[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (20)

Search Parameters:
Keywords = Glowworm Swarm Optimization

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
18 pages, 1991 KiB  
Article
Internet of Things Data Cloud Jobs Scheduling Using Modified Distance Cat Swarm Optimization
by Adil Yousif, Monika Shohdy, Alzubair Hassan and Awad Ali
Electronics 2023, 12(23), 4784; https://doi.org/10.3390/electronics12234784 - 26 Nov 2023
Viewed by 1086
Abstract
IoT cloud computing provides all functions of traditional computing as services through the Internet for the users. Big data processing is one of the most crucial advantages of IoT cloud computing. However, IoT cloud job scheduling is considered an NP-hard problem due to [...] Read more.
IoT cloud computing provides all functions of traditional computing as services through the Internet for the users. Big data processing is one of the most crucial advantages of IoT cloud computing. However, IoT cloud job scheduling is considered an NP-hard problem due to the hardness of allocating the clients’ jobs to suitable IoT cloud provider resources. Previous work on job scheduling tried to minimize the execution time of the job scheduling in the IoT cloud, but it still needs improvement. This paper proposes an enhanced job scheduling mechanism using cat swarm optimization (CSO) with modified distance to minimize the execution time. The proposed job scheduling mechanism first creates a set of jobs and resources to generate the population by randomly assigning the jobs to resources. Then, it evaluates the population using the fitness value, which represents the execution time of the jobs. In addition, we use iterations to regenerate populations based on the cat’s behaviour to produce the best job schedule that gives the minimum execution time for the jobs. We evaluated the proposed mechanism by implementing an initial simulation using Java Language and then conducted a complete simulation using the CloudSim simulator. We ran several experimentation scenarios using different numbers of jobs and resources to evaluate the proposed mechanism regarding the execution time. The proposed mechanism significantly reduces the execution time when we compare the proposed mechanism against the firefly algorithm and glowworm swarm optimization. The average execution time of the proposed cat swarm optimization was 131, while the average execution times for the firefly algorithm and glowworm optimization were 237 and 220, respectively. Hence, the experimental findings demonstrated that the proposed mechanism performs better than the firefly algorithm and glowworm swarm optimization in reducing the execution time of the jobs. Full article
(This article belongs to the Special Issue Advances in Cloud Computing and IoT Systems)
Show Figures

Figure 1

Figure 1
<p>IoT data cloud job scheduling.</p>
Full article ">Figure 2
<p>Cat swarm optimization for IoT cloud task scheduling.</p>
Full article ">Figure 3
<p>The simulation result of the execution time in the first scenario of the simulation experiment.</p>
Full article ">Figure 4
<p>Execution times for mechanism comparison.</p>
Full article ">Figure 5
<p>Experiments results for the comparison of the third scenario.</p>
Full article ">Figure 6
<p>Comparison of average execution times.</p>
Full article ">
28 pages, 5014 KiB  
Article
Optimum Design of a Reusable Spacecraft Launch System Using Electromagnetic Energy: An Artificial Intelligence GSO Algorithm
by Huayu Gao, Zheng Wei, Xiang Zhang, Pei Wang, Yuwei Lei, Hui Fu and Daming Zhou
Energies 2023, 16(23), 7717; https://doi.org/10.3390/en16237717 - 22 Nov 2023
Cited by 1 | Viewed by 1309
Abstract
Due to its advantages of high acceleration, reusability, environmental protection, safety, energy conservation, and efficiency, electromagnetic energy has been considered as an inevitable choice for future space launch technology. This paper proposes a novel three-level orbital launch approach based on a combination of [...] Read more.
Due to its advantages of high acceleration, reusability, environmental protection, safety, energy conservation, and efficiency, electromagnetic energy has been considered as an inevitable choice for future space launch technology. This paper proposes a novel three-level orbital launch approach based on a combination of a traditional two-level orbital launch method and an electromagnetic boost (EMB), in which the traditional two-level orbital launch consists of a turbine-based combined cycle (TBCC) and a reusable rocket (RR). Firstly, a mathematical model of a multi-stage coil electromagnetic boost system is established to develop the proposed three-level EMB-TBCC-RR orbital launch approach, achieving a horizontal take-off–horizontal landing (HTHL) reusable launch. In order to optimize the fuel quality of the energy system, an artificial intelligence algorithm parameters-sensitivity-based adaptive quantum-inspired glowworm swarm optimization (AQGSO)is proposed to improve the performance of the electromagnetic boosting system. Simulation results show that the proposed AQGSO improves the global optimization precision and convergence speed. By using the proposed EMB-TBCC-RR orbital launch system and the optimization approach, the required fuel weight was reduced by about 13 tons for the same launch mission, and the energy efficiency and reusability of the spacecraft was greatly improved. The spacecraft can be launched with more cargo capacity and increased payload. The proposed novel three-level orbital launch approach can help engineers to design and optimize the orbital launch system in the field of electromagnetic energy conversion and management. Full article
Show Figures

