Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (67)
  • Open Access

    ARTICLE

    Ensuring Information Security in Electronic Health Record System Using Cryptography and Cuckoo Search Algorithm

    Arkan Kh Shakr Sabonchi1,*, Zainab Hashim Obaid2

    Journal of Information Hiding and Privacy Protection, Vol.5, pp. 1-18, 2023, DOI:10.32604/jihpp.2023.041972

    Abstract In the contemporary era, the abundant availability of health information through internet and mobile technology raises concerns. Safeguarding and maintaining the confidentiality of patients’ medical data becomes paramount when sharing such information with authorized healthcare providers. Although electronic patient records and the internet have facilitated the exchange of medical information among healthcare providers, concerns persist regarding the security of the data. The security of Electronic Health Record Systems (EHRS) can be improved by employing the Cuckoo Search Algorithm (CS), the SHA-256 algorithm, and the Elliptic Curve Cryptography (ECC), as proposed in this study. The suggested approach involves using CS to… More >

  • Open Access

    ARTICLE

    Ensuring Information Security in Smart Door Lock Systems Using the Cuckoo Search Algorithm

    Arkan Kh Shakr Sabonchi1,*, Zainab Hashim Obaid2

    Journal of Cyber Security, Vol.4, No.4, pp. 269-286, 2022, DOI:10.32604/jcs.2023.041707

    Abstract The widespread use of Internet of Things (IoT) devices, such as smart appliances, phones, and watches, has brought about concerns regarding security and privacy. With the increasing prevalence of cyberattacks from both malicious and non-malicious sources, security has become a critical factor in the design of IoT systems. In particular, data security poses a significant challenge due to the growing amount of data stored in IoT systems. Inadequate security measures can allow hackers to take over IoT devices remotely, resulting in significant damage. To address these concerns and improve the security of IoT-based smart door lock systems, this research proposes… More >

  • Open Access

    ARTICLE

    Forecasting Energy Consumption Using a Novel Hybrid Dipper Throated Optimization and Stochastic Fractal Search Algorithm

    Doaa Sami Khafaga1, El-Sayed M. El-kenawy2, Amel Ali Alhussan1,*, Marwa M. Eid3

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2117-2132, 2023, DOI:10.32604/iasc.2023.038811

    Abstract The accurate prediction of energy consumption has effective role in decision making and risk management for individuals and governments. Meanwhile, the accurate prediction can be realized using the recent advances in machine learning and predictive models. This research proposes a novel approach for energy consumption forecasting based on a new optimization algorithm and a new forecasting model consisting of a set of long short-term memory (LSTM) units. The proposed optimization algorithm is used to optimize the parameters of the LSTM-based model to boost its forecasting accuracy. This optimization algorithm is based on the recently emerged dipper-throated optimization (DTO) and stochastic… More >

  • Open Access

    ARTICLE

    Hybrid Chameleon and Honey Badger Optimization Algorithm for QoS-Based Cloud Service Composition Problem

    G. Manimala*, A. Chinnasamy

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 393-412, 2023, DOI:10.32604/csse.2023.037066

    Abstract Cloud computing facilitates the great potentiality of storing and managing remote access to services in terms of software as a service (SaaS). Several organizations have moved towards outsourcing over the cloud to reduce the burden on local resources. In this context, the metaheuristic optimization method is determined to be highly suitable for selecting appropriate services that comply with the requirements of the client’s requests, as the services stored over the cloud are too complex and scalable. To achieve better service composition, the parameters of Quality of Service (QoS) related to each service considered to be the best resource need to… More >

  • Open Access

    ARTICLE

    Determination of AVR System PID Controller Parameters Using Improved Variants of Reptile Search Algorithm and a Novel Objective Function

    Baran Hekimoğlu*

    Energy Engineering, Vol.120, No.7, pp. 1515-1540, 2023, DOI:10.32604/ee.2023.029024

    Abstract Two novel improved variants of reptile search algorithm (RSA), RSA with opposition-based learning (ORSA) and hybrid ORSA with pattern search (ORSAPS), are proposed to determine the proportional, integral, and derivative (PID) controller parameters of an automatic voltage regulator (AVR) system using a novel objective function with augmented flexibility. In the proposed algorithms, the opposition-based learning technique improves the global search abilities of the original RSA algorithm, while the hybridization with the pattern search (PS) algorithm improves the local search abilities. Both algorithms are compared with the original RSA algorithm and have shown to be highly effective algorithms for tuning the… More > Graphic Abstract

