Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (32)
  • Open Access

    ARTICLE

    Optimizing Internet of Things Device Security with a Globalized Firefly Optimization Algorithm for Attack Detection

    Arkan Kh Shakr Sabonchi*

    Journal on Artificial Intelligence, Vol.6, pp. 261-282, 2024, DOI:10.32604/jai.2024.056552 - 18 October 2024

    Abstract The phenomenal increase in device connectivity is making the signaling and resource-based operational integrity of networks at the node level increasingly prone to distributed denial of service (DDoS) attacks. The current growth rate in the number of Internet of Things (IoT) attacks executed at the time of exchanging data over the Internet represents massive security hazards to IoT devices. In this regard, the present study proposes a new hybrid optimization technique that combines the firefly optimization algorithm with global searches for use in attack detection on IoT devices. We preprocessed two datasets, CICIDS and UNSW-NB15,… More >

  • Open Access

    ARTICLE

    Optimizing Bucket Elevator Performance through a Blend of Discrete Element Method, Response Surface Methodology, and Firefly Algorithm Approaches

    Pirapat Arunyanart, Nithitorn Kongkaew, Supattarachai Sudsawat*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3379-3403, 2024, DOI:10.32604/cmc.2024.054337 - 15 August 2024

    Abstract This research introduces a novel approach to enhancing bucket elevator design and operation through the integration of discrete element method (DEM) simulation, design of experiments (DOE), and metaheuristic optimization algorithms. Specifically, the study employs the firefly algorithm (FA), a metaheuristic optimization technique, to optimize bucket elevator parameters for maximizing transport mass and mass flow rate discharge of granular materials under specified working conditions. The experimental methodology involves several key steps: screening experiments to identify significant factors affecting bucket elevator operation, central composite design (CCD) experiments to further explore these factors, and response surface methodology (RSM)… More >

  • Open Access

    ARTICLE

    Microarray Gene Expression Classification: An Efficient Feature Selection Using Hybrid Swarm Intelligence Algorithm

    Punam Gulande*, R. N. Awale

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 937-952, 2024, DOI:10.32604/csse.2024.046123 - 17 July 2024

    Abstract The study of gene expression has emerged as a vital tool for cancer diagnosis and prognosis, particularly with the advent of microarray technology that enables the measurement of thousands of genes in a single sample. While this wealth of data offers invaluable insights for disease management, the high dimensionality poses a challenge for multiclass classification. In this context, selecting relevant features becomes essential to enhance classification model performance. Swarm Intelligence algorithms have proven effective in addressing this challenge, owing to their ability to navigate intricate, non-linear feature-class relationships. This paper introduces a novel hybrid swarm More >

  • Open Access

    ARTICLE

    An Improved Lung Cancer Segmentation Based on Nature-Inspired Optimization Approaches

    Shazia Shamas1, Surya Narayan Panda1,*, Ishu Sharma1,*, Kalpna Guleria1, Aman Singh2,3,4, Ahmad Ali AlZubi5, Mallak Ahmad AlZubi6

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1051-1075, 2024, DOI:10.32604/cmes.2023.030712 - 17 November 2023

    Abstract The distinction and precise identification of tumor nodules are crucial for timely lung cancer diagnosis and planning intervention. This research work addresses the major issues pertaining to the field of medical image processing while focusing on lung cancer Computed Tomography (CT) images. In this context, the paper proposes an improved lung cancer segmentation technique based on the strengths of nature-inspired approaches. The better resolution of CT is exploited to distinguish healthy subjects from those who have lung cancer. In this process, the visual challenges of the K-means are addressed with the integration of four nature-inspired… More >

  • Open Access

    ARTICLE

    Optimization of Cognitive Radio System Using Enhanced Firefly Algorithm

    Nitin Mittal1, Rohit Salgotra2,3, Abhishek Sharma4, Sandeep Kaur5, S. S. Askar6, Mohamed Abouhawwash7,8,*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 3159-3177, 2023, DOI:10.32604/iasc.2023.041059 - 11 September 2023

    Abstract The optimization of cognitive radio (CR) system using an enhanced firefly algorithm (EFA) is presented in this work. The Firefly algorithm (FA) is a nature-inspired algorithm based on the unique light-flashing behavior of fireflies. It has already proved its competence in various optimization problems, but it suffers from slow convergence issues. To improve the convergence performance of FA, a new variant named EFA is proposed. The effectiveness of EFA as a good optimizer is demonstrated by optimizing benchmark functions, and simulation results show its superior performance compared to biogeography-based optimization (BBO), bat algorithm, artificial bee More >

