Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (10)
  • Open Access

    ARTICLE

    An Improved Image Steganography Security and Capacity Using Ant Colony Algorithm Optimization

    Zinah Khalid Jasim Jasim*, Sefer Kurnaz*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4643-4662, 2024, DOI:10.32604/cmc.2024.055195 - 12 September 2024

    Abstract This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization (ACO) algorithm. Image steganography, a technique of embedding hidden information in digital photographs, should ideally achieve the dual purposes of maximum data hiding and maintenance of the integrity of the cover media so that it is least suspect. The contemporary methods of steganography are at best a compromise between these two. In this paper, we present our approach, entitled Ant Colony Optimization (ACO)-Least Significant Bit (LSB), which attempts to optimize the capacity in steganographic embedding. The approach makes use… More >

  • Open Access

    ARTICLE

    Path Planning for AUVs Based on Improved APF-AC Algorithm

    Guojun Chen*, Danguo Cheng, Wei Chen, Xue Yang, Tiezheng Guo

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3721-3741, 2024, DOI:10.32604/cmc.2024.047325 - 26 March 2024

    Abstract With the increase in ocean exploration activities and underwater development, the autonomous underwater vehicle (AUV) has been widely used as a type of underwater automation equipment in the detection of underwater environments. However, nowadays AUVs generally have drawbacks such as weak endurance, low intelligence, and poor detection ability. The research and implementation of path-planning methods are the premise of AUVs to achieve actual tasks. To improve the underwater operation ability of the AUV, this paper studies the typical problems of path-planning for the ant colony algorithm and the artificial potential field algorithm. In response to… More >

  • Open Access

    ARTICLE

    A Drone-Based Blood Donation Approach Using an Ant Colony Optimization Algorithm

    Sana Abbas1, Faraha Ashraf1, Fahd Jarad2,3,*, Muhammad Shoaib Sardar1, Imran Siddique4

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1917-1930, 2023, DOI:10.32604/cmes.2023.024700 - 06 February 2023

    Abstract This article presents an optimized approach of mathematical techniques in the medical domain by manoeuvring the phenomenon of ant colony optimization algorithm (also known as ACO). A complete graph of blood banks and a path that covers all the blood banks without repeating any link is required by applying the Travelling Salesman Problem (often TSP). The wide use promises to accelerate and offers the opportunity to cultivate health care, particularly in remote or unmerited environments by shrinking lab testing reversal times, empowering just-in-time lifesaving medical supply. More >

  • Open Access

    ARTICLE

    A developed ant colony algorithm for cancer molecular subtype classification to reveal the predictive biomarker in the renal cell carcinoma

    ZEKUN XIN1,#, YUDAN MA2,#, WEIQIANG SONG3, HAO GAO3, LIJUN DONG3, BAO ZHANG1,*, ZHILONG REN3,*

    BIOCELL, Vol.47, No.3, pp. 555-567, 2023, DOI:10.32604/biocell.2023.026254 - 03 January 2023

    Abstract Background: Recently, researchers have been attracted in identifying the crucial genes related to cancer, which plays important role in cancer diagnosis and treatment. However, in performing the cancer molecular subtype classification task from cancer gene expression data, it is challenging to obtain those significant genes due to the high dimensionality and high noise of data. Moreover, the existing methods always suffer from some issues such as premature convergence. Methods: To address those problems, we propose a new ant colony optimization (ACO) algorithm called DACO to classify the cancer gene expression datasets, identifying the essential genes of… More >

  • Open Access

    ARTICLE

    T_GRASP: Optimization Algorithm of Ship Avoiding Typhoon Route

    Yingxian Huang, Xueyan Ding, Yanan Zhang, Leiming Yan*

    Journal of Quantum Computing, Vol.4, No.2, pp. 85-95, 2022, DOI:10.32604/jqc.2022.031436 - 16 May 2023

    Abstract A GRASP-based algorithm called T_GRASP for avoiding typhoon route optimization is suggested to increase the security and effectiveness of ship navigation. One of the worst natural calamities that can disrupt a ship’s navigation and result in numerous safety mishaps is a typhoon. Currently, the captains manually review the collected weather data and steer clear of typhoons using their navigational expertise. The distribution of heavy winds and waves produced by the typhoon also changes dynamically as a result of the surrounding large-scale air pressure distribution, which significantly enhances the challenge of the captain’s preparation for avoiding… More >