Figure 1

Figure 1
<p>Motivation for the proposed launch approach based on EMB and the optimization algorithm.</p>
Full article ">Figure 2
<p>Three-stage-to-orbit reusable vehicle launch system.</p>
Full article ">Figure 3
<p>The schematic diagram of the TBCC-RR vehicle mission profile.</p>
Full article ">Figure 4
<p>Schematic diagram of the EMB system.</p>
Full article ">Figure 5
<p>The schematic diagram of the equivalent circuit model for the EMB system.</p>
Full article ">Figure 6
<p>Take-off weight estimation model of a reusable vehicle based using EMB-TBCC-RR.</p>
Full article ">Figure 7
<p>Maxwell structure of EMB system.</p>
Full article ">Figure 8
<p>Mutual induction and its fitted curve.</p>
Full article ">Figure 9
<p>The electromagnetic force and velocity of the armature of the single stage EMB.</p>
Full article ">Figure 10
<p>The armature velocity of a multiple stage EMB system.</p>
Full article ">Figure 11
<p>Schematic diagram of take-off weight optimization based on the cluster intelligent algorithm.</p>
Full article ">Figure 12
<p>Sensitivity analysis results for different selected five parameters.</p>
Full article ">Figure 13
<p>SGSO algorithm optimized design results.</p>
Full article ">Figure 13 Cont.
<p>SGSO algorithm optimized design results.</p>
Full article ">Figure 14
<p>Optimization results of QGSO algorithm.</p>
Full article ">Figure 15
<p>Optimization results for the AQGSO algorithm.</p>
Full article ">
22 pages, 8811 KiB  
Article
Blockchain-Assisted Machine Learning with Hybrid Metaheuristics-Empowered Cyber Attack Detection and Classification Model
by Ashwag Albakri, Bayan Alabdullah and Fatimah Alhayan
Sustainability 2023, 15(18), 13887; https://doi.org/10.3390/su151813887 - 19 Sep 2023
Cited by 6 | Viewed by 1819
Abstract
Cyber attack detection is the process of detecting and responding to malicious or unauthorized activities in networks, computer systems, and digital environments. The objective is to identify these attacks early, safeguard sensitive data, and minimize the potential damage. An intrusion detection system (IDS) [...] Read more.
Cyber attack detection is the process of detecting and responding to malicious or unauthorized activities in networks, computer systems, and digital environments. The objective is to identify these attacks early, safeguard sensitive data, and minimize the potential damage. An intrusion detection system (IDS) is a cybersecurity tool mainly designed to monitor system activities or network traffic to detect and respond to malicious or suspicious behaviors that may indicate a cyber attack. IDSs that use machine learning (ML) and deep learning (DL) have played a pivotal role in helping organizations identify and respond to security risks in a prompt manner. ML and DL techniques can analyze large amounts of information and detect patterns that may indicate the presence of malicious or cyber attack activities. Therefore, this study focuses on the design of blockchain-assisted hybrid metaheuristics with a machine learning-based cyber attack detection and classification (BHMML-CADC) algorithm. The BHMML-CADC method focuses on the accurate recognition and classification of cyber attacks. Moreover, the BHMML-CADC technique applies Ethereum BC for attack detection. In addition, a hybrid enhanced glowworm swarm optimization (HEGSO) system is utilized for feature selection (FS). Moreover, cyber attacks can be identified with the design of a quasi-recurrent neural network (QRNN) model. Finally, hunter–prey optimization (HPO) algorithm is used for the optimal selection of the QRNN parameters. The experimental outcomes of the BHMML-CADC system were validated on the benchmark BoT-IoT dataset. The wide-ranging simulation analysis illustrates the superior performance of the BHMML-CADC method over other algorithms, with a maximum accuracy of 99.74%. Full article
Show Figures

Figure 1

Figure 1
<p>Overall flow of BHMML-CADC methodology.</p>
Full article ">Figure 2
<p>Architecture of QRNN.</p>
Full article ">Figure 3
<p>Confusion matrices for (<b>a</b>,<b>b</b>) 80:20 TR set/TS set and (<b>c</b>,<b>d</b>) 70:30 TR set/TS set.</p>
Full article ">Figure 4
<p>Average outcomes of BHMML-CADC method for the 80:20 TR set/TS set.</p>
Full article ">Figure 5
<p><math display="inline"><semantics> <mrow> <mi>A</mi> <mi>c</mi> <mi>c</mi> <msub> <mrow> <mi>u</mi> </mrow> <mrow> <mi>y</mi> </mrow> </msub> </mrow> </semantics></math> curves of BHMML-CADC method for the 80:20 TR set/TS set.</p>
Full article ">Figure 6
<p>Loss curves of BHMML-CADC method for the 80:20 TR set/TS set.</p>
Full article ">Figure 7
<p>PR curves of BHMML-CADC method for the 80:20 TR set/TS set.</p>
Full article ">Figure 8
<p>ROC curves of BHMML-CADC methodology for the 80:20 TR set/TS set.</p>
Full article ">Figure 9
<p>Average outcomes of BHMML-CADC methodology for the 70:30 TR set/TS set.</p>
Full article ">Figure 10
<p><math display="inline"><semantics> <mrow> <mi>A</mi> <mi>c</mi> <mi>c</mi> <msub> <mrow> <mi>u</mi> </mrow> <mrow> <mi>y</mi> </mrow> </msub> </mrow> </semantics></math> curves of BHMML-CADC system for the 70:30 TR set/TS set.</p>
Full article ">Figure 11
<p>Loss curves of BHMML-CADC system for the 70:30 TR set/TS set.</p>
Full article ">Figure 12
<p>PR curves of BHMML-CADC method for the 70:30 TR set/TS set.</p>
Full article ">Figure 13
<p>ROC curves of BHMML-CADC method for the 70:30 TR set/TS set.</p>
Full article ">Figure 14
<p>Comparative outcomes of BHMML-CADC algorithm with other systems.</p>
Full article ">Figure 15
<p>TRT and TST outcomes of BHMML-CADC algorithm compared with other systems.</p>
Full article ">Figure 16
<p>Security rates of the proposed BHMML-CADC algorithm with and without BC.</p>
Full article ">
26 pages, 7913 KiB  
Article
Contextual Cluster-Based Glow-Worm Swarm Optimization (GSO) Coupled Wireless Sensor Networks for Smart Cities
by P. S. Ramesh, P. Srivani, Miroslav Mahdal, Lingala Sivaranjani, Shafiqul Abidin, Shivakumar Kagi and Muniyandy Elangovan
Sensors 2023, 23(14), 6639; https://doi.org/10.3390/s23146639 - 24 Jul 2023
Cited by 3 | Viewed by 1822
Abstract
The cluster technique involves the creation of clusters and the selection of a cluster head (CH), which connects sensor nodes, known as cluster members (CM), to the CH. The CH receives data from the CM and collects data from sensor nodes, removing unnecessary [...] Read more.
The cluster technique involves the creation of clusters and the selection of a cluster head (CH), which connects sensor nodes, known as cluster members (CM), to the CH. The CH receives data from the CM and collects data from sensor nodes, removing unnecessary data to conserve energy. It compresses the data and transmits them to base stations through multi-hop to reduce network load. Since CMs only communicate with their CH and have a limited range, they avoid redundant information. However, the CH’s routing, compression, and aggregation functions consume power quickly compared to other protocols, like TPGF, LQEAR, MPRM, and P-LQCLR. To address energy usage in wireless sensor networks (WSNs), heterogeneous high-power nodes (HPN) are used to balance energy consumption. CHs close to the base station require effective algorithms for improvement. The cluster-based glow-worm optimization technique utilizes random clustering, distributed cluster leader selection, and link-based routing. The cluster head routes data to the next group leader, balancing energy utilization in the WSN. This algorithm reduces energy consumption through multi-hop communication, cluster construction, and cluster head election. The glow-worm optimization technique allows for faster convergence and improved multi-parameter selection. By combining these methods, a new routing scheme is proposed to extend the network’s lifetime and balance energy in various environments. However, the proposed model consumes more energy than TPGF, and other protocols for packets with 0 or 1 retransmission count in a 260-node network. This is mainly due to the short INFO packets during the neighbor discovery period and the increased hop count of the proposed derived pathways. Herein, simulations are conducted to evaluate the technique’s throughput and energy efficiency. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>Cluster-based distributed WSN.</p>
Full article ">Figure 2
<p>Exit info from S2.</p>
Full article ">Figure 3
<p>Sensor S2 elected as CH.</p>
Full article ">Figure 4
<p>Sensor S2 broadcast release message.</p>
Full article ">Figure 5
<p>S1 becomes CH in the second set of sensors.</p>
Full article ">Figure 6
<p>Cluster development for non-CH.</p>
Full article ">Figure 7
<p>15 CH in WSN.</p>
Full article ">Figure 8
<p>Flowchart for the GSO algorithm.</p>
Full article ">Figure 9
<p>Ratio of average packet delivery.</p>
Full article ">Figure 10
<p>Average packets lost per day as a result of interference.</p>
Full article ">Figure 11
<p>Average packets lost by physical layer as a result of poor connection quality.</p>
Full article ">Figure 12
<p>Standard end-to-end delay.</p>
Full article ">Figure 13
<p>Average packet jitter.</p>
Full article ">Figure 14
<p>The average amount of energy used by the network.</p>
Full article ">Figure 15
<p>Hopping pattern in the initial path, on average.</p>
Full article ">Figure 16
<p>Hopping pattern in the second route, on average.</p>
Full article ">Figure 17
<p>Energy use of an average packet.</p>
Full article ">Figure 18
<p>Network lifespan, on average.</p>
Full article ">Figure 19
<p>The number of packets the sink received during the second round of the 1200s simulation.</p>
Full article ">Figure 20
<p>Standard end-to-end retransmission delays.</p>
Full article ">Figure 21
<p>Average retransmission jitter.</p>
Full article ">Figure 22
<p>Retransmission-related average network energy consumption.</p>
Full article ">Figure 23
<p>Average energy used for retransmission in a packet.</p>
Full article ">
17 pages, 5175 KiB  
Article
Explainable Artificial Intelligence Enabled Intrusion Detection Technique for Secure Cyber-Physical Systems
by Latifah Almuqren, Mashael S. Maashi, Mohammad Alamgeer, Heba Mohsen, Manar Ahmed Hamza and Amgad Atta Abdelmageed
Appl. Sci. 2023, 13(5), 3081; https://doi.org/10.3390/app13053081 - 27 Feb 2023
Cited by 13 | Viewed by 2987
Abstract
A cyber-physical system (CPS) can be referred to as a network of cyber and physical components that communicate with each other in a feedback manner. A CPS is essential for daily activities and approves critical infrastructure as it provides the base for innovative [...] Read more.
A cyber-physical system (CPS) can be referred to as a network of cyber and physical components that communicate with each other in a feedback manner. A CPS is essential for daily activities and approves critical infrastructure as it provides the base for innovative smart devices. The recent advances in the field of explainable artificial intelligence have contributed to the development of robust intrusion detection modes for CPS environments. This study develops an Explainable Artificial Intelligence Enabled Intrusion Detection Technique for Secure Cyber-Physical Systems (XAIID-SCPS). The proposed XAIID-SCPS technique mainly concentrates on the detection and classification of intrusions in the CPS platform. In the XAIID-SCPS technique, a Hybrid Enhanced Glowworm Swarm Optimization (HEGSO) algorithm is applied for feature selection purposes. For intrusion detection, the Improved Elman Neural Network (IENN) model was utilized with an Enhanced Fruitfly Optimization (EFFO) algorithm for parameter optimization. Moreover, the XAIID-SCPS technique integrates the XAI approach LIME for better understanding and explainability of the black-box method for accurate classification of intrusions. The simulation values demonstrate the promising performance of the XAIID-SCPS technique over other approaches with maximum accuracy of 98.87%. Full article
(This article belongs to the Special Issue Machine Learning for Network Security)
Show Figures

