-
341
Heuristics Algorithms for a Heterogeneous Fleets VRP with Excessive Demand for the Vehicle at the Pickup Points, and the Longest Traveling Time Constraint: A Case Study in Prasitsu...
Published 2018-08-01“…We developed two metaheuristics—a differential evolution (DE) algorithm and an adaptive large neighborhood search (ALNS)—to solve the problem. …”
Get full text
Article -
342
An efficient gravitational search decision forest approach for fingerprint recognition
Published 2023-03-01“…The current work proposes an efficient Gravitational Search Decision Forest (GSDF) method, which is a combination of the gravitational search algorithm (GSA) and the random forest (RF) method. …”
Get full text
Article -
343
Research on selective trust-path search and aggregation in distributed environment
Published 2012-09-01“…Current trust models based on reputation had some disadvantages in characterizing recommendation credibility and dealing with Trust-Path Search and aggregation.To solve these problems,an updating algorithm for recommendation credibility was proposed considering factors of time decay,recommendation inosculation and success transaction rate.Furthermore,a selective search-algorithm for trust-path in distributed environment was presented.The algorithm uses recommendation credibility,evaluation similarity and trust-path length as its control parameters and can evade malicious nodes directly in the process of searching.It can also stop the search for unnecessary trust-paths and execute the search for paths containing valuable recommendation.Lastly,trust aggregation method was given by using an advanced combining algorithm in D-S theory of evidence.Simulation results show that compared with existing trust models,the proposed model is more robust on defending attacks of various malicious nodes.…”
Get full text
Article -
344
Research on selective trust-path search and aggregation in distributed environment
Published 2012-09-01“…Current trust models based on reputation had some disadvantages in characterizing recommendation credibility and dealing with Trust-Path Search and aggregation.To solve these problems,an updating algorithm for recommendation credibility was proposed considering factors of time decay,recommendation inosculation and success transaction rate.Furthermore,a selective search-algorithm for trust-path in distributed environment was presented.The algorithm uses recommendation credibility,evaluation similarity and trust-path length as its control parameters and can evade malicious nodes directly in the process of searching.It can also stop the search for unnecessary trust-paths and execute the search for paths containing valuable recommendation.Lastly,trust aggregation method was given by using an advanced combining algorithm in D-S theory of evidence.Simulation results show that compared with existing trust models,the proposed model is more robust on defending attacks of various malicious nodes.…”
Get full text
Article -
345
Harmony Search Based Parameter Ensemble Adaptation for Differential Evolution
Published 2013-01-01“…In this paper, we propose a new parameter adaptation technique for DE based on ensemble approach and harmony search algorithm (HS). In the proposed method, an ensemble of parameters is randomly sampled which form the initial harmony memory. …”
Get full text
Article -
346
Passive Radar Source Localization Based on Cuckoo Search NVTDOA
Published 2020-01-01“…Secondly, the convergence solution of the NVTDOA localization equation is obtained by Cuckoo search algorithm; thus, passive radar source localization is realized. …”
Get full text
Article -
347
Using Anomaly Detection to Search for Technosignatures in Breakthrough Listen Observations
Published 2025-01-01“…We implement a machine learning algorithm to search for extraterrestrial technosignatures in radio observations of several hundred nearby stars, obtained with the Parkes and Green Bank Telescopes by the Breakthrough Listen collaboration. …”
Get full text
Article -
348
Research on optimal selection of runoff prediction models based on coupled machine learning methods
Published 2024-12-01“…Subsequently, these decomposition methods are coupled with optimization algorithms, including Whale Optimization Algorithm (WOA), Grasshopper Optimization Algorithm (GOA), and Sparrow Search Algorithm (SSA), to construct various hybrid prediction models. …”
