Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (33)
  • Open Access

    ARTICLE

    Fuzzy-Based Secure Clustering with Routing Technique for VANETs

    T. S. Balaji1,2, S. Srinivasan3,*, S. Prasanna Bharathi4, B. Ramesh5

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 291-304, 2022, DOI:10.32604/csse.2022.023269 - 23 March 2022

    Abstract Due to the advanced developments in communication technologies, Internet of vehicles and vehicular adhoc networks (VANET) offers numerous opportunities for effectively managing transportation problems. On the other, the cloud environment needs to disseminate the emergency message to the vehicles which are consistently distributed on the roadway so that every vehicle gets the messages from closer vehicles in a straightforward way. To resolve this issue, clustering and routing techniques can be designed using computational intelligence approaches. With this motivation, this paper presents a new type-2 fuzzy sets based clustering with metaheuristic optimization based routing (T2FSC-MOR) technique… More >

  • Open Access

    ARTICLE

    Annealing Harmony Search Algorithm to Solve the Nurse Rostering Problem

    Mohammed Hadwan1,2,3,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5545-5559, 2022, DOI:10.32604/cmc.2022.024512 - 14 January 2022

    Abstract A real-life problem is the rostering of nurses at hospitals. It is a famous nondeterministic, polynomial time (NP) -hard combinatorial optimization problem. Handling the real-world nurse rostering problem (NRP) constraints in distributing workload equally between available nurses is still a difficult task to achieve. The international shortage of nurses, in addition to the spread of COVID-19, has made it more difficult to provide convenient rosters for nurses. Based on the literature, heuristic-based methods are the most commonly used methods to solve the NRP due to its computational complexity, especially for large rosters. Heuristic-based algorithms in… More >

  • Open Access

    ARTICLE

    Gaining-Sharing Knowledge Based Algorithm for Solving Stochastic Programming Problems

    Prachi Agrawal1, Khalid Alnowibet2, Ali Wagdy Mohamed3,4,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2847-2868, 2022, DOI:10.32604/cmc.2022.023126 - 07 December 2021

    Abstract This paper presents a novel application of metaheuristic algorithms for solving stochastic programming problems using a recently developed gaining sharing knowledge based optimization (GSK) algorithm. The algorithm is based on human behavior in which people gain and share their knowledge with others. Different types of stochastic fractional programming problems are considered in this study. The augmented Lagrangian method (ALM) is used to handle these constrained optimization problems by converting them into unconstrained optimization problems. Three examples from the literature are considered and transformed into their deterministic form using the chance-constrained technique. The transformed problems are More >

  • Open Access

    ARTICLE

    Reactions’ Descriptors Selection and Yield Estimation Using Metaheuristic Algorithms and Voting Ensemble

    Olutomilayo Olayemi Petinrin1, Faisal Saeed2, Xiangtao Li1, Fahad Ghabban2, Ka-Chun Wong1,3,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4745-4762, 2022, DOI:10.32604/cmc.2022.020523 - 11 October 2021

    Abstract Bioactive compounds in plants, which can be synthesized using N-arylation methods such as the Buchwald-Hartwig reaction, are essential in drug discovery for their pharmacological effects. Important descriptors are necessary for the estimation of yields in these reactions. This study explores ten metaheuristic algorithms for descriptor selection and model a voting ensemble for evaluation. The algorithms were evaluated based on computational time and the number of selected descriptors. Analyses show that robust performance is obtained with more descriptors, compared to cases where fewer descriptors are selected. The essential descriptor was deduced based on the frequency of More >

  • Open Access

    ARTICLE

    Multi-Objective Adapted Binary Bat for Test Suite Reduction

    Nagwa Reda1, Abeer Hamdy2,*, Essam A. Rashed1,3

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 781-797, 2022, DOI:10.32604/iasc.2022.019669 - 22 September 2021

    Abstract Regression testing is an essential quality test technique during the maintenance phase of the software. It is executed to ensure the validity of the software after any modification. As software evolves, the test suite expands and may become too large to be executed entirely within a limited testing budget and/or time. So, to reduce the cost of regression testing, it is mandatory to reduce the size of the test suite by discarding the redundant test cases and selecting the most representative ones that do not compromise the effectiveness of the test suite in terms of… More >

  • Open Access

    ARTICLE

    A survey on the Metaheuristics for Cryptanalysis of Substitution and Transposition Ciphers