Figure 1

Figure 1
<p>CPS and potential security threats.</p>
Full article ">Figure 2
<p>Overall flow of XAIID-SCPS system.</p>
Full article ">Figure 3
<p>Confusion matrices of XAIID-SCPS system on NSLKDD2015 dataset (<b>a</b>,<b>b</b>) TRS/TSS of 80:20 and (<b>c</b>,<b>d</b>) TRS/TSS of 70:30.</p>
Full article ">Figure 4
<p>TACY and VACY outcome of XAIID-SCPS system on NSLKDD2015 dataset.</p>
Full article ">Figure 5
<p>TLOS and VLOS outcome of XAIID-SCPS system on NSLKDD2015 dataset.</p>
Full article ">Figure 6
<p>Confusion matrices of XAIID-SCPS system on CICIDS 2017 dataset (<b>a</b>,<b>b</b>) TRS/TSS of 80:20 and (<b>c</b>,<b>d</b>) TRS/TSS of 70:30.</p>
Full article ">Figure 7
<p>TACY and VACY outcome of XAIID-SCPS system on CICIDS 2017 dataset.</p>
Full article ">Figure 8
<p>TLOS and VLOS outcome of XAIID-SCPS system on CICIDS 2017 dataset.</p>
Full article ">Figure 9
<p><math display="inline"><semantics> <mrow> <mi>A</mi> <mi>c</mi> <mi>c</mi> <msub> <mi>u</mi> <mi>y</mi> </msub> </mrow> </semantics></math> outcome of XAIID-SCPS system with other systems.</p>
Full article ">
16 pages, 1057 KiB  
Article
An Enhanced and Secure Trust-Aware Improved GSO for Encrypted Data Sharing in the Internet of Things
by Prabha Selvaraj, Vijay Kumar Burugari, S. Gopikrishnan, Abdullah Alourani , Gautam Srivastava and Mohamed Baza
Appl. Sci. 2023, 13(2), 831; https://doi.org/10.3390/app13020831 - 7 Jan 2023
Cited by 6 | Viewed by 2465
Abstract
Wireless sensors and actuator networks (WSNs) are the physical layer implementation used for many smart applications in this decade in the form of the Internet of Things (IoT) and cyber-physical systems (CPS). Even though many research concerns in WSNs have been answered, the [...] Read more.
Wireless sensors and actuator networks (WSNs) are the physical layer implementation used for many smart applications in this decade in the form of the Internet of Things (IoT) and cyber-physical systems (CPS). Even though many research concerns in WSNs have been answered, the evolution of the WSN into an IoT network has exposed it to many new technical issues, including data security, multi-sensory multi-communication capabilities, energy utilization, and the age of information. Cluster-based data collecting in the Internet of Things has the potential to address concerns with data freshness and energy efficiency. However, it may not offer reliable network data security. This research presents an improved method for data sharing and cluster head (CH) selection using the hybrid Vlsekriterijumska Optimizacija I Kompromisno Resenje (VIKOR) method in conjunction with glowworm swarm optimization (GSO) strategies based on the energy, trust value, bandwidth, and memory to address this security-enabled, cluster-based data aggregation in the IoT. Next, we aggregate the data after the cluster has been built using a genetic algorithm (GA). After aggregation, the data are encrypted and delivered securely using the TIGSO-EDS architecture. Cuckoo search is used to analyze the data and choose the best route for sending them. The proposed model’s analysis of the results is analyzed, and its uniqueness has been demonstrated via comparison with existing models. TIGSO-EDS reduces energy consumption each round by 12.71–19.96% and increases the percentage of successfully delivered data packets from 2.50% to 5.66%. Full article
Show Figures

