Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (183)
  • Open Access

    ARTICLE

    Hybrid Hierarchical Particle Swarm Optimization with Evolutionary Artificial Bee Colony Algorithm for Task Scheduling in Cloud Computing

    Shasha Zhao1,2,3,*, Huanwen Yan1,2, Qifeng Lin1,2, Xiangnan Feng1,2, He Chen1,2, Dengyin Zhang1,2

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1135-1156, 2024, DOI:10.32604/cmc.2024.045660 - 30 January 2024

    Abstract Task scheduling plays a key role in effectively managing and allocating computing resources to meet various computing tasks in a cloud computing environment. Short execution time and low load imbalance may be the challenges for some algorithms in resource scheduling scenarios. In this work, the Hierarchical Particle Swarm Optimization-Evolutionary Artificial Bee Colony Algorithm (HPSO-EABC) has been proposed, which hybrids our presented Evolutionary Artificial Bee Colony (EABC), and Hierarchical Particle Swarm Optimization (HPSO) algorithm. The HPSO-EABC algorithm incorporates both the advantages of the HPSO and the EABC algorithm. Comprehensive testing including evaluations of algorithm convergence speed,… More >

  • Open Access

    ARTICLE

    Cybersecurity Threats Detection Using Optimized Machine Learning Frameworks

    Nadir Omer1,*, Ahmed H. Samak2, Ahmed I. Taloba3,4, Rasha M. Abd El-Aziz3,5

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 77-95, 2024, DOI:10.32604/csse.2023.039265 - 26 January 2024

    Abstract Today’s world depends on the Internet to meet all its daily needs. The usage of the Internet is growing rapidly. The world is using the Internet more frequently than ever. The hazards of harmful attacks have also increased due to the growing reliance on the Internet. Hazards to cyber security are actions taken by someone with malicious intent to steal data, destroy computer systems, or disrupt them. Due to rising cyber security concerns, cyber security has emerged as the key component in the fight against all online threats, forgeries, and assaults. A device capable of… More >

  • Open Access

    ARTICLE

    Application of DSAPSO Algorithm in Distribution Network Reconfiguration with Distributed Generation

    Caixia Tao, Shize Yang*, Taiguo Li

    Energy Engineering, Vol.121, No.1, pp. 187-201, 2024, DOI:10.32604/ee.2023.042421 - 27 December 2023

    Abstract With the current integration of distributed energy resources into the grid, the structure of distribution networks is becoming more complex. This complexity significantly expands the solution space in the optimization process for network reconstruction using intelligent algorithms. Consequently, traditional intelligent algorithms frequently encounter insufficient search accuracy and become trapped in local optima. To tackle this issue, a more advanced particle swarm optimization algorithm is proposed. To address the varying emphases at different stages of the optimization process, a dynamic strategy is implemented to regulate the social and self-learning factors. The Metropolis criterion is introduced into… More >

  • Open Access

    ARTICLE

    An Improved Lung Cancer Segmentation Based on Nature-Inspired Optimization Approaches

    Shazia Shamas1, Surya Narayan Panda1,*, Ishu Sharma1,*, Kalpna Guleria1, Aman Singh2,3,4, Ahmad Ali AlZubi5, Mallak Ahmad AlZubi6

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1051-1075, 2024, DOI:10.32604/cmes.2023.030712 - 17 November 2023

    Abstract The distinction and precise identification of tumor nodules are crucial for timely lung cancer diagnosis and planning intervention. This research work addresses the major issues pertaining to the field of medical image processing while focusing on lung cancer Computed Tomography (CT) images. In this context, the paper proposes an improved lung cancer segmentation technique based on the strengths of nature-inspired approaches. The better resolution of CT is exploited to distinguish healthy subjects from those who have lung cancer. In this process, the visual challenges of the K-means are addressed with the integration of four nature-inspired… More >

  • Open Access

    ARTICLE

    Design Optimization of Permanent Magnet Eddy Current Coupler Based on an Intelligence Algorithm

    Dazhi Wang*, Pengyi Pan, Bowen Niu

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1535-1555, 2023, DOI:10.32604/cmc.2023.042286 - 29 November 2023

    Abstract The permanent magnet eddy current coupler (PMEC) solves the problem of flexible connection and speed regulation between the motor and the load and is widely used in electrical transmission systems. It provides torque to the load and generates heat and losses, reducing its energy transfer efficiency. This issue has become an obstacle for PMEC to develop toward a higher power. This paper aims to improve the overall performance of PMEC through multi-objective optimization methods. Firstly, a PMEC modeling method based on the Levenberg-Marquardt back propagation (LMBP) neural network is proposed, aiming at the characteristics of… More >

