Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (45)
  • Open Access

    ARTICLE

    A Hybrid Scheme for Secure Wireless Communications in IoT

    Muhammad Irshad Nazeer1,2,*, Ghulam Ali Mallah1, Raheel Ahmed Memon2

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 633-648, 2021, DOI:10.32604/iasc.2021.017771 - 16 June 2021

    Abstract Network Coding is a potential technology for the future wireless communications and Internet of Things (IoT) as it reduces the number of transmissions and offers energy efficiency. It is vulnerable to threat and attack that can harm intermediate nodes. Indeed, it exhibits an ability to incorporate security of transmitted data, yet a lot of work needs to be done to provide a safeguard from threats. The purpose of this study is to strengthen the existing Network Coding scheme with a set of generic requirements for Network Coding Protocols by adopting system models and a Genetic… More >

  • Open Access

    ARTICLE

    Parallel Optimization of Program Instructions Using Genetic Algorithms

    Petre Anghelescu*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3293-3310, 2021, DOI:10.32604/cmc.2021.015495 - 01 March 2021

    Abstract This paper describes an efficient solution to parallelize software program instructions, regardless of the programming language in which they are written. We solve the problem of the optimal distribution of a set of instructions on available processors. We propose a genetic algorithm to parallelize computations, using evolution to search the solution space. The stages of our proposed genetic algorithm are: The choice of the initial population and its representation in chromosomes, the crossover, and the mutation operations customized to the problem being dealt with. In this paper, genetic algorithms are applied to the entire search… More >

  • Open Access

    ARTICLE

    Optimal Robust Control for Unstable Delay System

    Rihem Farkh1,2,*, Khaled A. Aljaloud1, Moufida Ksouri2, Faouzi Bouani2

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 307-321, 2021, DOI:10.32604/csse.2021.014334 - 05 January 2021

    Abstract Proportional-Integral-Derivative control system has been widely used in industrial applications. For uncertain and unstable systems, tuning controller parameters to satisfy the process requirements is very challenging. In general, the whole system’s performance strongly depends on the controller’s efficiency and hence the tuning process plays a key role in the system’s response. This paper presents a robust optimal Proportional-Integral-Derivative controller design methodology for the control of unstable delay system with parametric uncertainty using a combination of Kharitonov theorem and genetic algorithm optimization based approaches. In this study, the Generalized Kharitonov Theorem (GKT) for quasi-polynomials is employed… More >

  • Open Access

    ARTICLE

    Motion-Based Activities Monitoring through Biometric Sensors Using Genetic Algorithm

    Mohammed Alshehri1,*, Purushottam Sharma2, Richa Sharma2, Osama Alfarraj3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2525-2538, 2021, DOI:10.32604/cmc.2021.012469 - 28 December 2020

    Abstract Sensors and physical activity evaluation are quite limited for motion-based commercial devices. Sometimes the accelerometer of the smartwatch is utilized; walking is investigated. The combination can perform better in terms of sensors and that can be determined by sensors on both the smartwatch and phones, i.e., accelerometer and gyroscope. For biometric efficiency, some of the diverse activities of daily routine have been evaluated, also with biometric authentication. The result shows that using the different computing techniques in phones and watch for biometric can provide a suitable output based on the mentioned activities. This indicates that… More >

  • Open Access

    ARTICLE

    Kriging Surrogate-Based Genetic Algorithm Optimization for Blade Design of a Horizontal Axis Wind Turbine

    Nantiwat Pholdee1, Sujin Bureerat1, Weerapon Nuantong2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.1, pp. 261-273, 2021, DOI:10.32604/cmes.2021.012349 - 22 December 2020

    Abstract Horizontal axis wind turbines are some of the most widely used clean energy generators in the world. Horizontal axis wind turbine blades need to be designed for optimization in order to maximize efficiency and simultaneously minimize the cost of energy. This work presents the optimization of new MEXICO blades for a horizontal axis wind turbine at the wind speed of 10 m/s. The optimization problem is posed to maximize the power coefficient while the design variables are twist angles on the blade radius and rotating axis positions on a chord length of the airfoils. Computational… More >