Figure 1

Figure 1
<p>Wireless sensor network architecture.</p>
Full article ">Figure 2
<p>System architecture of TIGSO-EDS.</p>
Full article ">Figure 3
<p>Hybrid integration of VIKOR GSO model for clustering in TIGSO-EDS.</p>
Full article ">Figure 4
<p>Comparison of alive nodes (base station located at 50 × 50).</p>
Full article ">Figure 5
<p>Comparison of alive nodes (base station located at 100 × 250).</p>
Full article ">Figure 6
<p>Comparison of data packets received at the base station (BS) located at 50 × 50).</p>
Full article ">Figure 7
<p>Comparison of data packets received at the base station (BS) located at 100 × 250).</p>
Full article ">Figure 8
<p>Energy consumption of different methods (base station located at 50 × 50).</p>
Full article ">Figure 9
<p>Energy consumption of different methods (base station located at 100 × 250).</p>
Full article ">
20 pages, 6395 KiB  
Article
Research on Processing Error of Special Machine Tool for VH-CATT Cylindrical Gear
by Shuang Liang, Pei Luo, Li Hou, Yang Duan, Qi Zhang and Haiyan Zhang
Machines 2022, 10(8), 679; https://doi.org/10.3390/machines10080679 - 11 Aug 2022
Cited by 4 | Viewed by 2060
Abstract
The variable hyperbolic circular arc tooth trace (VH-CATT) cylindrical gear is a new gear suitable for heavy loads and high speed. The special structure of the gear provides excellent mechanical properties but also increases the processing difficulty. The special machine tool for VH-CATT [...] Read more.
The variable hyperbolic circular arc tooth trace (VH-CATT) cylindrical gear is a new gear suitable for heavy loads and high speed. The special structure of the gear provides excellent mechanical properties but also increases the processing difficulty. The special machine tool for VH-CATT gear provides a prerequisite for mass production, but the machining accuracy remains to be improved. Therefore, this paper proposes a Kriging model based on the glowworm swarm optimization algorithm of scene understanding (SGSO) to study the relationship between input parameters and output precision. Then, the SGSO algorithm is used to optimize the parameters of the Gaussian mutation function in the Kriging model to improve its fitting accuracy. When solving four groups of tooth profile and tooth direction errors, the key precision index, R2, of SGSO-Kriging all exceed 0.95. Additionally, the feasibility of the model is verified by the residual diagram and the box diagram. The contour diagram and error results show that reducing the feeding velocity, vf, can improve accuracy most efficiently, and the increase of rotational speed, n, is more conducive to the accuracy of the tooth surface than the acceleration of the coolant, vQ. The above research provides an optimization strategy of gear machining accuracy and a theoretical basis for the promotion of the VH-CATT gear. Full article
(This article belongs to the Section Advanced Manufacturing)
Show Figures