  • Open Access

    ARTICLE

    Digital Image Encryption Algorithm Based on Double Chaotic Map and LSTM

    Luoyin Feng1,*, Jize Du2, Chong Fu1

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1645-1662, 2023, DOI:10.32604/cmc.2023.042630 - 29 November 2023

    Abstract In the era of network communication, digital image encryption (DIE) technology is critical to ensure the security of image data. However, there has been limited research on combining deep learning neural networks with chaotic mapping for the encryption of digital images. So, this paper addresses this gap by studying the generation of pseudo-random sequences (PRS) chaotic signals using dual logistic chaotic maps. These signals are then predicted using long and short-term memory (LSTM) networks, resulting in the reconstruction of a new chaotic signal. During the research process, it was discovered that there are numerous training… More >

  • Open Access

    ARTICLE

    Optimization of CNC Turning Machining Parameters Based on Bp-DWMOPSO Algorithm

    Jiang Li, Jiutao Zhao, Qinhui Liu*, Laizheng Zhu, Jinyi Guo, Weijiu Zhang

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 223-244, 2023, DOI:10.32604/cmc.2023.042429 - 31 October 2023

    Abstract Cutting parameters have a significant impact on the machining effect. In order to reduce the machining time and improve the machining quality, this paper proposes an optimization algorithm based on Bp neural network-Improved Multi-Objective Particle Swarm (Bp-DWMOPSO). Firstly, this paper analyzes the existing problems in the traditional multi-objective particle swarm algorithm. Secondly, the Bp neural network model and the dynamic weight multi-objective particle swarm algorithm model are established. Finally, the Bp-DWMOPSO algorithm is designed based on the established models. In order to verify the effectiveness of the algorithm, this paper obtains the required data through More >

  • Open Access

    ARTICLE

    Self-Awakened Particle Swarm Optimization BN Structure Learning Algorithm Based on Search Space Constraint

    Kun Liu1,2, Peiran Li3, Yu Zhang1,*, Jia Ren1, Xianyu Wang2, Uzair Aslam Bhatti1

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3257-3274, 2023, DOI:10.32604/cmc.2023.039430 - 08 October 2023

    Abstract To obtain the optimal Bayesian network (BN) structure, researchers often use the hybrid learning algorithm that combines the constraint-based (CB) method and the score-and-search (SS) method. This hybrid method has the problem that the search efficiency could be improved due to the ample search space. The search process quickly falls into the local optimal solution, unable to obtain the global optimal. Based on this, the Particle Swarm Optimization (PSO) algorithm based on the search space constraint process is proposed. In the first stage, the method uses dynamic adjustment factors to constrain the structure search space… More >

  • Open Access

    ARTICLE

    Adaptive Multi-Updating Strategy Based Particle Swarm Optimization

    Dongping Tian1,*, Bingchun Li1, Jing Liu1, Chen Liu1, Ling Yuan1, Zhongzhi Shi2

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2783-2807, 2023, DOI:10.32604/iasc.2023.039531 - 11 September 2023

    Abstract Particle swarm optimization (PSO) is a stochastic computation technique that has become an increasingly important branch of swarm intelligence optimization. However, like other evolutionary algorithms, PSO also suffers from premature convergence and entrapment into local optima in dealing with complex multimodal problems. Thus this paper puts forward an adaptive multi-updating strategy based particle swarm optimization (abbreviated as AMS-PSO). To start with, the chaotic sequence is employed to generate high-quality initial particles to accelerate the convergence rate of the AMS-PSO. Subsequently, according to the current iteration, different update schemes are used to regulate the particle search… More >

  • Open Access

    ARTICLE

    A Hybrid Heuristic Service Caching and Task Offloading Method for Mobile Edge Computing

    Yongxuan Sang, Jiangpo Wei*, Zhifeng Zhang, Bo Wang

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2483-2502, 2023, DOI:10.32604/cmc.2023.040485 - 30 August 2023

    Abstract Computing-intensive and latency-sensitive user requests pose significant challenges to traditional cloud computing. In response to these challenges, mobile edge computing (MEC) has emerged as a new paradigm that extends the computational, caching, and communication capabilities of cloud computing. By caching certain services on edge nodes, computational support can be provided for requests that are offloaded to the edges. However, previous studies on task offloading have generally not considered the impact of caching mechanisms and the cache space occupied by services. This oversight can lead to problems, such as high delays in task executions and invalidation… More >

Displaying 21-30 on page 3 of 183. Per Page