Get full text
Article -
349
The Optimal Cost Design of Reinforced Concrete Beams Using an Artificial Neural Network—The Effectiveness of Cost-Optimized Training Data
Published 2025-05-01“…This study presents a method for the automated design of reinforced concrete (RC) beam cross-sections using an artificial neural network (ANN) trained with cost-optimized data generated by the crow search algorithm (CSA). To effectively employ the CSA, recognized for its benefits in addressing engineering problems among metaheuristic algorithms, the design variables of the RC beam cross-section were mediated. …”
Get full text
Article -
350
Dual Feature-Based Intrusion Detection System for IoT Network Security
Published 2025-03-01“…The proposed method utilizes the bald eagle search (BES) algorithm and butterfly optimization algorithm (BOA) to capture both flow and packet level features to enhance the accuracy of the intrusion detection process. …”
Get full text
Article -
351
A Hybrid Whale Optimization Approach for Fast-Convergence Global Optimization
Published 2025-06-01“…In this paper, we introduce the Levy Flight-enhanced Whale Optimization Algorithm with Tabu Search elements (LWOATS), an innovative hybrid optimization approach that enhances the standard Whale Optimization Algorithm (WOA) with advanced local search techniques and elite solution management to improve performance on global optimization problems. …”
Get full text
Article -
352
A hybrid deep learning-based intrusion detection system for EV and UAV charging stations
Published 2024-10-01Get full text
Article -
353
Prediction of Breakdown Voltage of Long Air Gaps Under Switching Impulse Voltage Based on the ISSA-XGBoost Model
Published 2025-04-01“…To address this issue, this paper proposes a novel prediction model based on the Improved Sparrow Search Algorithm-optimized XGBoost (ISSA-XGBoost). …”
Get full text
Article -
354
A structural health monitoring data reconstruction method based on VMD and SSA-optimized GRU model
Published 2025-01-01“…To address this challenge, this study develops a method combining Variational Mode Decomposition (VMD) and Sparrow Search Algorithm (SSA)-optimized Gate Recurrent Unit (GRU) for recovering structural response data. …”
Get full text
Article -
355
Automated Search-Based Robustness Testing for Autonomous Vehicle Software
Published 2016-01-01“…Two different search-based testing methods, genetic algorithms and surrogate-based optimization, were used to generate test cases for a simulated unmanned aerial vehicle attempting to fly through an entryway. …”
Get full text
Article -
356
A Local Dwarf Galaxy Search Using Machine Learning
Published 2025-01-01“…We introduce the spectrally confirmed training sample, discuss evaluation metrics, investigate features, compare different machine learning algorithms, and find that a seven-class neural network classification model is highly effective in separating the signal (local, low-mass galaxies) from various contaminants, reaching a precision of 95% and a recall of 76%. …”
Get full text
Article -
357
Integrating multiple slack bus operations and metaheuristic techniques for power flow optimization
Published 2025-05-01“…This paper introduces a comparative evaluation of three metaheuristic algorithms: particle swarm optimization (PSO), cuckoo search algorithm (CSA), and grey wolf optimization (GWO) within the MSO framework. …”
Get full text
Article -
358
Average Corrosion Rate Prediction Model for Buried Oil and Gas Pipelines Based on SSA-LightGBM
Published 2025-01-01“…This study establishes an average corrosion rate prediction model using the Sparrow Search Algorithm-optimized Light Gradient Boosting Machine (SSA-LightGBM). …”
Get full text
Article -
359
Selecting Optimal Feature Set in High-Dimensional Data by Swarm Search
Published 2013-01-01“…The advantage of Swarm Search is its flexibility in integrating any classifier into its fitness function and plugging in any metaheuristic algorithm to facilitate heuristic search. …”
Get full text
Article -
360
Optimal Routing Between Clusters Based on Circular Search Method in WSN
Published 2015-02-01“…The experimental results show that the performance of the multi-hops routing algorithm from the cluster head to the base station compared with LEACH protocol is higher in the balance of nodes' energy consumption and prolong the network lifetime.…”
Get full text
Article