Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (145)
  • Open Access

    ARTICLE

    A Hybrid Harmony Search–Nondominated Sorting Approach for Cost-Efficient and Deadline-Aware Fog-Enabled IoT Placement

    Zahra Farhadpour1,*, Tan Fong Ang1,*, Chee Sun Liew2

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076163 - 09 April 2026

    Abstract The heterogeneity and dynamic behavior of fog computing environments introduce major challenges to achieving optimal application placement. Limited fog resources and varying workloads often necessitate offloading applications beyond their local clusters, making it difficult to maintain the required level of service quality under varying conditions. In this context, placement methods must ensure a balanced trade-off between multiple objectives, such as time and cost, while maintaining reliable adherence to constraints like application deadlines and limited fog-node memory. Existing solutions, including heuristic, metaheuristic, learning-based, and hybrid optimization approaches, have been proposed to address these challenges. However, many… More >

  • Open Access

    ARTICLE

    EB-Guided Optimization of Heliostat Fields with Validated Projection Losses and HFLCAL Sensitivity

    Zichang Meng, Na Chen, Qi Li, Qingyi Liu, Hongfei Jiang*

    Energy Engineering, Vol.123, No.4, 2026, DOI:10.32604/ee.2025.072848 - 27 March 2026

    Abstract Heliostat field design for tower solar thermal plants must jointly address solar geometry, optical losses, and layout optimization under engineering constraints. We develop an end-to-end workflow that (i) adopts a consistent East–North–Up (ENU) convention for all plant- and sun-related vectors; (ii) integrates cosine efficiency, projection-based shading and blocking (SB), atmospheric transmittance, and an HFLCAL (heliostat field local calculation) truncation model into a single optical chain; and (iii) couples an Eliminate-Blocking (EB) layout prior with an improved “Cheetah” metaheuristic to search ring topology, mirror sizes, and heights while enforcing spacing, kinematics, and rated-power requirements. Projection-based SB… More >

  • Open Access

    ARTICLE

    A Novel Hybrid Sine Cosine-Flower Pollination Algorithm for Optimized Feature Selection

    Sumbul Azeem1, Shazia Javed1,*, Farheen Ibraheem2, Uzma Bashir1, Nazar Waheed3, Khursheed Aurangzeb4

    CMC-Computers, Materials & Continua, Vol.87, No.2, 2026, DOI:10.32604/cmc.2026.071977 - 12 March 2026

    Abstract Data serves as the foundation for training and testing machine learning and artificial intelligence models. The most fundamental part of data is its attributes or features. The feature set size changes from one dataset to another. Only the relevant features contribute meaningfully to classification accuracy. The presence of irrelevant features reduces the system’s effectiveness. Classification performance often deteriorates on high-dimensional datasets due to the large search space. Thus, one of the significant obstacles affecting the performance of the learning process in the majority of machine learning and data mining techniques is the dimensionality of the… More >

  • Open Access

    ARTICLE

    Optimal Structure Determination for Composite Laminates Using Particle Swarm Optimization and Machine Learning

    Viorel Mînzu1,*, Iulian Arama2

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2026.075619 - 10 February 2026

    Abstract This work addresses optimality aspects related to composite laminates having layers with different orientations. Regression Neural Networks can model the mechanical behavior of these laminates, specifically the stress-strain relationship. If this model has strong generalization ability, it can be coupled with a metaheuristic algorithm–the PSO algorithm used in this article–to address an optimization problem (OP) related to the orientations of composite laminates. To solve OPs, this paper proposes an optimization framework (OFW) that connects the two components, the optimal solution search mechanism and the RNN model. The OFW has two modules: the search mechanism (Adaptive… More >

  • Open Access

    ARTICLE

    Cooperative Metaheuristics with Dynamic Dimension Reduction for High-Dimensional Optimization Problems

    Junxiang Li1,2, Zhipeng Dong2, Ben Han3, Jianqiao Chen3, Xinxin Zhang1,2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-19, 2026, DOI:10.32604/cmc.2025.070816 - 10 November 2025

    Abstract Owing to their global search capabilities and gradient-free operation, metaheuristic algorithms are widely applied to a wide range of optimization problems. However, their computational demands become prohibitive when tackling high-dimensional optimization challenges. To effectively address these challenges, this study introduces cooperative metaheuristics integrating dynamic dimension reduction (DR). Building upon particle swarm optimization (PSO) and differential evolution (DE), the proposed cooperative methods C-PSO and C-DE are developed. In the proposed methods, the modified principal components analysis (PCA) is utilized to reduce the dimension of design variables, thereby decreasing computational costs. The dynamic DR strategy implements periodic… More >