    Arkan Kh Shakr Sabonchi*, Bahriye Akay

    Computer Systems Science and Engineering, Vol.39, No.1, pp. 87-106, 2021, DOI:10.32604/csse.2021.05365 - 10 June 2021

    Abstract This paper presents state-of-art cryptanalysis studies on attacks of the substitution and transposition ciphers using various metaheuristic algorithms. Traditional cryptanalysis methods employ an exhaustive search, which is computationally expensive. Therefore, metaheuristics have attracted the interest of researchers in the cryptanalysis field. Metaheuristic algorithms are known for improving the search for the optimum solution and include Genetic Algorithm, Simulated Annealing, Tabu Search, Particle Swarm Optimization, Differential Evolution, Ant Colony, the Artificial Bee Colony, Cuckoo Search, and Firefly algorithms. The most important part of these various applications is deciding the fitness function to guide the search. This More >

  • Open Access

    ARTICLE

    A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System

    Omar Almomani*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 409-429, 2021, DOI:10.32604/cmc.2021.016113 - 22 March 2021

    Abstract Network Intrusion Detection System (IDS) aims to maintain computer network security by detecting several forms of attacks and unauthorized uses of applications which often can not be detected by firewalls. The features selection approach plays an important role in constructing effective network IDS. Various bio-inspired metaheuristic algorithms used to reduce features to classify network traffic as abnormal or normal traffic within a shorter duration and showing more accuracy. Therefore, this paper aims to propose a hybrid model for network IDS based on hybridization bio-inspired metaheuristic algorithms to detect the generic attack. The proposed model has… More >

  • Open Access

    ARTICLE

    Application of Metaheuristic Algorithms for Optimizing Longitudinal Square Porous Fins

    Samer H. Atawneh1, Waqar A. Khan2, Nawaf N. Hamadneh3,*, Adeeb M. Alhomoud3

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 73-87, 2021, DOI:10.32604/cmc.2021.012351 - 12 January 2021

    Abstract The objectives of this study involve the optimization of longitudinal porous fins of square cross-section using metaheuristic algorithms. A generalized nonlinear ordinary differential equation is derived using Darcy and Fourier’s laws in the energy balance around a control volume and is solved numerically using RFK 45 method. The temperature of the base surface is higher than the fin surface, and the fin tip is kept adiabatic or cooled by convection heat transfer. The other pertinent parameters include Rayleigh number (100 ≤ Ra ≤ 104), Darcy number, (10−4 ≤ Da ≤ 10−2), relative thermal conductivity ratio of solid phase to fluid (1000 ≤ kr ≤ 8000), Nusselt number (10 ≤ Nu ≤ 100), More >

  • Open Access

    ARTICLE

    IWD-Miner: A Novel Metaheuristic Algorithm for Medical Data Classification

    Sarab AlMuhaideb*, Reem BinGhannam, Nourah Alhelal, Shatha Alduheshi, Fatimah Alkhamees, Raghad Alsuhaibani

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1329-1346, 2021, DOI:10.32604/cmc.2020.013576 - 26 November 2020

    Abstract Medical data classification (MDC) refers to the application of classification methods on medical datasets. This work focuses on applying a classification task to medical datasets related to specific diseases in order to predict the associated diagnosis or prognosis. To gain experts’ trust, the prediction and the reasoning behind it are equally important. Accordingly, we confine our research to learn rule-based models because they are transparent and comprehensible. One approach to MDC involves the use of metaheuristic (MH) algorithms. Here we report on the development and testing of a novel MH algorithm: IWD-Miner. This algorithm can… More >

  • Open Access

    ARTICLE

    Systematic Procedure for Optimal Controller Implementation Using Metaheuristic Algorithms

    Viorel Minzu*, Adrian Serbencu

    Intelligent Automation & Soft Computing, Vol.26, No.4, pp. 663-677, 2020, DOI:10.32604/iasc.2020.010101

    Abstract The idea for this work starts from the situation in which a metaheuristic-based algorithm has already been developed in order to solve an optimal control problem. This algorithm yields an offline "optimal" solution. On the other hand, the Receding Horizon Control (RHC) structure can be implemented if a process model is available. This work underlines some of the practical aspects of joining the RHC to an existing metaheuristic-based algorithm in order to obtain a closed-loop control structure that can be further used in real-time control. The result is a systematic procedure that integrates a given More >

Displaying 21-30 on page 3 of 33. Per Page