Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (108)
  • Open Access

    ARTICLE

    A Chaotic Oppositional Whale Optimisation Algorithm with Firefly Search for Medical Diagnostics

    Milan Tair1, Nebojsa Bacanin1, Miodrag Zivkovic1, K. Venkatachalam2,*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 959-982, 2022, DOI:10.32604/cmc.2022.024989 - 24 February 2022

    Abstract There is a growing interest in the study development of artificial intelligence and machine learning, especially regarding the support vector machine pattern classification method. This study proposes an enhanced implementation of the well-known whale optimisation algorithm, which combines chaotic and opposition-based learning strategies, which is adopted for hyper-parameter optimisation and feature selection machine learning challenges. The whale optimisation algorithm is a relatively recent addition to the group of swarm intelligence algorithms commonly used for optimisation. The Proposed improved whale optimisation algorithm was first tested for standard unconstrained CEC2017 benchmark suite and it was later adapted More >

  • Open Access

    ARTICLE

    An Investigation into the Behavior of Non-Isodense Particles in Chaotic Thermovibrational Flow

    Georgie Crewdson, Marcello Lappa*

    FDMP-Fluid Dynamics & Materials Processing, Vol.18, No.3, pp. 497-510, 2022, DOI:10.32604/fdmp.2022.020248 - 22 February 2022

    Abstract The ability to control the distribution of particles in a fluid is generally regarded as a factor of great importance in a variety of fields (manufacturing processes, biomedical applications, materials engineering and various particle separation processes, to cite a few). The present study considers the hitherto not yet addressed situation in which solid spherical particles are dispersed in a non-isothermal fluid undergoing turbulent vibrationally-induced convection (chaotic thermovibrational flow in a square cavity due to vibrations perpendicular to the imposed temperature difference). Although the possibility to use laminar thermovibrational flows (in microgravity) and turbulent flows of More >

  • Open Access

    ARTICLE

    SBOOSP for Massive Devices in 5G WSNs Using Conformable Chaotic Maps

    Chandrashekhar Meshram1,*, Agbotiname Lucky Imoize2,3, Sajjad Shaukat Jamal4, Amer Aljaedi5, Adel R. Alharbi5

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4591-4608, 2022, DOI:10.32604/cmc.2022.022642 - 14 January 2022

    Abstract The commercialization of the fifth-generation (5G) wireless network has begun. Massive devices are being integrated into 5G-enabled wireless sensor networks (5G WSNs) to deliver a variety of valuable services to network users. However, there are rising fears that 5G WSNs will expose sensitive user data to new security vulnerabilities. For secure end-to-end communication, key agreement and user authentication have been proposed. However, when billions of massive devices are networked to collect and analyze complex user data, more stringent security approaches are required. Data integrity, non-repudiation, and authentication necessitate special-purpose subtree-based signature mechanisms that are pretty… More >

  • Open Access

    ARTICLE

    Chaotic Whale Optimized Fractional Order PID Controller Design for Desalination Process

    F. Kavin1,*, R. Senthilkumar2

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2789-2806, 2022, DOI:10.32604/cmc.2022.021577 - 07 December 2021

    Abstract The main aim of this work is to design a suitable Fractional Order Proportionl Integral Derivative (FOPID) controller with Chaotic Whale Optimization Algorithm (CWOA) for a RO desalination system. Continuous research on Reverse Osmosis (RO) desalination plants is a promising technique for satisfaction with sustainable and efficient RO plants. This work implements CWOA based FOPID for the simulation of reverse osmosis (RO) desalination process for both servo and regulatory problems. Mathematical modeling is a vital constituent of designing advanced and developed engineering processes, which helps to gain a deep study of processes to predict the… More >

  • Open Access

    ARTICLE

    Similarity Analytic Solutions of a 3D-Fractal Nanofluid Uncoupled System Optimized by a Fractal Symmetric Tangent Function

    Rabha W. Ibrahim1,*, Ahmed M. Ajaj2, Nadia M.G. Al-Saidi3, Dumitru Balean4,5,6

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.1, pp. 221-232, 2022, DOI:10.32604/cmes.2022.018348 - 29 November 2021

    Abstract The science of strategy (game theory) is known as the optimal decision-making of autonomous and challenging players in a strategic background. There are different strategies to complete the optimal decision. One of these strategies is the similarity technique. Similarity technique is a generalization of the symmetric strategy, which depends only on the other approaches employed, which can be formulated by altering diversities. One of these methods is the fractal theory. In this investigation, we present a new method studying the similarity analytic solution (SAS) of a 3D-fractal nanofluid system (FNFS). The dynamic evolution is completely… More >