  • Open Access

    ARTICLE

    Smart Contract Fuzzing Based on Taint Analysis and Genetic Algorithms

    Zaoyu Wei1,*, Jiaqi Wang2, Xueqi Shen1, Qun Luo1

    Journal of Information Hiding and Privacy Protection, Vol.2, No.1, pp. 35-45, 2020, DOI:10.32604/jihpp.2020.010331 - 15 October 2020

    Abstract Smart contract has greatly improved the services and capabilities of blockchain, but it has become the weakest link of blockchain security because of its code nature. Therefore, efficient vulnerability detection of smart contract is the key to ensure the security of blockchain system. Oriented to Ethereum smart contract, the study solves the problems of redundant input and low coverage in the smart contract fuzz. In this paper, a taint analysis method based on EVM is proposed to reduce the invalid input, a dangerous operation database is designed to identify the dangerous input, and genetic algorithm More >

  • Open Access

    ARTICLE

    Developing an Adaptation Process for Real-Coded Genetic Algorithms

    Ridvan Saraçoğlu*, Ahmet Fatih Kazankaya

    Computer Systems Science and Engineering, Vol.35, No.1, pp. 13-19, 2020, DOI:10.32604/csse.2020.35.013

    Abstract The genetic algorithm (GA) is a metaheuristic method which simulates the life cycle and the survival of the fittest in the nature for solving optimization problems. This study aimed to develop enhanced operation by modifying the current GA. This development process includes an adaptation method that contains certain developments and adds a new process to the classic algorithm. Individuals of a population will be trialed to adapt to the current solution of the problem by taking them separately for each generation. With this adaptation method, it is more likely to get better results in a More >

  • Open Access

    ARTICLE

    A Genetic Algorithm to Solve Capacity Assignment Problem in a Flow Network

    Ahmed Y. Hamed1, Monagi H. Alkinani2, M. R. Hassan3, *

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1579-1586, 2020, DOI:10.32604/cmc.2020.010881 - 30 June 2020

    Abstract Computer networks and power transmission networks are treated as capacitated flow networks. A capacitated flow network may partially fail due to maintenance. Therefore, the capacity of each edge should be optimally assigned to face critical situations—i.e., to keep the network functioning normally in the case of failure at one or more edges. The robust design problem (RDP) in a capacitated flow network is to search for the minimum capacity assignment of each edge such that the network still survived even under the edge’s failure. The RDP is known as NP-hard. Thus, capacity assignment problem subject More >

  • Open Access

    ARTICLE

    Smart Contract Fuzzing Based on Taint Analysis and Genetic Algorithms

    Zaoyu Wei1, *, Jiaqi Wang2, Xueqi Shen1, Qun Luo1

    Journal of Quantum Computing, Vol.2, No.1, pp. 11-24, 2020, DOI:10.32604/jqc.2020.010815 - 28 May 2020

    Abstract Smart contract has greatly improved the services and capabilities of blockchain, but it has become the weakest link of blockchain security because of its code nature. Therefore, efficient vulnerability detection of smart contract is the key to ensure the security of blockchain system. Oriented to Ethereum smart contract, the study solves the problems of redundant input and low coverage in the smart contract fuzz. In this paper, a taint analysis method based on EVM is proposed to reduce the invalid input, a dangerous operation database is designed to identify the dangerous input, and genetic algorithm More >

  • Open Access

    ARTICLE

    A Clustering-based Approach for Balancing and Scheduling Bicycle-sharing Systems

    Imed Kacem, Ahmed Kadri, Pierre Laroche

    Intelligent Automation & Soft Computing, Vol.24, No.2, pp. 421-430, 2018, DOI:10.31209/2018.100000016

    Abstract This paper addresses an inventory regulation problem in bicycle sharingsystems. The problem is to balance a network consisting of a set of stations by using a single vehicle, with the aim of minimizing the weighted sum of the waiting times during which some stations remain imbalanced. Motivated by the complexity of this problem, we propose a two-stage procedure based on decomposition. First, the network is divided into multiple zones by using two different clustering strategies. Then, the balancing problem is solved in each zone. Finally, the order in which the zones must be visited is More >

Displaying 21-30 on page 3 of 45. Per Page