  • Open Access

    ARTICLE

    Secure and Invisible Dual Watermarking for Digital Content Based on Optimized Octonion Moments and Chaotic Metaheuristics

    Ahmed El Maloufy, Mohamed Amine Tahiri, Ahmed Bencherqui, Hicham Karmouni, Mhamed Sayyouri*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5789-5822, 2025, DOI:10.32604/cmc.2025.068885 - 23 October 2025

    Abstract In the current digital context, safeguarding copyright is a major issue, particularly for architectural drawings produced by students. These works are frequently the result of innovative academic thinking combining creativity and technical precision. They are particularly vulnerable to the risk of illegal reproduction when disseminated in digital format. This research suggests, for the first time, an innovative approach to copyright protection by embedding a double digital watermark to address this challenge. The solution relies on a synergistic fusion of several sophisticated methods: Krawtchouk Optimized Octonion Moments (OKOM), Quaternion Singular Value Decomposition (QSVD), and Discrete Waveform… More >

  • Open Access

    ARTICLE

    Optimizing Microgrid Energy Management via DE-HHO Hybrid Metaheuristics

    Jingrui Liu1,2,*, Zhiwen Hou1,2, Boyu Wang1,2, Tianxiang Yin3,4

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4729-4754, 2025, DOI:10.32604/cmc.2025.066138 - 30 July 2025

    Abstract In response to the increasing global energy demand and environmental pollution, microgrids have emerged as an innovative solution by integrating distributed energy resources (DERs), energy storage systems, and loads to improve energy efficiency and reliability. This study proposes a novel hybrid optimization algorithm, DE-HHO, combining differential evolution (DE) and Harris Hawks optimization (HHO) to address microgrid scheduling issues. The proposed method adopts a multi-objective optimization framework that simultaneously minimizes operational costs and environmental impacts. The DE-HHO algorithm demonstrates significant advantages in convergence speed and global search capability through the analysis of wind, solar, micro-gas turbine, More >

  • Open Access

    REVIEW

    Patterns in Heuristic Optimization Algorithms: A Comprehensive Analysis

    Robertas Damasevicius*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 1493-1538, 2025, DOI:10.32604/cmc.2024.057431 - 17 February 2025

    Abstract Heuristic optimization algorithms have been widely used in solving complex optimization problems in various fields such as engineering, economics, and computer science. These algorithms are designed to find high-quality solutions efficiently by balancing exploration of the search space and exploitation of promising solutions. While heuristic optimization algorithms vary in their specific details, they often exhibit common patterns that are essential to their effectiveness. This paper aims to analyze and explore common patterns in heuristic optimization algorithms. Through a comprehensive review of the literature, we identify the patterns that are commonly observed in these algorithms, including… More >

  • Open Access

    ARTICLE

    African Bison Optimization Algorithm: A New Bio-Inspired Optimizer with Engineering Applications

    Jian Zhao1,2,*, Kang Wang1,2, Jiacun Wang3,*, Xiwang Guo4, Liang Qi5

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 603-623, 2024, DOI:10.32604/cmc.2024.050523 - 15 October 2024

    Abstract This paper introduces the African Bison Optimization (ABO) algorithm, which is based on biological population. ABO is inspired by the survival behaviors of the African bison, including foraging, bathing, jousting, mating, and eliminating. The foraging behavior prompts the bison to seek a richer food source for survival. When bison find a food source, they stick around for a while by bathing behavior. The jousting behavior makes bison stand out in the population, then the winner gets the chance to produce offspring in the mating behavior. The eliminating behavior causes the old or injured bison to More >

  • Open Access

    ARTICLE

    Cyberbullying Sexism Harassment Identification by Metaheurustics-Tuned eXtreme Gradient Boosting

    Milos Dobrojevic1,4, Luka Jovanovic1, Lepa Babic3, Miroslav Cajic5, Tamara Zivkovic6, Miodrag Zivkovic2, Suresh Muthusamy7, Milos Antonijevic2, Nebojsa Bacanin2,4,8,9,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4997-5027, 2024, DOI:10.32604/cmc.2024.054459 - 12 September 2024

    Abstract Cyberbullying is a form of harassment or bullying that takes place online or through digital devices like smartphones, computers, or tablets. It can occur through various channels, such as social media, text messages, online forums, or gaming platforms. Cyberbullying involves using technology to intentionally harm, harass, or intimidate others and may take different forms, including exclusion, doxing, impersonation, harassment, and cyberstalking. Unfortunately, due to the rapid growth of malicious internet users, this social phenomenon is becoming more frequent, and there is a huge need to address this issue. Therefore, the main goal of the research… More >

Displaying 1-10 on page 1 of 145. Per Page