Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    ARTICLE

    A New Flower Pollination Algorithm Strategy for MPPT of Partially Shaded Photovoltaic Arrays

    Muhannad J. Alshareef*

    Intelligent Automation & Soft Computing, Vol.38, No.3, pp. 297-313, 2023, DOI:10.32604/iasc.2023.046722

    Abstract Photovoltaic (PV) systems utilize maximum power point tracking (MPPT) controllers to optimize power output amidst varying environmental conditions. However, the presence of multiple peaks resulting from partial shading poses a challenge to the tracking operation. Under partial shade conditions, the global maximum power point (GMPP) may be missed by most traditional maximum power point tracker. The flower pollination algorithm (FPA) and particle swarm optimization (PSO) are two examples of metaheuristic techniques that can be used to solve the issue of failing to track the GMPP. This paper discusses and resolves all issues associated with using the standard FPA method as… More >

  • Open Access

    ARTICLE

    Feature Selection for Detecting ICMPv6-Based DDoS Attacks Using Binary Flower Pollination Algorithm

    Adnan Hasan Bdair Aighuraibawi1,2, Selvakumar Manickam1,*, Rosni Abdullah3, Zaid Abdi Alkareem Alyasseri4,5, Ayman Khallel6, Dilovan Asaad Zebari9, Hussam Mohammed Jasim7, Mazin Mohammed Abed8, Zainb Hussein Arif7

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 553-574, 2023, DOI:10.32604/csse.2023.037948

    Abstract Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system… More >

  • Open Access

    ARTICLE

    Improved Monarchy Butterfly Optimization Algorithm (IMBO): Intrusion Detection Using Mapreduce Framework Based Optimized ANU-Net

    Kunda Suresh Babu, Yamarthi Narasimha Rao*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5887-5909, 2023, DOI:10.32604/cmc.2023.037486

    Abstract The demand for cybersecurity is rising recently due to the rapid improvement of network technologies. As a primary defense mechanism, an intrusion detection system (IDS) was anticipated to adapt and secure computing infrastructures from the constantly evolving, sophisticated threat landscape. Recently, various deep learning methods have been put forth; however, these methods struggle to recognize all forms of assaults, especially infrequent attacks, because of network traffic imbalances and a shortage of aberrant traffic samples for model training. This work introduces deep learning (DL) based Attention based Nested U-Net (ANU-Net) for intrusion detection to address these issues and enhance detection performance.… More >

  • Open Access

    ARTICLE

    Selective Harmonics Elimination Technique for Artificial Bee Colony Implementation

    T. DeepikaVinothini1,*, R. Karthigaivel2, J. BarsanaBanu3

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2721-2740, 2023, DOI:10.32604/csse.2023.028662

    Abstract In this research, an Artificial Bee Colony (ABC) algorithm based Selective Harmonics Elimination (SHE) technique is used as a pulse generator in a reduced switch fifteen level inverter that receives input from a PV system. Pulse width modulation based on Selective Harmonics Elimination is mostly used to suppress lower-order harmonics. A high gain DC-DC-SEPIC converter keeps the photovoltaic (PV) panel’s output voltage constant. The Grey Wolf Optimization (GWO) filter removes far more Photovoltaic panel energy from the sunlight frame. To eliminate voltage harmonics, this unique inverter architecture employs a multi-carrier duty cycle, a high-frequency modulation approach. The proposed ABC harmonics… More >

  • Open Access

    ARTICLE

    Flower Pollination Heuristics for Parameter Estimation of Electromagnetic Plane Waves

    Sadiq Akbar1, Muhammad Asif Zahoor Raja2,*, Naveed Ishtiaq Chaudhary3, Fawad Zaman4, Hani Alquhayz5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2529-2543, 2021, DOI:10.32604/cmc.2021.016097

    Abstract For the last few decades, the parameter estimation of electromagnetic plane waves i.e., far field sources, impinging on antenna array geometries has attracted a lot of researchers due to their use in radar, sonar and under water acoustic environments. In this work, nature inspired heuristics based on the flower pollination algorithm (FPA) is designed for the estimation problem of amplitude and direction of arrival of far field sources impinging on uniform linear array (ULA). Using the approximation in mean squared error sense, a fitness function of the problem is developed and the strength of the FPA is utilized for optimization… More >

  • Open Access

    ARTICLE

    A Machine Learning Based Algorithm to Process Partial Shading Effects in PV Arrays

    Kamran Sadiq Awan1, Tahir Mahmood1, Mohammad Shorfuzzaman2, Rashid Ali3, Raja Majid Mehmood4,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 29-43, 2021, DOI:10.32604/cmc.2021.014824

    Abstract Solar energy is a widely used type of renewable energy. Photovoltaic arrays are used to harvest solar energy. The major goal, in harvesting the maximum possible power, is to operate the system at its maximum power point (MPP). If the irradiation conditions are uniform, the P-V curve of the PV array has only one peak that is called its MPP. But when the irradiation conditions are non-uniform, the P-V curve has multiple peaks. Each peak represents an MPP for a specific irradiation condition. The highest of all the peaks is called Global Maximum Power Point (GMPP). Under uniform irradiation conditions,… More >

  • Open Access

    ARTICLE

    Flower Pollination Heuristics for Nonlinear Active Noise Control Systems

    Wasim Ullah Khan1,*, Yigang He1, Muhammad Asif Zahoor Raja2, Naveed Ishtiaq Chaudhary3, Zeshan Aslam Khan3, Syed Muslim Shah4

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 815-834, 2021, DOI:10.32604/cmc.2021.014674

    Abstract Abstract In this paper, a novel design of the flower pollination algorithm is presented for model identification problems in nonlinear active noise control systems. The recently introduced flower pollination based heuristics is implemented to minimize the mean squared error based merit/cost function representing the scenarios of active noise control system with linear/nonlinear and primary/secondary paths based on the sinusoidal signal, random and complex random signals as noise interferences. The flower pollination heuristics based active noise controllers are formulated through exploitation of nonlinear filtering with Volterra series. The comparative study on statistical observations in terms of accuracy, convergence and complexity measures… More >

  • Open Access

    ARTICLE

    Localization Based Evolutionary Routing (LOBER) for Efficient Aggregation in Wireless Multimedia Sensor Networks

    Ashwinth Janarthanan1,*, Dhananjay Kumar1

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 895-912, 2019, DOI:10.32604/cmc.2019.06805

    Abstract Efficient aggregation in wireless sensor nodes helps reduce network traffic and reduce energy consumption. The objective of this work Localization Based Evolutionary Routing (LOBER) is to achieve global optimization for aggregation and WMSN lifetime. Improved localization is achieved by a novel Centroid Based Octant Localization (CBOL) technique considering an arbitrary hexagonal region. Geometric principles of hexagon are used to locate the unknown nodes in the centroid positions of partitioned regions. Flower pollination algorithm, a meta heuristic evolutionary algorithm that is extensively applied in solving real life, complex and nonlinear optimization problems in engineering and industry is modified as Enhanced Flower… More >

Displaying 1-10 on page 1 of 8. Per Page