Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (132)
  • Open Access

    ARTICLE

    SCChOA: Hybrid Sine-Cosine Chimp Optimization Algorithm for Feature Selection

    Shanshan Wang1,2,3, Quan Yuan1, Weiwei Tan1, Tengfei Yang1, Liang Zeng1,2,3,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3057-3075, 2023, DOI:10.32604/cmc.2023.044807

    Abstract Feature Selection (FS) is an important problem that involves selecting the most informative subset of features from a dataset to improve classification accuracy. However, due to the high dimensionality and complexity of the dataset, most optimization algorithms for feature selection suffer from a balance issue during the search process. Therefore, the present paper proposes a hybrid Sine-Cosine Chimp Optimization Algorithm (SCChOA) to address the feature selection problem. In this approach, firstly, a multi-cycle iterative strategy is designed to better combine the Sine-Cosine Algorithm (SCA) and the Chimp Optimization Algorithm (ChOA), enabling a more effective search… More >

  • Open Access

    ARTICLE

    Computational Intelligence Driven Secure Unmanned Aerial Vehicle Image Classification in Smart City Environment

    Firas Abedi1, Hayder M. A. Ghanimi2, Abeer D. Algarni3, Naglaa F. Soliman3,*, Walid El-Shafai4,5, Ali Hashim Abbas6, Zahraa H. Kareem7, Hussein Muhi Hariz8, Ahmed Alkhayyat9

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3127-3144, 2023, DOI:10.32604/csse.2023.038959

    Abstract Computational intelligence (CI) is a group of nature-simulated computational models and processes for addressing difficult real-life problems. The CI is useful in the UAV domain as it produces efficient, precise, and rapid solutions. Besides, unmanned aerial vehicles (UAV) developed a hot research topic in the smart city environment. Despite the benefits of UAVs, security remains a major challenging issue. In addition, deep learning (DL) enabled image classification is useful for several applications such as land cover classification, smart buildings, etc. This paper proposes novel meta-heuristics with a deep learning-driven secure UAV image classification (MDLS-UAVIC) model… More >

  • Open Access

    ARTICLE

    Ensemble of Population-Based Metaheuristic Algorithms

    Hao Li, Jun Tang*, Qingtao Pan, Jianjun Zhan, Songyang Lao

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2835-2859, 2023, DOI:10.32604/cmc.2023.038670

    Abstract No optimization algorithm can obtain satisfactory results in all optimization tasks. Thus, it is an effective way to deal with the problem by an ensemble of multiple algorithms. This paper proposes an ensemble of population-based metaheuristics (EPM) to solve single-objective optimization problems. The design of the EPM framework includes three stages: the initial stage, the update stage, and the final stage. The framework applies the transformation of the real and virtual population to balance the problem of exploration and exploitation at the population level and uses an elite strategy to communicate among virtual populations. The… More >

  • Open Access

    ARTICLE

    Enhanced Metaheuristics with Machine Learning Enabled Cyberattack Detection Model

    Ahmed S. Almasoud*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2849-2863, 2023, DOI:10.32604/iasc.2023.039718

    Abstract The Internet of Things (IoT) is considered the next-gen connection network and is ubiquitous since it is based on the Internet. Intrusion Detection System (IDS) determines the intrusion performance of terminal equipment and IoT communication procedures from IoT environments after taking equivalent defence measures based on the identified behaviour. In this background, the current study develops an Enhanced Metaheuristics with Machine Learning enabled Cyberattack Detection and Classification (EMML-CADC) model in an IoT environment. The aim of the presented EMML-CADC model is to detect cyberattacks in IoT environments with enhanced efficiency. To attain this, the EMML-CADC… More >

  • Open Access

    ARTICLE

    Advanced Guided Whale Optimization Algorithm for Feature Selection in BlazePose Action Recognition

    Motasem S. Alsawadi1,*, El-Sayed M. El-kenawy2, Miguel Rio1

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2767-2782, 2023, DOI:10.32604/iasc.2023.039440

    Abstract The BlazePose, which models human body skeletons as spatiotemporal graphs, has achieved fantastic performance in skeleton-based action identification. Skeleton extraction from photos for mobile devices has been made possible by the BlazePose system. A Spatial-Temporal Graph Convolutional Network (STGCN) can then forecast the actions. The Spatial-Temporal Graph Convolutional Network (STGCN) can be improved by simply replacing the skeleton input data with a different set of joints that provide more information about the activity of interest. On the other hand, existing approaches require the user to manually set the graph’s topology and then fix it across… More >

  • Open Access

    PROCEEDINGS

    Structural Damage Identification Using Modal Energy and Improved Hybrid Gradient-Based Optimizer

    Nizar Faisal Alkayem1, Maosen Cao2,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.26, No.4, pp. 1-1, 2023, DOI:10.32604/icces.2023.09367

