Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (11)
  • Open Access

    ARTICLE

    A Strengthened Dominance Relation NSGA-III Algorithm Based on Differential Evolution to Solve Job Shop Scheduling Problem

    Liang Zeng1,2, Junyang Shi1, Yanyan Li1, Shanshan Wang1,2,*, Weigang Li3

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 375-392, 2024, DOI:10.32604/cmc.2023.045803

    Abstract The job shop scheduling problem is a classical combinatorial optimization challenge frequently encountered in manufacturing systems. It involves determining the optimal execution sequences for a set of jobs on various machines to maximize production efficiency and meet multiple objectives. The Non-dominated Sorting Genetic Algorithm III (NSGA-III) is an effective approach for solving the multi-objective job shop scheduling problem. Nevertheless, it has some limitations in solving scheduling problems, including inadequate global search capability, susceptibility to premature convergence, and challenges in balancing convergence and diversity. To enhance its performance, this paper introduces a strengthened dominance relation NSGA-III algorithm based on differential evolution… More >

  • Open Access

    ARTICLE

    Enhancing Healthcare Data Security and Disease Detection Using Crossover-Based Multilayer Perceptron in Smart Healthcare Systems

    Mustufa Haider Abidi*, Hisham Alkhalefah, Mohamed K. Aboudaif

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 977-997, 2024, DOI:10.32604/cmes.2023.044169

    Abstract The healthcare data requires accurate disease detection analysis, real-time monitoring, and advancements to ensure proper treatment for patients. Consequently, Machine Learning methods are widely utilized in Smart Healthcare Systems (SHS) to extract valuable features from heterogeneous and high-dimensional healthcare data for predicting various diseases and monitoring patient activities. These methods are employed across different domains that are susceptible to adversarial attacks, necessitating careful consideration. Hence, this paper proposes a crossover-based Multilayer Perceptron (CMLP) model. The collected samples are pre-processed and fed into the crossover-based multilayer perceptron neural network to detect adversarial attacks on the medical records of patients. Once an… More >

  • Open Access

    ARTICLE

    Mobile-Deep Based PCB Image Segmentation Algorithm Research

    Lisang Liu1, Chengyang Ke1,*, He Lin2

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2443-2461, 2023, DOI:10.32604/cmc.2023.042582

    Abstract Aiming at the problems of inaccurate edge segmentation, the hole phenomenon of segmenting large-scale targets, and the slow segmentation speed of printed circuit boards (PCB) in the image segmentation process, a PCB image segmentation model Mobile-Deep based on DeepLabv3+ semantic segmentation framework is proposed. Firstly, the DeepLabv3+ feature extraction network is replaced by the lightweight model MobileNetv2, which effectively reduces the number of model parameters; secondly, for the problem of positive and negative sample imbalance, a new loss function is composed of Focal Loss combined with Dice Loss to solve the category imbalance and improve the model discriminative ability; in… More >

  • Open Access

    ARTICLE

    MCRO-PUF: A Novel Modified Crossover RO-PUF with an Ultra-Expanded CRP Space

    Hassan Rabiei1, Masoud Kaveh2, Mohammad Reza Mosavi1, Diego Martín3,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4831-4845, 2023, DOI:10.32604/cmc.2023.034981

    Abstract With the expanding use of the Internet of Things (IoT) devices and the connection of humans and devices to the Internet, the need to provide security in this field is constantly growing. The conventional cryptographic solutions need the IoT device to store secret keys in its non-volatile memory (NVM) leading the system to be vulnerable to physical attacks. In addition, they are not appropriate for IoT applications due to their complex calculations. Thus, physically unclonable functions (PUFs) have been introduced to simultaneously address these issues. PUFs are lightweight and easy-to-access hardware security primitives which employ the unique characteristics of integrated… More >

  • Open Access

    ARTICLE

    Genetic Crossover Operators for the Capacitated Vehicle Routing Problem

    Zakir Hussain Ahmed1,*, Naif Al-Otaibi1, Abdullah Al-Tameem2, Abdul Khader Jilani Saudagar2

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1575-1605, 2023, DOI:10.32604/cmc.2023.031325

    Abstract We study the capacitated vehicle routing problem (CVRP) which is a well-known NP-hard combinatorial optimization problem (COP). The aim of the problem is to serve different customers by a convoy of vehicles starting from a depot so that sum of the routing costs under their capacity constraints is minimized. Since the problem is very complicated, solving the problem using exact methods is almost impossible. So, one has to go for the heuristic/metaheuristic methods and genetic algorithm (GA) is broadly applied metaheuristic method to obtain near optimal solution to such COPs. So, this paper studies GAs to find solution to the… More >