    Determination of AVR System PID Controller Parameters Using Improved Variants of Reptile Search Algorithm and a Novel Objective Function

  • Open Access

    ARTICLE

    An Improved Reptile Search Algorithm Based on Cauchy Mutation for Intrusion Detection

    Salahahaldeen Duraibi*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2509-2525, 2023, DOI:10.32604/csse.2023.036119

    Abstract With the growth of the discipline of digital communication, the topic has acquired more attention in the cybersecurity medium. The Intrusion Detection (ID) system monitors network traffic to detect malicious activities. The paper introduces a novel Feature Selection (FS) approach for ID. Reptile Search Algorithm (RSA)—is a new optimization algorithm; in this method, each agent searches a new region according to the position of the host, which makes the algorithm suffers from getting stuck in local optima and a slow convergence rate. To overcome these problems, this study introduces an improved RSA approach by integrating Cauchy Mutation (CM) into the… More >

  • Open Access

    ARTICLE

    An Intelligent Approach for Accurate Prediction of Chronic Diseases

    S. Kavi Priya*, N. Saranya

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2571-2587, 2023, DOI:10.32604/csse.2023.031761

    Abstract Around the globe, chronic diseases pose a serious hazard to healthcare communities. The majority of the deaths are due to chronic diseases, and it causes burdens across the world. Through analyzing healthcare data and extracting patterns healthcare administrators, victims, and healthcare communities will get an advantage if the diseases are early predicted. The majority of the existing works focused on increasing the accuracy of the techniques but didn’t concentrate on other performance measures. Thus, the proposed work improves the early detection of chronic disease and safeguards the lives of the patients by increasing the specificity and sensitivity of the classifiers… More >

  • Open Access

    ARTICLE

    An Improved Bald Eagle Search Algorithm with Cauchy Mutation and Adaptive Weight Factor for Engineering Optimization

    Wenchuan Wang1,*, Weican Tian1, Kwok-wing Chau2, Yiming Xue1, Lei Xu3, Hongfei Zang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1603-1642, 2023, DOI:10.32604/cmes.2023.026231

    Abstract The Bald Eagle Search algorithm (BES) is an emerging meta-heuristic algorithm. The algorithm simulates the hunting behavior of eagles, and obtains an optimal solution through three stages, namely selection stage, search stage and swooping stage. However, BES tends to drop-in local optimization and the maximum value of search space needs to be improved. To fill this research gap, we propose an improved bald eagle algorithm (CABES) that integrates Cauchy mutation and adaptive optimization to improve the performance of BES from local optima. Firstly, CABES introduces the Cauchy mutation strategy to adjust the step size of the selection stage, to select… More >

  • Open Access

    ARTICLE

    Selective Mapping Scheme for Universal Filtered Multicarrier

    Akku Madhusudhan*, Sudhir Kumar Sharma

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1273-1282, 2023, DOI:10.32604/iasc.2023.030765

    Abstract The next step in mobile communication technology, known as 5G, is set to go live in a number of countries in the near future. New wireless applications have high data rates and mobility requirements, which have posed a challenge to mobile communication technology researchers and designers. 5G systems could benefit from the Universal Filtered Multicarrier (UFMC). UFMC is an alternate waveform to orthogonal frequency-division multiplexing (OFDM), in filtering process is performed for a sub-band of subcarriers rather than the entire band of subcarriers Inter Carrier Interference (ICI) between neighbouring users is reduced via the sub-band filtering process, which reduces out-of-band… More >

  • Open Access

    ARTICLE

    Squirrel Search Optimization with Deep Convolutional Neural Network for Human Pose Estimation

    K. Ishwarya, A. Alice Nithya*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6081-6099, 2023, DOI:10.32604/cmc.2023.034654

    Abstract Human pose estimation (HPE) is a procedure for determining the structure of the body pose and it is considered a challenging issue in the computer vision (CV) communities. HPE finds its applications in several fields namely activity recognition and human-computer interface. Despite the benefits of HPE, it is still a challenging process due to the variations in visual appearances, lighting, occlusions, dimensionality, etc. To resolve these issues, this paper presents a squirrel search optimization with a deep convolutional neural network for HPE (SSDCNN-HPE) technique. The major intention of the SSDCNN-HPE technique is to identify the human pose accurately and efficiently.… More >

Displaying 11-20 on page 2 of 67. Per Page