Open Access
ARTICLE
Zengxiang Li1, Yongchong Wu2, Alanoud Al Mazro3, Donghua Jiang4, Jianhua Wu5, Xishun Zhu6,*
1 Department of Information Engineering, Gongqing College, Nanchang University, Jiujiang, 332020, China
2 School of Information Engineering, Gongqing Institute of Science and Technology, Jiujiang, 332020, China
3 Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University (PNU), P.O. Box 84428, Riyadh, 11671, Saudi Arabia
4 School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, 511400, China
5 School of Information Engineering, Nanchang University, Nanchang, 330031, China
6 School of Mathematics and Statistics, Hainan Normal University, Haikou, 571158, China
* Corresponding Author: Xishun Zhu. Email:
(This article belongs to the Special Issue: Emerging Technologies in Information Security )
Computer Modeling in Engineering & Sciences https://doi.org/10.32604/cmes.2024.051762
Received 14 March 2024; Accepted 26 June 2024; Published online 26 July 2024
View
Download
Like
Grey Wolf Optimizer to Real Power Dispatch with Non-Linear Constraints
G. R. Venkatakrishnan, R. Rengaraj,...Permissible Wind Conditions for Optimal Dynamic Soaring with a Small Unmanned Aerial Vehicle
Liu Duo-Neng, Hou Zhong-Xi, Guo...Improved Adaptive Particle Filter for Integrated Navigation System
Mengchu Tian, Yuming Bo, Zhimin...