Figure 1

Figure 1
<p>Structure of VH-CATT gear: (<b>a</b>) digital model; (<b>b</b>) experimental prototype.</p>
Full article ">Figure 2
<p>The structure of VH-CATT gear machine tool.</p>
Full article ">Figure 3
<p>The executive component structure.</p>
Full article ">Figure 4
<p>Flow chart of surrogate model.</p>
Full article ">Figure 5
<p>Tooth profile and direction curve.</p>
Full article ">Figure 6
<p>Tooth surface error detection.</p>
Full article ">Figure 7
<p>Convergence comparison of test functions: (<b>a</b>) <span class="html-italic">f</span><sub>1</sub>; (<b>b</b>) <span class="html-italic">f</span><sub>2</sub>; (<b>c</b>) <span class="html-italic">f</span><sub>3</sub>; (<b>d</b>) <span class="html-italic">f</span><sub>4</sub>.</p>
Full article ">Figure 8
<p>Glowworm distribution for solving function <span class="html-italic">f</span><sub>1</sub>: (<b>a</b>) GSO; (<b>b</b>) SGSO.</p>
Full article ">Figure 9
<p>Glowworm distribution for solving function <span class="html-italic">f</span><sub>2</sub>: (<b>a</b>) GSO; (<b>b</b>) SGSO.</p>
Full article ">Figure 10
<p>Residual diagram based on the SGSO-Kriging surrogate model: (<b>a</b>) normal probability; (<b>b</b>) by values; (<b>c</b>) histogram; (<b>d</b>) in order.</p>
Full article ">Figure 11
<p>Comparison of actual and simulation value: (<b>a</b>) prediction results; (<b>b</b>) box diagram.</p>
Full article ">Figure 12
<p>Response surfaces contour map of F<span class="html-italic"><sub>al</sub></span>: (<b>a</b>) with <span class="html-italic">n</span> and <span class="html-italic">v<sub>Q</sub></span>; (<b>b</b>) with <span class="html-italic">n</span> and <span class="html-italic">vf</span>; (<b>c</b>) with <span class="html-italic">v<sub>Q</sub></span> and <span class="html-italic">v<sub>f</sub></span>.</p>
Full article ">Figure 13
<p>Response surfaces contour map of <span class="html-italic">F<sub>ar</sub></span>: (<b>a</b>) with <span class="html-italic">n</span> and <span class="html-italic">v<sub>Q</sub></span>; (<b>b</b>) with <span class="html-italic">n</span> and <span class="html-italic">v<sub>f</sub></span>; (<b>c</b>) with <span class="html-italic">v<sub>Q</sub></span> and <span class="html-italic">v<sub>f</sub></span>.</p>
Full article ">Figure 14
<p>Response surfaces contour map of <span class="html-italic">F<sub>βl</sub></span>: (<b>a</b>) with <span class="html-italic">n</span> and <span class="html-italic">v<sub>Q</sub></span>; (<b>b</b>) with <span class="html-italic">n</span> and <span class="html-italic">v<sub>f</sub></span>; (<b>c</b>) with <span class="html-italic">v<sub>Q</sub></span> and <span class="html-italic">v<sub>f</sub></span>.</p>
Full article ">Figure 15
<p>Response surfaces contour map of <span class="html-italic">F<sub>βr</sub></span>: (<b>a</b>) with <span class="html-italic">n</span> and <span class="html-italic">v<sub>Q</sub></span>; (<b>b</b>) with <span class="html-italic">n</span> and <span class="html-italic">v<sub>f</sub></span>; (<b>c</b>) with <span class="html-italic">v<sub>Q</sub></span> and <span class="html-italic">v<sub>f</sub></span>.</p>
Full article ">
15 pages, 3828 KiB  
Article
An Automated Glowworm Swarm Optimization with an Inception-Based Deep Convolutional Neural Network for COVID-19 Diagnosis and Classification
by Ibrahim Abunadi, Amani Abdulrahman Albraikan, Jaber S. Alzahrani, Majdy M. Eltahir, Anwer Mustafa Hilal, Mohamed I. Eldesouki, Abdelwahed Motwakel and Ishfaq Yaseen
Healthcare 2022, 10(4), 697; https://doi.org/10.3390/healthcare10040697 - 8 Apr 2022
Cited by 20 | Viewed by 2529
Abstract
Recently, the COVID-19 epidemic has had a major impact on day-to-day life of people all over the globe, and it demands various kinds of screening tests to detect the coronavirus. Conversely, the development of deep learning (DL) models combined with radiological images is [...] Read more.
Recently, the COVID-19 epidemic has had a major impact on day-to-day life of people all over the globe, and it demands various kinds of screening tests to detect the coronavirus. Conversely, the development of deep learning (DL) models combined with radiological images is useful for accurate detection and classification. DL models are full of hyperparameters, and identifying the optimal parameter configuration in such a high dimensional space is not a trivial challenge. Since the procedure of setting the hyperparameters requires expertise and extensive trial and error, metaheuristic algorithms can be employed. With this motivation, this paper presents an automated glowworm swarm optimization (GSO) with an inception-based deep convolutional neural network (IDCNN) for COVID-19 diagnosis and classification, called the GSO-IDCNN model. The presented model involves a Gaussian smoothening filter (GSF) to eradicate the noise that exists from the radiological images. Additionally, the IDCNN-based feature extractor is utilized, which makes use of the Inception v4 model. To further enhance the performance of the IDCNN technique, the hyperparameters are optimally tuned using the GSO algorithm. Lastly, an adaptive neuro-fuzzy classifier (ANFC) is used for classifying the existence of COVID-19. The design of the GSO algorithm with the ANFC model for COVID-19 diagnosis shows the novelty of the work. For experimental validation, a series of simulations were performed on benchmark radiological imaging databases to highlight the superior outcome of the GSO-IDCNN technique. The experimental values pointed out that the GSO-IDCNN methodology has demonstrated a proficient outcome by offering a maximal sensy of 0.9422, specy of 0.9466, precn of 0.9494, accy of 0.9429, and F1score of 0.9394. Full article
Show Figures

Figure 1

Figure 1
<p>Working process of the GSO-IDCNN model.</p>
Full article ">Figure 2
<p>Network schema of Inception v4.</p>
Full article ">Figure 3
<p>ANFC structure.</p>
Full article ">Figure 4
<p>Sample Images.</p>
Full article ">Figure 5
<p>Result analysis of the GSO-IDCNN approach with respect to <math display="inline"><semantics> <mrow> <mi>s</mi> <mi>e</mi> <mi>n</mi> <msub> <mi>s</mi> <mi>y</mi> </msub> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>s</mi> <mi>p</mi> <mi>e</mi> <msub> <mi>c</mi> <mi>y</mi> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>Result analysis of the GSO-IDCNN technique with respect to <math display="inline"><semantics> <mrow> <mi>P</mi> <mi>r</mi> <mi>e</mi> <msub> <mi>c</mi> <mi>n</mi> </msub> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>A</mi> <mi>c</mi> <msub> <mi>c</mi> <mi>y</mi> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>Result analysis of the GSO-IDCNN technique with respect to <math display="inline"><semantics> <mrow> <mi>F</mi> <msub> <mn>1</mn> <mrow> <mi>s</mi> <mi>c</mi> <mi>o</mi> <mi>r</mi> <mi>e</mi> </mrow> </msub> </mrow> </semantics></math> and kappa.</p>
Full article ">Figure 8
<p>Comparative analysis of the GSO-IDCNN technique with different measures.</p>
Full article ">Figure 9
<p>Comparative analysis of the GSO-IDCNN technique with respect to <math display="inline"><semantics> <mrow> <mi>s</mi> <mi>p</mi> <mi>e</mi> <msub> <mi>c</mi> <mi>y</mi> </msub> </mrow> </semantics></math>.</p>
Full article ">
16 pages, 2701 KiB  
Article
Return Rate Prediction in Blockchain Financial Products Using Deep Learning
by Noura Metawa, Mohamemd I. Alghamdi, Ibrahim M. El-Hasnony and Mohamed Elhoseny
Sustainability 2021, 13(21), 11901; https://doi.org/10.3390/su132111901 - 28 Oct 2021
Cited by 13 | Viewed by 3085
Abstract
Recently, bitcoin-based blockchain technologies have received significant interest among investors. They have concentrated on the prediction of return and risk rates of the financial product. So, an automated tool to predict the return rate of bitcoin is needed for financial products. The recently [...] Read more.
Recently, bitcoin-based blockchain technologies have received significant interest among investors. They have concentrated on the prediction of return and risk rates of the financial product. So, an automated tool to predict the return rate of bitcoin is needed for financial products. The recently designed machine learning and deep learning models pave the way for the return rate prediction process. In this aspect, this study develops an intelligent return rate predictive approach using deep learning for blockchain financial products (RRP-DLBFP). The proposed RRP-DLBFP technique involves designing a long short-term memory (LSTM) model for the predictive analysis of return rate. In addition, Adam optimizer is applied to optimally adjust the LSTM model’s hyperparameters, consequently increasing the predictive performance. The learning rate of the LSTM model is adjusted using the oppositional glowworm swarm optimization (OGSO) algorithm. The design of the OGSO algorithm to optimize the LSTM hyperparameters for bitcoin return rate prediction shows the novelty of the work. To ensure the supreme performance of the RRP-DLBFP technique, the Ethereum (ETH) return rate is chosen as the target, and the simulation results are investigated in different measures. The simulation outcomes highlighted the supremacy of the RRP-DLBFP technique over the current state of art techniques in terms of diverse evaluation parameters. For the MSE, the proposed RRP-DLBFP has 0.0435 and 0.0655 compared to an average of 0.6139 and 0.723 for compared methods in training and testing, respectively. Full article
(This article belongs to the Special Issue E-commerce and Sustainability)
Show Figures

