Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (20)
  • Open Access

    ARTICLE

    A Comparative Study of Metaheuristic Optimization Algorithms for Solving Real-World Engineering Design Problems

    Elif Varol Altay, Osman Altay, Yusuf Özçevik*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 1039-1094, 2024, DOI:10.32604/cmes.2023.029404

    Abstract Real-world engineering design problems with complex objective functions under some constraints are relatively difficult problems to solve. Such design problems are widely experienced in many engineering fields, such as industry, automotive, construction, machinery, and interdisciplinary research. However, there are established optimization techniques that have shown effectiveness in addressing these types of issues. This research paper gives a comparative study of the implementation of seventeen new metaheuristic methods in order to optimize twelve distinct engineering design issues. The algorithms used in the study are listed as: transient search optimization (TSO), equilibrium optimizer (EO), grey wolf optimizer (GWO), moth-flame optimization (MFO), whale… More >

  • Open Access

    ARTICLE

    An Optimized Feature Selection and Hyperparameter Tuning Framework for Automated Heart Disease Diagnosis

    Saleh Ateeq Almutairi*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2599-2624, 2023, DOI:10.32604/csse.2023.041609

    Abstract Heart disease is a primary cause of death worldwide and is notoriously difficult to cure without a proper diagnosis. Hence, machine learning (ML) can reduce and better understand symptoms associated with heart disease. This study aims to develop a framework for the automatic and accurate classification of heart disease utilizing machine learning algorithms, grid search (GS), and the Aquila optimization algorithm. In the proposed approach, feature selection is used to identify characteristics of heart disease by using a method for dimensionality reduction. First, feature selection is accomplished with the help of the Aquila algorithm. Then, the optimal combination of the… More >

  • Open Access

    ARTICLE

    Metaheuristic Optimization with Deep Learning Enabled Smart Grid Stability Prediction

    Afrah Al-Bossly*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6395-6408, 2023, DOI:10.32604/cmc.2023.028433

    Abstract Due to the drastic increase in global population as well as economy, electricity demand becomes considerably high. The recently developed smart grid (SG) technology has the ability to minimize power loss at the time of power distribution. Machine learning (ML) and deep learning (DL) models can be effectually developed for the design of SG stability techniques. This article introduces a new Social Spider Optimization with Deep Learning Enabled Statistical Analysis for Smart Grid Stability (SSODLSA-SGS) prediction model. Primarily, class imbalance data handling process is performed using Synthetic minority oversampling technique (SMOTE) technique. The SSODLSA-SGS model involves two stages of pre-processing… More >

  • Open Access

    ARTICLE

    Quantum-Inspired Equilibrium Optimizer for Linear Antenna Array

    Binwen Zhu1, Qifang Luo1,3,*, Yongquan Zhou1,2,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 385-413, 2023, DOI:10.32604/cmes.2023.026097

    Abstract With the rapid development of communication technology, the problem of antenna array optimization plays a crucial role. Among many types of antennas, line antenna arrays (LAA) are the most commonly applied, but the side lobe level (SLL) reduction is still a challenging problem. In the radiation process of the linear antenna array, the high side lobe level will interfere with the intensity of the antenna target radiation direction. Many conventional methods are ineffective in obtaining the maximum side lobe level in synthesis, and this paper proposed a quantum equilibrium optimizer (QEO) algorithm for line antenna arrays. Firstly, the linear antenna… More >

  • Open Access

    ARTICLE

    Predicting the Thickness of an Excavation Damaged Zone around the Roadway Using the DA-RF Hybrid Model

    Yuxin Chen1, Weixun Yong1, Chuanqi Li2, Jian Zhou1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2507-2526, 2023, DOI:10.32604/cmes.2023.025714

    Abstract After the excavation of the roadway, the original stress balance is destroyed, resulting in the redistribution of stress and the formation of an excavation damaged zone (EDZ) around the roadway. The thickness of EDZ is the key basis for roadway stability discrimination and support structure design, and it is of great engineering significance to accurately predict the thickness of EDZ. Considering the advantages of machine learning (ML) in dealing with high-dimensional, nonlinear problems, a hybrid prediction model based on the random forest (RF) algorithm is developed in this paper. The model used the dragonfly algorithm (DA) to optimize two hyperparameters… More >

  • Open Access

    ARTICLE

    Estimation of Weibull Distribution Parameters for Wind Speed Characteristics Using Neural Network Algorithm