  • Open Access

    ARTICLE

    Optimal Parameter Estimation of Transmission Line Using Chaotic Initialized Time-Varying PSO Algorithm

    Abdullah Shoukat1, Muhammad Ali Mughal1,*, Saifullah Younus Gondal1, Farhana Umer2, Tahir Ejaz3, Ashiq Hussain1

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 269-285, 2022, DOI:10.32604/cmc.2022.021575 - 03 November 2021

    Abstract Transmission line is a vital part of the power system that connects two major points, the generation, and the distribution. For an efficient design, stable control, and steady operation of the power system, adequate knowledge of the transmission line parameters resistance, inductance, capacitance, and conductance is of great importance. These parameters are essential for transmission network expansion planning in which a new parallel line is needed to be installed due to increased load demand or the overhead line is replaced with an underground cable. This paper presents a method to optimally estimate the parameters using… More >

  • Open Access

    ARTICLE

    Efficient Key Management System Based Lightweight Devices in IoT

    T. Chindrella Priyadharshini1,*, D. Mohana Geetha2

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1793-1808, 2022, DOI:10.32604/iasc.2022.020422 - 09 October 2021

    Abstract The Internet of Things (IoT) has changed our lives significantly. Although IoT provides new opportunities, security remains a key concern while providing various services. Existing research methodologies try to solve the security and time-consuming problem also exists. To solve those problems, this paper proposed a Hashed Advanced Encryption Standard (HAES) algorithm based efficient key management system for internet-based lightweight devices in IoT networks. The proposed method is mainly divided into two phases namely Data Owner (DO) and Data User (DU) phase. The DO phase consists of two processes namely authentication and secure data uploading. In… More >

  • Open Access

    ARTICLE

    A Modified Search and Rescue Optimization Based Node Localization Technique in WSN

    Suma Sira Jacob1,*, K. Muthumayil2, M. Kavitha3, Lijo Jacob Varghese4, M. Ilayaraja5, Irina V. Pustokhina6, Denis A. Pustokhin7

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1229-1245, 2022, DOI:10.32604/cmc.2022.019019 - 07 September 2021

    Abstract Wireless sensor network (WSN) is an emerging technology which find useful in several application areas such as healthcare, environmental monitoring, border surveillance, etc. Several issues that exist in the designing of WSN are node localization, coverage, energy efficiency, security, and so on. In spite of the issues, node localization is considered an important issue, which intends to calculate the coordinate points of unknown nodes with the assistance of anchors. The efficiency of the WSN can be considerably influenced by the node localization accuracy. Therefore, this paper presents a modified search and rescue optimization based node… More >

  • Open Access

    ARTICLE

    Double Encryption Using Trigonometric Chaotic Map and XOR of an Image

    Orawit Thinnukool1, Thammarat Panityakul2, Mahwish Bano3,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3033-3046, 2021, DOI:10.32604/cmc.2021.019153 - 24 August 2021

    Abstract In the most recent decades, a major number of image encryption plans have been proposed. The vast majority of these plans reached a high-security level; however, their moderate speeds because of their complicated processes made them of no use in real-time applications. Inspired by this, we propose another efficient and rapid image encryption plan dependent on the Trigonometric chaotic guide. In contrast to the most of current plans, we utilize this basic map to create just a couple of arbitrary rows and columns. Moreover, to additionally speed up, we raise the processing unit from the More >

  • Open Access

    ARTICLE

    Applying and Comparison of Chaotic-Based Permutation Algorithms for Audio Encryption

    Osama M. Abu Zaid1,*, Medhat A. Tawfeek2,3, Saad Alanazi2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3161-3176, 2021, DOI:10.32604/cmc.2021.015175 - 01 March 2021

    Abstract This research presents, and clarifies the application of two permutation algorithms, based on chaotic map systems, and applied to a file of speech signals. They are the Arnold cat map-based permutation algorithm, and the Baker’s chaotic map-based permutation algorithm. Both algorithms are implemented on the same speech signal sample. Then, both the premier and the encrypted file histograms are documented and plotted. The speech signal amplitude values with time signals of the original file are recorded and plotted against the encrypted and decrypted files. Furthermore, the original file is plotted against the encrypted file, using… More >

Displaying 81-90 on page 9 of 108. Per Page