by seed nodes of different communities also belong to different communities, this method solves the problem of overlapping influence to a certain extent. The experimental results show that the effectiveness of the IMCS algorithm is verified under the real network, cooperative network and artificial network, and the IMCS algorithm has a better effect than IEIR and Degree algorithms in most networks under the IC model.
Multi-turn conversation understanding is a major challenge for building intelligent dialogue systems. This work focuses on retrieval-based response matching for multi-turn conversation whose related work simply concat...
详细信息
We present a new approach to transfer grasp configurations from prior example objects to novel objects. We assume the novel and example objects have the same topology and similar shapes. We perform 3D segmentation on ...
详细信息
Abstract Separation kernels are fundamental software of safety and security-critical systems, which provide their hosted applications with spatial and temporal separation as well as controlled information flows among ...
详细信息
Abstract Separation kernels are fundamental software of safety and security-critical systems, which provide their hosted applications with spatial and temporal separation as well as controlled information flows among partitions. The application of separation kernels in critical domain demands the correctness of the kernel by formal verification. To the best of our knowledge, there is no survey paper on this topic. This paper presents an overview of formal specification and verification of separation kernels. We first present the back- ground including the concept of separation kernel and the comparisons among different kernels. Then, we survey the state of the art on this topic since 2000. Finally, we summa- rize research work by detailed comparison and discussion.
The dragonfly algorithm was developed in 2016. It is one of the algorithms used by researchers to optimize an extensive series of uses and applications in various areas. At times, it offers superior performance compar...
详细信息
The dragonfly algorithm was developed in 2016. It is one of the algorithms used by researchers to optimize an extensive series of uses and applications in various areas. At times, it offers superior performance compared to the most well-known optimization techniques. However, this algorithm faces several difficulties when it is utilized to enhance complex optimization problems. This work addressed the robustness of the method to solve real-world optimization issues, and its deficiency to improve complex optimization problems. This review paper shows a comprehensive investigation of the dragonfly algorithm in the engineering area. First, an overview of the algorithm is discussed. Besides, we also examined the modifications of the algorithm. The merged forms of this algorithm with different techniques and the modifications that have been done to make the algorithm perform better are addressed. Additionally, a survey on applications in the engineering area that used the dragonfly algorithm is offered. The utilized engineering applications are the applications in the field of mechanical engineering problems, electrical engineering problems, optimal parameters, economic load dispatch, and loss reduction. The algorithm is tested and evaluated against particle swarm optimization algorithm and firefly algorithm. To evaluate the ability of the dragonfly algorithm and other participated algorithms a set of traditional benchmarks (TF1-TF23) were utilized. Moreover, to examine the ability of the algorithm to optimize large-scale optimization problems CEC-C2019 benchmarks were utilized. A comparison is made between the algorithm and other metaheuristic techniques to show its ability to enhance various problems. The outcomes of the algorithm from the works that utilized the dragonfly algorithm previously and the outcomes of the benchmark test functions proved that in comparison with participated algorithms (GWO, PSO, and GA), the dragonfly algorithm owns an excellent performance,
The popularity of blockchain technology continues to grow rapidly in both industrial and academic fields. Most studies of blockchain focus on the improvements of security, usability, or efficiency of blockchain protoc...
详细信息
暂无评论