    Musaed Alrashidi*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1073-1088, 2023, DOI:10.32604/cmc.2023.036170

    Abstract Harvesting the power coming from the wind provides a green and environmentally friendly approach to producing electricity. To facilitate the ongoing advancement in wind energy applications, deep knowledge about wind regime behavior is essential. Wind speed is typically characterized by a statistical distribution, and the two-parameters Weibull distribution has shown its ability to represent wind speeds worldwide. Estimation of Weibull parameters, namely scale and shape parameters, is vital to describe the observed wind speeds data accurately. Yet, it is still a challenging task. Several numerical estimation approaches have been used by researchers to obtain c and k. However, utilizing such… More >

  • Open Access

    ARTICLE

    Metaheuristic Optimization of Time Series Models for Predicting Networks Traffic

    Reem Alkanhel1, El-Sayed M. El-kenawy2,3, D. L. Elsheweikh4, Abdelaziz A. Abdelhamid5,6, Abdelhameed Ibrahim7, Doaa Sami Khafaga8,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 427-442, 2023, DOI:10.32604/cmc.2023.032885

    Abstract Traffic prediction of wireless networks attracted many researchers and practitioners during the past decades. However, wireless traffic frequently exhibits strong nonlinearities and complicated patterns, which makes it challenging to be predicted accurately. Many of the existing approaches for predicting wireless network traffic are unable to produce accurate predictions because they lack the ability to describe the dynamic spatial-temporal correlations of wireless network traffic data. In this paper, we proposed a novel meta-heuristic optimization approach based on fitness grey wolf and dipper throated optimization algorithms for boosting the prediction accuracy of traffic volume. The proposed algorithm is employed to optimize the… More >

  • Open Access

    ARTICLE

    Selective Mapping Scheme for Universal Filtered Multicarrier

    Akku Madhusudhan*, Sudhir Kumar Sharma

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1273-1282, 2023, DOI:10.32604/iasc.2023.030765

    Abstract The next step in mobile communication technology, known as 5G, is set to go live in a number of countries in the near future. New wireless applications have high data rates and mobility requirements, which have posed a challenge to mobile communication technology researchers and designers. 5G systems could benefit from the Universal Filtered Multicarrier (UFMC). UFMC is an alternate waveform to orthogonal frequency-division multiplexing (OFDM), in filtering process is performed for a sub-band of subcarriers rather than the entire band of subcarriers Inter Carrier Interference (ICI) between neighbouring users is reduced via the sub-band filtering process, which reduces out-of-band… More >

  • Open Access

    ARTICLE

    Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection

    Doaa Sami Khafaga1, Faten Khalid Karim1,*, Abdelaziz A. Abdelhamid2,3, El-Sayed M. El-kenawy4, Hend K. Alkahtani1, Nima Khodadadi5, Mohammed Hadwan6, Abdelhameed Ibrahim7

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3183-3198, 2023, DOI:10.32604/cmc.2023.033513

    Abstract Managing physical objects in the network’s periphery is made possible by the Internet of Things (IoT), revolutionizing human life. Open attacks and unauthorized access are possible with these IoT devices, which exchange data to enable remote access. These attacks are often detected using intrusion detection methodologies, although these systems’ effectiveness and accuracy are subpar. This paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic optimization. The employed metaheuristic optimizer is a new version of the whale optimization algorithm (WOA), which is guided by the dipper throated optimizer (DTO) to improve… More >

  • Open Access

    ARTICLE

    Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization

    Reem Alkanhel1, El-Sayed M. El-kenawy2, Abdelaziz A. Abdelhamid3,4, Abdelhameed Ibrahim5, Manal Abdullah Alohali6, Mostafa Abotaleb7, Doaa Sami Khafaga8,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2677-2693, 2023, DOI:10.32604/cmc.2023.033273

    Abstract Applications of internet-of-things (IoT) are increasingly being used in many facets of our daily life, which results in an enormous volume of data. Cloud computing and fog computing, two of the most common technologies used in IoT applications, have led to major security concerns. Cyberattacks are on the rise as a result of the usage of these technologies since present security measures are insufficient. Several artificial intelligence (AI) based security solutions, such as intrusion detection systems (IDS), have been proposed in recent years. Intelligent technologies that require data preprocessing and machine learning algorithm-performance augmentation require the use of feature selection… More >

Displaying 1-10 on page 1 of 20. Per Page