    Abstract Structural damage identification is a key engineering technique that attempts to ensure structural reliability. In this regard, one of the major intelligent approaches is the inverse analysis of structural damage using metaheuristics. By considering the recent achievements, an efficient hybrid objective function that combines the modal kinetic energy and modal strain energy is developed. The objective function aims to extract maximum modal information from the structure and overcome noisy conditions. Moreover, the original methods are usually vulnerable to the associated high multimodality and uncertainty of the inverse problem. Therefore, the particle swarm algorithm (PSO) mechanism More >

  • Open Access

    ARTICLE

    Airfoil Shape Optimisation Using a Multi-Fidelity Surrogate-Assisted Metaheuristic with a New Multi-Objective Infill Sampling Technique

    Cho Mar Aye1, Kittinan Wansaseub2, Sumit Kumar3, Ghanshyam G. Tejani4, Sujin Bureerat1, Ali R. Yildiz5, Nantiwat Pholdee1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.3, pp. 2111-2128, 2023, DOI:10.32604/cmes.2023.028632

    Abstract This work presents multi-fidelity multi-objective infill-sampling surrogate-assisted optimization for airfoil shape optimization. The optimization problem is posed to maximize the lift and drag coefficient ratio subject to airfoil geometry constraints. Computational Fluid Dynamic (CFD) and XFoil tools are used for high and low-fidelity simulations of the airfoil to find the real objective function value. A special multi-objective sub-optimization problem is proposed for multiple points infill sampling exploration to improve the surrogate model constructed. To validate and further assess the proposed methods, a conventional surrogate-assisted optimization method and an infill sampling surrogate-assisted optimization criterion are applied More > Graphic Abstract

    Airfoil Shape Optimisation Using a Multi-Fidelity Surrogate-Assisted Metaheuristic with a New Multi-Objective Infill Sampling Technique

  • Open Access

    ARTICLE

    Billiards Optimization with Modified Deep Learning for Fault Detection in Wireless Sensor Network

    Yousif Sufyan Jghef1, Mohammed Jasim Mohammed Jasim2, Subhi R. M. Zeebaree3,*, Rizgar R. Zebari4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1651-1664, 2023, DOI:10.32604/csse.2023.037449

    Abstract Wireless Sensor Networks (WSNs) gather data in physical environments, which is some type. These ubiquitous sensors face several challenges responsible for corrupting them (mostly sensor failure and intrusions in external agents). WSNs were disposed to error, and effectual fault detection techniques are utilized for detecting faults from WSNs in a timely approach. Machine learning (ML) was extremely utilized for detecting faults in WSNs. Therefore, this study proposes a billiards optimization algorithm with modified deep learning for fault detection (BIOMDL-FD) in WSN. The BIOMDLFD technique mainly concentrates on identifying sensor faults to enhance network efficiency. To… More >

  • Open Access

    ARTICLE

    Modified Metaheuristics with Weighted Majority Voting Ensemble Deep Learning Model for Intrusion Detection System

    Mahmoud Ragab1,2,*, Sultanah M. Alshammari2,3, Abdullah S. Al-Malaise Al-Ghamdi2,4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2497-2512, 2023, DOI:10.32604/csse.2023.041446

    Abstract The Internet of Things (IoT) system has confronted dramatic growth in high dimensionality and data traffic. The system named intrusion detection systems (IDS) is broadly utilized for the enhancement of security posture in an IT infrastructure. An IDS is a practical and suitable method for assuring network security and identifying attacks by protecting it from intrusive hackers. Nowadays, machine learning (ML)-related techniques were used for detecting intrusion in IoTs IDSs. But, the IoT IDS mechanism faces significant challenges because of physical and functional diversity. Such IoT features use every attribute and feature for IDS self-protection… More >

  • Open Access

    ARTICLE

    Artificial Humming Bird Optimization with Siamese Convolutional Neural Network Based Fruit Classification Model

    T. Satyanarayana Murthy1, Kollati Vijaya Kumar2, Fayadh Alenezi3, E. Laxmi Lydia4, Gi-Cheon Park5, Hyoung-Kyu Song6, Gyanendra Prasad Joshi7, Hyeonjoon Moon7,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1633-1650, 2023, DOI:10.32604/csse.2023.034769

    Abstract Fruit classification utilizing a deep convolutional neural network (CNN) is the most promising application in personal computer vision (CV). Profound learning-related characterization made it possible to recognize fruits from pictures. But, due to the similarity and complexity, fruit recognition becomes an issue for the stacked fruits on a weighing scale. Recently, Machine Learning (ML) methods have been used in fruit farming and agriculture and brought great convenience to human life. An automated system related to ML could perform the fruit classifier and sorting tasks previously managed by human experts. CNN’s (convolutional neural networks) have attained… More >

Displaying 1-10 on page 1 of 132. Per Page