Joint optimization of mission abort and system structure considering dynamic tasks

X Zhao, H Liu, Y Wu, Q Qiu - Reliability Engineering & System Safety, 2023 - Elsevier
Mission abort has recently attracted considerable attention to enhance the safety of critical
systems during the primary mission (PM). Most of the existing research focuses on mission …

Metaheuristic evolutionary algorithms: Types, applications, future directions, and challenges

S Kavita, SK Shinde - 2023 3rd International Conference on …, 2023 - ieeexplore.ieee.org
Metaheuristic optimization methods are widely used to solve complex optimization problems
in various fields such as engineering, finance, and logistics. Evolutionary Algorithms (EAs) …

A survey on automatic delineation of radiotherapy target volume based on machine learning

Z Tao, S Lyu - Data Intelligence, 2023 - direct.mit.edu
Radiotherapy is one of the main treatment methods for cancer, and the delineation of the
radiotherapy target area is the basis and premise of precise treatment. Artificial intelligence …

Query-efficient generation of adversarial examples for defensive dnns via multiobjective optimization

W Jiang, S You, J Zhan, X Wang, H Lei… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Due to the inherent vulnerability of deep neural networks (DNNs), the adversarial example
(AE) attack has become a serious threat to intelligent systems, eg, the failure cause of an …

Optimal searching time allocation for information collection under cooperative path planning of multiple UAVs

Y Li, L Liu, J Wu, M Wang, H Zhou… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) play an essential role in information collection where
routing and time scheduling are two critical factors and are considered sequently. Given the …

DESCO: Decomposition-based co-design to improve fault tolerance of security-critical tasks in cyber physical systems

W Jiang, X Liao, J Zhan, D Adhikari… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Confidentiality-Specific Faults (CSFs) will put cyber physical systems in threat, since they
can result in corrupted information or even retrieve the cryptographic key of security-critical …

Faulty processor identification for a multiprocessor system under the Malek model using an improved binary bat algorithm

W Gui, F Pan, D Zhu, F Li - The Journal of Supercomputing, 2023 - Springer
A multiprocessor system should be able to identify and eliminate faults in time to avoid the
paralysis of a whole system. This paper proposes an improved binary bat algorithm to …

Parallel Multi-Objective Bayesian Optimization Framework for CGRA Microarchitecture

B Li, W Sun, X Ni, K He, Q Xu, S Chen… - … Design, Automation & …, 2024 - ieeexplore.ieee.org
Recently, due to the flexibility and reconfigurability of Coarse-Grained Reconfigurable
Architecture (CGRA), CGRA microarchitecture has become an inevitable trend to accelerate …

Efficient 3-D Processor Array Reconfiguration Algorithms Based on Bucket Effect

H Ding, Y He, Z Zhai, Z Li, J Qian… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the progressive augmentation of the density of 3-D processor arrays, some processor
elements (PEs) often fail due to overload or overheating during massively parallel …

Cooperative coevolution-based design space exploration for multi-mode dataflow map**

B Yuan, X Lu, K Tang, X Yao - ACM Transactions on Embedded …, 2021 - dl.acm.org
Some signal processing and multimedia applications can be specified by synchronous
dataflow (SDF) models. The problem of SDF map** to a given set of heterogeneous …