Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    Optimal Scheduling Method of Cogeneration System with Heat Storage Device Based on Memetic Algorithm

    Haibo Li1,*, Yibao Wang1, Xinfu Pang1, Wei Liu1, Xu Zhang2

    Energy Engineering, Vol.120, No.2, pp. 317-343, 2023, DOI:10.32604/ee.2023.023715

    Abstract Electric-heat coupling characteristics of a cogeneration system and the operating mode of fixing electricity with heat are the main reasons for wind abandonment during the heating season in the Three North area. To improve the wind-power absorption capacity and operating economy of the system, the structure of the system is improved by adding a heat storage device and an electric boiler. First, aiming at the minimum operating cost of the system, the optimal scheduling model of the cogeneration system, including a heat storage device and electric boiler, is constructed. Second, according to the characteristics of the problem, a cultural gene… More >

  • Open Access

    ARTICLE

    Vehicle Plate Number Localization Using Memetic Algorithms and Convolutional Neural Networks

    Gibrael Abosamra*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3539-3560, 2023, DOI:10.32604/cmc.2023.032976

    Abstract This paper introduces the third enhanced version of a genetic algorithm-based technique to allow fast and accurate detection of vehicle plate numbers (VPLN) in challenging image datasets. Since binarization of the input image is the most important and difficult step in the detection of VPLN, a hybrid technique is introduced that fuses the outputs of three fast techniques into a pool of connected components objects (CCO) and hence enriches the solution space with more solution candidates. Due to the combination of the outputs of the three binarization techniques, many CCOs are produced into the output pool from which one or… More >

  • Open Access

    ARTICLE

    Efficient Clustering Using Memetic Adaptive Hill Climbing Algorithm in WSN

    M. Manikandan1,*, S. Sakthivel2, V. Vivekanandhan1

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3169-3185, 2023, DOI:10.32604/iasc.2023.029232

    Abstract Wireless Sensor Networks are composed of autonomous sensing devices which are interconnected to form a closed network. This closed network is intended to share sensitive location-centric information from a source node to the base station through efficient routing mechanisms. The efficiency of the sensor node is energy bounded, acts as a concentrated area for most researchers to offer a solution for the early draining power of sensors. Network management plays a significant role in wireless sensor networks, which was obsessed with the factors like the reliability of the network, resource management, energy-efficient routing, and scalability of services. The topology of… More >

  • Open Access

    ARTICLE

    An Enhanced Memetic Algorithm for Feature Selection in Big Data Analytics with MapReduce

    Umanesan Ramakrishnan1,*, Nandhagopal Nachimuthu2

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1547-1559, 2022, DOI:10.32604/iasc.2022.017123

    Abstract Recently, various research fields have begun dealing with massive datasets forseveral functions. The main aim of a feature selection (FS) model is to eliminate noise, repetitive, and unnecessary featuresthat reduce the efficiency of classification. In a limited period, traditional FS models cannot manage massive datasets and filterunnecessary features. It has been discovered from the state-of-the-art literature that metaheuristic algorithms perform better compared to other FS wrapper-based techniques. Common techniques such as the Genetic Algorithm (GA) andParticle Swarm Optimization (PSO) algorithm, however, suffer from slow convergence and local optima problems. Even with new generation algorithms such as Firefly heuristic and Fish… More >

  • Open Access

    ARTICLE

    Control Strategy for a Quadrotor Based on a Memetic Shuffled Frog Leaping Algorithm

    Nour Ben Ammar1, Hegazy Rezk2,3,*, Soufiene Bouallègue1,4

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 4081-4100, 2021, DOI:10.32604/cmc.2021.015681

    Abstract This work presents a memetic Shuffled Frog Leaping Algorithm (SFLA) based tuning approach of an Integral Sliding Mode Controller (ISMC) for a quadrotor type of Unmanned Aerial Vehicles (UAV). Based on the Newton–Euler formalism, a nonlinear dynamic model of the studied quadrotor is firstly established for control design purposes. Since the main parameters of the ISMC design are the gains of the sliding surfaces and signum functions of the switching control law, which are usually selected by repetitive and time-consuming trials-errors based procedures, a constrained optimization problem is formulated for the systematically tuning of these unknown variables. Under time-domain operating… More >

  • Open Access

    ARTICLE

    Memetic Optimization with Cryptographic Encryption for Secure Medical Data Transmission in IoT-Based Distributed Systems

    Srinath Doss1, Jothi Paranthaman2, Suseendran Gopalakrishnan3, Akila Duraisamy3, Souvik Pal4, Balaganesh Duraisamy5, Chung Le Van6,*, Dac-Nhuong Le7

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1577-1594, 2021, DOI:10.32604/cmc.2020.012379

    Abstract In the healthcare system, the Internet of Things (IoT) based distributed systems play a vital role in transferring the medical-related documents and information among the organizations to reduce the replication in medical tests. This datum is sensitive, and hence security is a must in transforming the sensational contents. In this paper, an Evolutionary Algorithm, namely the Memetic Algorithm is used for encrypting the text messages. The encrypted information is then inserted into the medical images using Discrete Wavelet Transform 1 level and 2 levels. The reverse method of the Memetic Algorithm is implemented when extracting a hidden message from the… More >

Displaying 1-10 on page 1 of 6. Per Page