gaussian mutation
Recently Published Documents


TOTAL DOCUMENTS

59
(FIVE YEARS 18)

H-INDEX

9
(FIVE YEARS 3)

2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Shengfen Wang ◽  
Wei Hu ◽  
Yuan Lei

The current college English online teaching mode is mainly based on the traditional online MOOC teaching, which has some problems such as poor interaction. Under the mixed background, this paper studies the online college English teaching model based on the Gaussian mutation genetic algorithm and neural network algorithm. Firstly, it briefly introduces the general situation of network English teaching and the hybrid application of the Gaussian mutation genetic algorithm. Through the investigation and test analysis of students before and after class, the experiment evaluates students’ network teaching quality in many aspects. On this basis, a better teaching quality evaluation model is proposed. Finally, the practical application shows that the model in this paper is very feasible. In the end, students have higher enthusiasm and seriousness in the hybrid context of college English online teaching based on the dual algorithm. English teaching quality can make use of each student’s test scores in English classroom. This paper realizes the overall teaching through real-time dynamic tracking. Quantitative indicators are used to sort the influence degree of English classroom teaching indicators, which can effectively evaluate the quality of English classroom teaching.


2021 ◽  
Vol 11 (12) ◽  
pp. 2883-2890
Author(s):  
D. J. Joel Devadass Daniel ◽  
S. Ebenezer Juliet

The fast-growing Internet of Things (IoT) paradigm can be referred to be the interconnection of physical things or human beings along with the digital electronics devices, Softwares to exchange data with centralized systems through the defined communication infrastructures. Moreover, it provides better opportunities for the direct connection between the physical world and computer-based systems. Nevertheless, the security of data transmission through IoMT (Internet of Medical Things) is the biggest challenge. Hence to provide better security we proposed a novel method known as, Fuzzy based Adaptive Gaussian Mutation based Sine Cosine Optimization approach to ensure security and Quality of Service (QoS) by exploiting the Mutual authentication mechanism. Moreover, an adaptive Gaussian mutation-based SCO algorithm is exploited for cluster formulation of IoMT nodes. The Intuitionistic fuzzy based weight estimation is made for the selection of CH and effective routing. Our proposed work is compared to several recent works. From the performance analysis and evaluation, we conclude that the proposed work outperforms all the existing works and provides better QoS and security.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Weiming Xing ◽  
Jian Zhang ◽  
Quan Zou ◽  
Jun Lin

With the continuous application of the art industry in various fields, more and more people choose to systematically learn the knowledge of the art industry. In the art major, image painting is one of the important contents of the art major. How to improve students’ aesthetic quality and comprehensive professional quality is studied, in which the content learning of image painting art is the key. Therefore, we have carried out technical exploration and result analysis based on Gaussian mutation genetic algorithm to optimize the application of neural network in image painting art teaching. We use Gaussian mutation genetic algorithm to study the neural network optimized teaching cloud platform technology. Compared with the traditional algorithm, the algorithm proposed in this paper has more funny computational efficiency, being able to comprehensively evaluate and improve students’ aesthetic quality and comprehensive professional quality. Gaussian mutation genetic algorithm can effectively improve the knowledge search ability of the platform and the running speed of the teaching platform. In the future research in the field of art industry, neural network will optimize the teaching cloud platform technology, which has laid a solid foundation for improving students’ aesthetic quality and comprehensive professional quality.


Author(s):  
Yuxian Duan ◽  
Changyun Liu ◽  
Song Li ◽  
Xiangke Guo ◽  
Chunlin Yang

AbstractThe elephant herding optimization (EHO) algorithm is a novel metaheuristic optimizer inspired by the clan renewal and separation behaviors of elephant populations. Although it has few parameters and is easy to implement, it suffers from a lack of exploitation, leading to slow convergence. This paper proposes an improved EHO algorithm called manta ray foraging and Gaussian mutation-based EHO for global optimization (MGEHO). The clan updating operator in the original EHO algorithm is replaced by the somersault foraging strategy of manta rays, which aims to optimally adjust patriarch positions. Additionally, a dynamic convergence factor is set to balance exploration and exploitation. The gaussian mutation is adopted to enhance the population diversity, enabling MGEHO to maintain a strong local search capability. To evaluate the performances of different algorithms, 33 classical benchmark functions are chosen to verify the superiority of MGEHO. Also, the enhanced paradigm is compared with other advanced metaheuristic algorithms on 32 benchmark functions from IEEE CEC2014 and CEC2017. Furthermore, a scalability test, convergence analysis, statistical analysis, diversity analysis, and running time analysis demonstrate the effectiveness of MGEHO from various aspects. The results illustrate that MGEHO is superior to other algorithms in terms of solution accuracy and stability. Finally, MGEHO is applied to solve three real engineering problems. The comparison results show that this method is a powerful auxiliary tool for handling complex problems.


2021 ◽  
Author(s):  
K Anand ◽  
A. Vijayaraj ◽  
M. Vijay Anand

Abstract The necessity of security in the cloud system increases day by day in which the data controllers harvest the rising personal and sensitive data volume.The cloud has some unprotected private data as well as data that has been outsourced for public access, which is crucial for cloud security statements. An advanced legal data protection constraint is required due to the resultant of repeated data violations. While dealing with sensitive data, most of the existing techniques failed to handle optimal privacy and different studies were performed to take on cloud privacy preservation. Hence, the novel model of privacy preservation in the cloud and artificial intelligence (AI) techniques were used to tackle these challenges. These AI methods are insight-driven, strategic, and more efficient organizations in cloud computing. However, the cost savings, agility, higher flexibility businesses are offered with cloud computing by data hosting. Data cleansing and restoration are the two major steps involved in the proposed privacy replica. In this study, we proposed Chaotic chemotaxis and Gaussian mutation-based Bacterial Foraging Optimization with genetic crossover operation (CGBFO- GC) algorithm for optimal key generation. Deriving the multi-objective function parameters namely data preservation ratio, hiding ratio, and modification degree that accomplishes optimal key generation using CGBFO- GC algorithm. Ultimately, the proposed CGBFO- GC algorithm provides more efficient performance results in terms of cloud security than an existing method such as SAS-DPSO, CDNNCS, J-SSO, and GC.


2020 ◽  
Vol 86 ◽  
pp. 74-91
Author(s):  
Xinming Zhang ◽  
Doudou Wang ◽  
Zihao Fu ◽  
Shangwang Liu ◽  
Wentao Mao ◽  
...  

2020 ◽  
pp. 106425 ◽  
Author(s):  
Shiming Song ◽  
Pengjun Wang ◽  
Ali Asghar Heidari ◽  
Mingjing Wang ◽  
Xuehua Zhao ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document