Figure 1

Figure 1
<p>Overview of the Bitcoin system of ledgers.</p>
Full article ">Figure 2
<p>A recurrent neural network that has been unrolled.</p>
Full article ">Figure 3
<p>Gated long-short-term memory (LSTM) cell.</p>
Full article ">Figure 4
<p>Diagram showing the steps in the OGSO algorithm.</p>
Full article ">Figure 5
<p>MSE analysis of RRP-DLBFP technique on the training set.</p>
Full article ">Figure 6
<p>MAE analysis of RRP-DLBFP technique on the training set.</p>
Full article ">Figure 7
<p>MSE analysis of RRP-DLBFP technique on the testing set.</p>
Full article ">Figure 8
<p>MAPE analysis of RRP-DLBFP technique on the testing set.</p>
Full article ">Figure 9
<p>MSE scores for all models are shown below.</p>
Full article ">Figure 10
<p>All of the MAPE models’ results.</p>
Full article ">
25 pages, 2293 KiB  
Article
Cyber Firefly Algorithm Based on Adaptive Memory Programming for Global Optimization
by Peng-Yeng Yin, Po-Yen Chen, Ying-Chieh Wei and Rong-Fuh Day
Appl. Sci. 2020, 10(24), 8961; https://doi.org/10.3390/app10248961 - 15 Dec 2020
Cited by 6 | Viewed by 2277
Abstract
Recently, two evolutionary algorithms (EAs), the glowworm swarm optimization (GSO) and the firefly algorithm (FA), have been proposed. The two algorithms were inspired by the bioluminescence process that enables the light-mediated swarming behavior for mating or foraging. From our literature survey, we are [...] Read more.
Recently, two evolutionary algorithms (EAs), the glowworm swarm optimization (GSO) and the firefly algorithm (FA), have been proposed. The two algorithms were inspired by the bioluminescence process that enables the light-mediated swarming behavior for mating or foraging. From our literature survey, we are convinced with much evidence that the EAs can be more effective if appropriate responsive strategies contained in the adaptive memory programming (AMP) domain are considered in the execution. This paper contemplates this line and proposes the Cyber Firefly Algorithm (CFA), which integrates key elements of the GSO and the FA and further proliferates the advantages by featuring the AMP-responsive strategies including multiple guiding solutions, pattern search, multi-start search, swarm rebuilding, and the objective landscape analysis. The robustness of the CFA has been compared against the GSO, FA, and several state-of-the-art metaheuristic methods. The experimental result based on intensive statistical analyses showed that the CFA performs better than the other algorithms for global optimization of benchmark functions. Full article
(This article belongs to the Special Issue Applied (Meta)-Heuristic in Intelligent Systems)
Show Figures

Figure 1

Figure 1
<p>Pseudo-code of the CFA algorithm.</p>
Full article ">Figure 2
<p>Worst-case analysis with the Rosenbrock (30) function. (<b>a</b>) The worst fitness obtained by the CFA program as the number of repetitive runs increases. (<b>b</b>) The number of program runs with which each performance level is reached.</p>
Full article ">Figure 3
<p>Worst-case analysis with the Rastrigin (30) function. (<b>a</b>) The worst fitness obtained by the CFA program as the number of repetitive runs increases. (<b>b</b>) The number of program runs with which each performance level is reached.</p>
Full article ">Figure 4
<p>Worst-case analysis with the Griewank (30) function. (<b>a</b>) The worst fitness obtained by the CFA program as the number of repetitive runs increases. (<b>b</b>) The number of program runs with which each performance level is reached.</p>
Full article ">Figure 5
<p>Online performance analysis with 95% confidence interval for the Rosenbrock (30) function. (<b>a</b>) The convergence of the best function value during the whole duration of the execution. (<b>b</b>) The convergence of the best function value during the second half duration of the execution.</p>
Full article ">Figure 5 Cont.
<p>Online performance analysis with 95% confidence interval for the Rosenbrock (30) function. (<b>a</b>) The convergence of the best function value during the whole duration of the execution. (<b>b</b>) The convergence of the best function value during the second half duration of the execution.</p>
Full article ">Figure 6
<p>Online performance analysis with 95% confidence interval for the Rastrigin (30) function. (<b>a</b>) The convergence of the best function value during the whole duration of the execution. (<b>b</b>) The convergence of the best function value during the second half duration of the execution.</p>
Full article ">Figure 6 Cont.
<p>Online performance analysis with 95% confidence interval for the Rastrigin (30) function. (<b>a</b>) The convergence of the best function value during the whole duration of the execution. (<b>b</b>) The convergence of the best function value during the second half duration of the execution.</p>
Full article ">Figure 7
<p>Online performance analysis with 95% confidence interval for the Griewank (30) function. (<b>a</b>) The convergence of the best function value during the whole duration of the execution. (<b>b</b>) The convergence of the best function value during the second half duration of the execution.</p>
Full article ">Figure 7 Cont.
<p>Online performance analysis with 95% confidence interval for the Griewank (30) function. (<b>a</b>) The convergence of the best function value during the whole duration of the execution. (<b>b</b>) The convergence of the best function value during the second half duration of the execution.</p>
Full article ">
20 pages, 2803 KiB  
Article
Optimizing Sensor Deployment for Multi-Sensor-Based HAR System with Improved Glowworm Swarm Optimization Algorithm
by Yiming Tian and Jie Zhang
Sensors 2020, 20(24), 7161; https://doi.org/10.3390/s20247161 - 14 Dec 2020
Cited by 8 | Viewed by 2926
Abstract
Human activity recognition (HAR) technology that analyzes and fuses the data acquired from various homogeneous or heterogeneous sensor sources has motivated the development of enormous human-centered applications such as healthcare, fitness, ambient assisted living and rehabilitation. The concurrent use of multiple sensor sources [...] Read more.
Human activity recognition (HAR) technology that analyzes and fuses the data acquired from various homogeneous or heterogeneous sensor sources has motivated the development of enormous human-centered applications such as healthcare, fitness, ambient assisted living and rehabilitation. The concurrent use of multiple sensor sources for HAR is a good choice because the plethora of user information provided by the various sensor sources may be useful. However, a multi-sensor system with too many sensors will bring large power consumption and some sensor sources may bring little improvements to the performance. Therefore, the multi-sensor deployment research that can gain a tradeoff among computational complexity and performance is imperative. In this paper, we propose a multi-sensor-based HAR system whose sensor deployment can be optimized by selective ensemble approaches. With respect to optimization of the sensor deployment, an improved binary glowworm swarm optimization (IBGSO) algorithm is proposed and the sensor sources that have a significant effect on the performance of HAR are selected. Furthermore, the ensemble learning system based on optimized sensor deployment is constructed for HAR. Experimental results on two datasets show that the proposed IBGSO-based multi-sensor deployment approach can select a smaller number of sensor sources while achieving better performance than the ensemble of all sensors and other optimization-based selective ensemble approaches. Full article
Show Figures