  • Open Access

    ARTICLE

    Hybrid Chaotic Salp Swarm with Crossover Algorithm for Underground Wireless Sensor Networks

    Mariem Ayedi1,2,*, Walaa H. ElAshmawi3,4, Esraa Eldesouky1,3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2963-2980, 2022, DOI:10.32604/cmc.2022.025741

    Abstract Resource management in Underground Wireless Sensor Networks (UWSNs) is one of the pillars to extend the network lifetime. An intriguing design goal for such networks is to achieve balanced energy and spectral resource utilization. This paper focuses on optimizing the resource efficiency in UWSNs where underground relay nodes amplify and forward sensed data, received from the buried source nodes through a lossy soil medium, to the aboveground base station. A new algorithm called the Hybrid Chaotic Salp Swarm and Crossover (HCSSC) algorithm is proposed to obtain the optimal source and relay transmission powers to maximize the network resource efficiency. The… More >

  • Open Access

    ARTICLE

    Genetic Algorithm Energy Optimization in 3D WSNs with Different Node Distributions

    Yousef Jaradat*, Mohammad Masoud, Ismael Jannoud, Dema Zeidan

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 791-808, 2022, DOI:10.32604/iasc.2022.024218

    Abstract Optimal node clustering in wireless sensor networks (WSNs) is a major issue in reducing energy consumption and extending network node life time and reliability measures. Many techniques for optimizing the node clustering process in WSN have been proposed in the literature. The metaheuristic algorithms are a subset of these techniques. Genetic algorithm (GA) is an evolutionary metaheuristic technique utilized to improve the network reliability and extending the network life time by optimizing the clustering process in the network. The GA dynamic clustering (GA-DC) algorithm is proposed in this paper to extend the network reliability and node life time of three… More >

  • Open Access

    ARTICLE

    A User-Transformer Relation Identification Method Based on QPSO and Kernel Fuzzy Clustering

    Yong Xiao1, Xin Jin1, Jingfeng Yang2, Yanhua Shen3,*, Quansheng Guan4

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.3, pp. 1293-1313, 2021, DOI:10.32604/cmes.2021.012562

    Abstract User-transformer relations are significant to electric power marketing, power supply safety, and line loss calculations. To get accurate user-transformer relations, this paper proposes an identification method for user-transformer relations based on improved quantum particle swarm optimization (QPSO) and Fuzzy C-Means Clustering. The main idea is: as energy meters at different transformer areas exhibit different zero-crossing shift features, we classify the zero-crossing shift data from energy meters through Fuzzy C-Means Clustering and compare it with that at the transformer end to identify user-transformer relations. The proposed method contributes in three main ways. First, based on the fuzzy C-means clustering algorithm (FCM),… More >

  • Open Access

    ARTICLE

    Hybrid Soft Computing Technique Based Trust Evaluation Protocol for Wireless Sensor Networks

    Supreet Kaur*, Vijay Kumar Joshi

    Intelligent Automation & Soft Computing, Vol.26, No.2, pp. 217-226, 2020, DOI:10.31209/2018.100000064

    Abstract Wireless sensor networks (WSNs) are susceptible to safety threats due to cumulative dependence upon transmission, computing, and control mechanisms. Therefore, securing the end-to-end communication becomes a major area of research in WSNs. A majority of existing protocols are based upon signature and recommended-based trust evaluation techniques only. However, these techniques are vulnerable to wormhole attacks that happen due to lesser synchronization between the sensor nodes. Therefore, to handle this problem, a novel hybrid crossover-based ant colony optimization-based routing protocol is proposed. An integrated modified signature and recommendationbased trust evaluation protocol for WSNs is presented. Extensive experiments reveal that the proposed… More >

  • Open Access

    ARTICLE

    A Hybrid GABC-GA Algorithm for Mechanical Design Optimization Problems

    Hui Zhi1,2, Sanyang Liu1

    Intelligent Automation & Soft Computing, Vol.25, No.4, pp. 815-825, 2019, DOI:10.31209/2019.100000085

    Abstract In this paper, we proposed a hybrid algorithm, which is embedding the genetic operators in the global-best-guided artificial bee colony algorithms called GABCGA to solve the nonlinear design optimization problems. The genetic algorithm has no memory function and good at find global optimization with large probability, but the artificial bee colony algorithm not have selection, crossover and mutation operator and most significant at local search. The hybrid algorithm balances the exploration and exploitation ability further by combining the advantages of both. The experimental results of five engineering optimization and comparisons with existing approaches show that the proposed approach is outperforms… More >

Displaying 1-10 on page 1 of 11. Per Page