  • Open Access

    ARTICLE

    Optimizing Fresh Logistics Distribution Route Based on Improved Ant Colony Algorithm

    Daqing Wu1,2, Ziwei Zhu1, Dong Hu3,*, Romany Fouad Mansour4

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 2079-2095, 2022, DOI:10.32604/cmc.2022.027794 - 18 May 2022

    Abstract With the rapid development of the fresh cold chain logistics distribution and the prevalence of low carbon concept, this paper proposed an optimization model of low carbon fresh cold chain logistics distribution route considering customer satisfaction, and combined with time, space, weight, distribution rules and other constraints to optimize the distribution model. At the same time, transportation cost, penalty cost, overloading cost, carbon tax cost and customer satisfaction were considered as the components of the objective function, and the thought of cost efficiency was taken into account, so as to establish a distribution model based More >

  • Open Access

    ARTICLE

    An Optimized Fuzzy Based Ant Colony Algorithm for 5G-MANET

    R. Nithya1, K. Amudha2,*, A. Syed Musthafa3, Dilip Kumar Sharma4, Edwin Hernan Ramirez-Asis5, Priya Velayutham6, V. Subramaniyaswamy7, Sudhakar Sengan8

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1069-1087, 2022, DOI:10.32604/cmc.2022.019221 - 07 September 2021

    Abstract The 5G demonstrations in a business has a significant role in today's fast-moving technology. Manet in 5G, drives a wireless system intended at an enormously high data rate, lower energy, low latency, and cost. For this reason, routing protocols of MANET have the possibility of being fundamentally flexible, high performance, and energy-efficient. The 5G communication aims to afford higher data rates and significantly low Over-The-Air latency. Motivated through supplementary ACO routing processes, a security-aware, fuzzy improved ant colony routing optimization protocol is proposed in MANETs. The goal is to develop a MANET routing protocol that… More >

  • Open Access

    ARTICLE

    Design of Cybersecurity Threat Warning Model Based on Ant Colony Algorithm

    Weiwei Lin1,2,*, Reiko Haga3

    Journal on Big Data, Vol.3, No.4, pp. 147-153, 2021, DOI:10.32604/jbd.2021.017299 - 20 December 2021

    Abstract In this paper, a cybersecurity threat warning model based on ant colony algorithm is designed to strengthen the accuracy of the cybersecurity threat warning model in the warning process and optimize its algorithm structure. Through the ant colony algorithm structure, the local global optimal solution is obtained; and the cybersecurity threat warning index system is established. Next, the above two steps are integrated to build the cybersecurity threat warning model based on ant colony algorithm, and comparative experiment is also designed. The experimental results show that, compared with the traditional qualitative differential game-based cybersecurity More >

  • Open Access

    ARTICLE

    Service Scheduling Based on Edge Computing for Power Distribution IoT

    Zhu Liu1, 2, *, Xuesong Qiu1, Shuai Zhang2, Siyang Deng2, Guangyi Liu3, *

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1351-1364, 2020, DOI:10.32604/cmc.2020.07334

    Abstract With the growing amounts of multi-micro grids, electric vehicles, smart home, smart cities connected to the Power Distribution Internet of Things (PD-IoT) system, greater computing resource and communication bandwidth are required for power distribution. It probably leads to extreme service delay and data congestion when a large number of data and business occur in emergence. This paper presents a service scheduling method based on edge computing to balance the business load of PD-IoT. The architecture, components and functional requirements of the PD-IoT with edge computing platform are proposed. Then, the structure of the service scheduling More >

  • Open Access

    ARTICLE

    A User Authentication Protocol Combined with the Trust Model, Biometrics and ECC for Wireless Sensor Networks

    Tao Liu, Gan Huang*, Ping Zhang

    Intelligent Automation & Soft Computing, Vol.24, No.3, pp. 519-529, 2018, DOI:10.31209/2018.100000019

    Abstract In this article, a new user authentication protocol using trust model, elliptic curve cryptography and biometrics for WSNs is submitted. The result of the trust model analysis indicates that the model can improve the model’s ability of withstanding attacks from the malicious nodes. The results of safety analysis and performance analysis for our proposed user authentication protocol demonstrate that this protocol can be flexible to all sorts of common known attacks and performs similarly or better compared with some active user authentication protocols. It is suitable for WSNs which have a prominent request for the More >

Displaying 1-10 on page 1 of 10. Per Page