Figure 1

Figure 1
<p>The structure of ELM.</p>
Full article ">Figure 2
<p>The structure of multi-sensor fusion with an ensemble learning system.</p>
Full article ">Figure 3
<p>Flowchart of the proposed improved binary glowworm swarm algorithm.</p>
Full article ">Figure 4
<p>The framework of multi-sensor-based human activity recognition (HAR) with an improved binary glowworm swarm optimization (IBGSO) selective ensemble.</p>
Full article ">Figure 5
<p>Relationship between the fitness value of the heuristic algorithms and the iterations using the OPPORTUNITY dataset.</p>
Full article ">Figure 6
<p>Confusion matrices for the ensemble all approach (<b>a</b>) and the proposed IBGSO-based ensemble approach (<b>b</b>) using the OPPORTUNITY dataset.</p>
Full article ">Figure 7
<p>Relationship between the fitness value of the heuristic algorithms and iterations using the DSA.</p>
Full article ">Figure 8
<p>Confusion matrices for the ensemble all approach (<b>a</b>) and the proposed IBGSO-based ensemble approach (<b>b</b>) using the DSA.</p>
Full article ">
18 pages, 2394 KiB  
Article
A Probabilistic VDTN Routing Scheme Based on Hybrid Swarm-Based Approach
by Youcef Azzoug, Abdelmadjid Boukra and Vasco N. G. J. Soares
Future Internet 2020, 12(11), 192; https://doi.org/10.3390/fi12110192 - 7 Nov 2020
Cited by 6 | Viewed by 2364
Abstract
The probabilistic Delay Tolerant Network (DTN) routing has been adjusted for vehicular network (VANET) routing through numerous works exploiting the historic routing profile of nodes to forward bundles through better Store-Carry-and-Forward (SCF) relay nodes. In this paper, we propose a new hybrid swarm-inspired [...] Read more.
The probabilistic Delay Tolerant Network (DTN) routing has been adjusted for vehicular network (VANET) routing through numerous works exploiting the historic routing profile of nodes to forward bundles through better Store-Carry-and-Forward (SCF) relay nodes. In this paper, we propose a new hybrid swarm-inspired probabilistic Vehicular DTN (VDTN) router to optimize the next-SCF vehicle selection using the combination of two bio-metaheuristic techniques called the Firefly Algorithm (FA) and the Glowworm Swarm Optimization (GSO). The FA-based strategy exploits the stochastic intelligence of fireflies in moving toward better individuals, while the GSO-based strategy mimics the movement of glowworm towards better area for displacing and food foraging. Both FA and GSO are executed simultaneously on each node to track better SCF vehicles towards each bundle’s destination. A geography-based recovery method is performed in case no better SCF vehicles are found using the hybrid FA–GSO approach. The proposed FA–GSO VDTN scheme is compared to ProPHET and GeoSpray routers. The simulation results indicated optimized bundles flooding levels and higher profitability of combined delivery delay and delivery probability. Full article
(This article belongs to the Special Issue Delay-Tolerant Networking)
Show Figures

Figure 1

Figure 1
<p>Flowchart of Glowworm Swarm Optimizatin (GSO) procedure.</p>
Full article ">Figure 2
<p>Restricted Minimum Estimated Time of Delivery (METD) mechanism of the hybrid FA–GSO VDTN router.</p>
Full article ">Figure 3
<p>Hybrid Firefly–Glowworm VDTN solution flowchart.</p>
Full article ">Figure 4
<p>Simulation of Helsinki downtown mobility model.</p>
Full article ">Figure 5
<p>Average delivery delay.</p>
Full article ">Figure 6
<p>Delivery probability.</p>
Full article ">Figure 7
<p>Number of flooded bundle copies.</p>
Full article ">Figure 8
<p>Overhead ratio.</p>
Full article ">Figure 9
<p>Average hop count.</p>
Full article ">Figure 10
<p>Number of dropped bundle copies.</p>
Full article ">
18 pages, 3781 KiB  
Article
Heuristic Techniques for the Design of Steel-Concrete Composite Pedestrian Bridges
by Víctor Yepes, Manuel Dasí-Gil, David Martínez-Muñoz, Vicente J. López-Desfilis and Jose V. Martí
Appl. Sci. 2019, 9(16), 3253; https://doi.org/10.3390/app9163253 - 9 Aug 2019
Cited by 19 | Viewed by 4481
Abstract
The objective of this work was to apply heuristic optimization techniques to a steel-concrete composite pedestrian bridge, modeled like a beam on two supports. A program has been developed in Fortran programming language, capable of generating pedestrian bridges, checking them, and evaluating their [...] Read more.
The objective of this work was to apply heuristic optimization techniques to a steel-concrete composite pedestrian bridge, modeled like a beam on two supports. A program has been developed in Fortran programming language, capable of generating pedestrian bridges, checking them, and evaluating their cost. The following algorithms were implemented: descent local search (DLS), a hybrid simulated annealing with a mutation operator (SAMO2), and a glow-worms swarm optimization (GSO) in two variants. The first one only considers the GSO and the second combines GSO and DLS, applying the DSL heuristic to the best solutions obtained by the GSO. The results were compared according to the lowest cost. The GSO and DLS algorithms combined obtained the best results in terms of cost. Furthermore, a comparison between the CO2 emissions associated with the amount of materials obtained by every heuristic technique and the original design solution were studied. Finally, a parametric study was carried out according to the span length of the pedestrian bridge. Full article
(This article belongs to the Section Civil Engineering)
Show Figures

Figure 1

Figure 1
<p>Box-girder geometrical variables and reinforcement.</p>
Full article ">Figure 2
<p>Flowchart of the descent local search (DLS) process.</p>
Full article ">Figure 3
<p>Average costs and number of iterations stop criteria.</p>
Full article ">Figure 4
<p>Flowchart of the hybrid simulated annealing with a mutation operator (SAMO2) process.</p>
Full article ">Figure 5
<p>Trajectory cost and temperature-iterations.</p>
Full article ">Figure 6
<p>Average cost to average iterations for the glow-worms swarm optimization (GSO) experiment.</p>
Full article ">Figure 7
<p>Average cost to average iterations for GSO and DLS combination experiment.</p>
Full article ">Figure 8
<p>Average cost for different span lengths.</p>
Full article ">Figure 9
<p>Mean steel beam depth for different span lengths.</p>
Full article ">Figure 10
<p>Mean slab thickness for different span lengths.</p>
Full article ">Figure 11
<p>Average compressive strength for different span lengths.</p>
Full article ">Figure 12
<p>Variation in the ratio of the rolled steel amount in relation to the surface of the slab with the span.</p>
Full article ">Figure 13
<p>Variation in the ratio of the volume of concrete in relation to the surface of the slab with the span.</p>
Full article ">Figure 14
<p>Variation in the ratio of the reinforcement steel in relation to the surface of the slab with the span.</p>
Full article ">
24 pages, 3618 KiB  
Article
Selective Ensemble Based on Extreme Learning Machine for Sensor-Based Human Activity Recognition
by Yiming Tian, Jie Zhang, Lingling Chen, Yanli Geng and Xitai Wang
Sensors 2019, 19(16), 3468; https://doi.org/10.3390/s19163468 - 8 Aug 2019
Cited by 20 | Viewed by 3824
Abstract
Sensor-based human activity recognition (HAR) has attracted interest both in academic and applied fields, and can be utilized in health-related areas, fitness, sports training, etc. With a view to improving the performance of sensor-based HAR and optimizing the generalizability and diversity of the [...] Read more.
Sensor-based human activity recognition (HAR) has attracted interest both in academic and applied fields, and can be utilized in health-related areas, fitness, sports training, etc. With a view to improving the performance of sensor-based HAR and optimizing the generalizability and diversity of the base classifier of the ensemble system, a novel HAR approach (pairwise diversity measure and glowworm swarm optimization-based selective ensemble learning, DMGSOSEN) that utilizes ensemble learning with differentiated extreme learning machines (ELMs) is proposed in this paper. Firstly, the bootstrap sampling method is utilized to independently train multiple base ELMs which make up the initial base classifier pool. Secondly, the initial pool is pre-pruned by calculating the pairwise diversity measure of each base ELM, which can eliminate similar base ELMs and enhance the performance of HAR system by balancing diversity and accuracy. Then, glowworm swarm optimization (GSO) is utilized to search for the optimal sub-ensemble from the base ELMs after pre-pruning. Finally, majority voting is utilized to combine the results of the selected base ELMs. For the evaluation of our proposed method, we collected a dataset from different locations on the body, including chest, waist, left wrist, left ankle and right arm. The experimental results show that, compared with traditional ensemble algorithms such as Bagging, Adaboost, and other state-of-the-art pruning algorithms, the proposed approach is able to achieve better performance (96.7% accuracy and F1 from wrist) with fewer base classifiers. Full article
(This article belongs to the Section Physical Sensors)
Show Figures

Figure 1

Figure 1
<p>The framework of proposed selective ensemble-based HAR approach.</p>
Full article ">Figure 2
<p>The basic structure of ELM.</p>
Full article ">Figure 3
<p>Workflow of the DMGSOSEN.</p>
Full article ">Figure 4
<p>Human activity data acquisition platform based on acceleration sensor: (<b>a</b>) the data acquisition platform, (<b>b</b>) data collection node containing a triaxial accelerometer, (<b>c</b>) experimental data acquisition process.</p>
Full article ">Figure 5
<p>The triaxial accelerometer data of “walking” from the chest, waist, left wrist, left ankle and right arm.</p>
Full article ">Figure 6
<p>Recognition accuracy from waist position for ordered bagging according to five pairwise diversity measures.</p>
Full article ">Figure 7
<p>Recognition accuracy from chest position for ordered bagging according to five pairwise diversity measures.</p>
Full article ">Figure 8
<p>Recognition accuracy from right arm position for ordered bagging according to five pairwise diversity measures.</p>
Full article ">Figure 9
<p>Recognition accuracy from left ankle position for ordered bagging according to five pairwise diversity measures.</p>
Full article ">Figure 10
<p>Recognition accuracy from left wrist position for ordered bagging according to five pairwise diversity measures.</p>
Full article ">
15 pages, 1288 KiB  
Article
A Novel Coupling Algorithm Based on Glowworm Swarm Optimization and Bacterial Foraging Algorithm for Solving Multi-Objective Optimization Problems
by Yechuang Wang, Zhihua Cui and Wuchao Li
Algorithms 2019, 12(3), 61; https://doi.org/10.3390/a12030061 - 11 Mar 2019
Cited by 12 | Viewed by 4668
Abstract
In the real word, optimization problems in multi-objective optimization (MOP) and dynamic optimization can be seen everywhere. During the last decade, among various swarm intelligence algorithms for multi-objective optimization problems, glowworm swarm optimization (GSO) and bacterial foraging algorithm (BFO) have attracted increasing attention [...] Read more.
In the real word, optimization problems in multi-objective optimization (MOP) and dynamic optimization can be seen everywhere. During the last decade, among various swarm intelligence algorithms for multi-objective optimization problems, glowworm swarm optimization (GSO) and bacterial foraging algorithm (BFO) have attracted increasing attention from scholars. Although many scholars have proposed improvement strategies for GSO and BFO to keep a good balance between convergence and diversity, there are still many problems to be solved carefully. In this paper, a new coupling algorithm based on GSO and BFO (MGSOBFO) is proposed for solving dynamic multi-objective optimization problems (dMOP). MGSOBFO is proposed to achieve a good balance between exploration and exploitation by dividing into two parts. Part I is in charge of exploitation by GSO and Part II is in charge of exploration by BFO. At the same time, the simulation binary crossover (SBX) and polynomial mutation are introduced into the MGSOBFO to enhance the convergence and diversity ability of the algorithm. In order to show the excellent performance of the algorithm, we experimentally compare MGSOBFO with three algorithms on the benchmark function. The results suggests that such a coupling algorithm has good performance and outperforms other algorithms which deal with dMOP. Full article
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) Crowding distance procedure; (<b>b</b>) Crowding distance calculation.</p>
Full article ">Figure 2
<p>flow chart of the improved for replication operation.</p>
Full article ">Figure 3
<p>The results of dynamic performance comparison.</p>
Full article ">Figure 3 Cont.
<p>The results of dynamic performance comparison.</p>
Full article ">
Back to TopTop