  • Open Access

    ARTICLE

    Levy Flight Firefly Based Efficient Resource Allocation for Fog Environment

    Anu*, Anita Singhrova

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 199-219, 2023, DOI:10.32604/iasc.2023.035389 - 29 April 2023

    Abstract Fog computing is an emergent and powerful computing paradigm to serve latency-sensitive applications by executing internet of things (IoT) applications in the proximity of the network. Fog computing offers computational and storage services between cloud and terminal devices. However, an efficient resource allocation to execute the IoT applications in a fog environment is still challenging due to limited resource availability and low delay requirement of services. A large number of heterogeneous shareable resources makes fog computing a complex environment. In the sight of these issues, this paper has proposed an efficient levy flight firefly-based resource… More >

  • Open Access

    ARTICLE

    Adaptive Kernel Firefly Algorithm Based Feature Selection and Q-Learner Machine Learning Models in Cloud

    I. Mettildha Mary1,*, K. Karuppasamy2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2667-2685, 2023, DOI:10.32604/csse.2023.031114 - 03 April 2023

    Abstract CC’s (Cloud Computing) networks are distributed and dynamic as signals appear/disappear or lose significance. MLTs (Machine learning Techniques) train datasets which sometime are inadequate in terms of sample for inferring information. A dynamic strategy, DevMLOps (Development Machine Learning Operations) used in automatic selections and tunings of MLTs result in significant performance differences. But, the scheme has many disadvantages including continuity in training, more samples and training time in feature selections and increased classification execution times. RFEs (Recursive Feature Eliminations) are computationally very expensive in its operations as it traverses through each feature without considering correlations More >

  • Open Access

    ARTICLE

    Automatic Sentimental Analysis by Firefly with Levy and Multilayer Perceptron

    D. Elangovan1,*, V. Subedha2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2797-2808, 2023, DOI:10.32604/csse.2023.031988 - 03 April 2023

    Abstract The field of sentiment analysis (SA) has grown in tandem with the aid of social networking platforms to exchange opinions and ideas. Many people share their views and ideas around the world through social media like Facebook and Twitter. The goal of opinion mining, commonly referred to as sentiment analysis, is to categorise and forecast a target’s opinion. Depending on if they provide a positive or negative perspective on a given topic, text documents or sentences can be classified. When compared to sentiment analysis, text categorization may appear to be a simple process, but number… More >

  • Open Access

    ARTICLE

    A Modified Firefly Optimization Algorithm-Based Fuzzy Packet Scheduler for MANET

    Mercy Sharon Devadas1, N. Bhalaji1,*, Xiao-Zhi Gao2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2685-2702, 2023, DOI:10.32604/iasc.2023.031636 - 15 March 2023

    Abstract In Mobile ad hoc Networks (MANETs), the packet scheduling process is considered the major challenge because of error-prone connectivity among mobile nodes that introduces intolerable delay and insufficient throughput with high packet loss. In this paper, a Modified Firefly Optimization Algorithm improved Fuzzy Scheduler-based Packet Scheduling (MFPA-FSPS) Mechanism is proposed for sustaining Quality of Service (QoS) in the network. This MFPA-FSPS mechanism included a Fuzzy-based priority scheduler by inheriting the merits of the Sugeno Fuzzy inference system that potentially and adaptively estimated packets’ priority for guaranteeing optimal network performance. It further used the modified Firefly More >

  • Open Access

    ARTICLE

    Robust Image Watermarking Using LWT and Stochastic Gradient Firefly Algorithm

    Sachin Sharma1,*, Meena Malik2, Chander Prabha3, Amal Al-Rasheed4, Mona Alduailij4, Sultan Almakdi5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 393-407, 2023, DOI:10.32604/cmc.2023.033536 - 06 February 2023

    Abstract Watermarking of digital images is required in diversified applications ranging from medical imaging to commercial images used over the web. Usually, the copyright information is embossed over the image in the form of a logo at the corner or diagonal text in the background. However, this form of visible watermarking is not suitable for a large class of applications. In all such cases, a hidden watermark is embedded inside the original image as proof of ownership. A large number of techniques and algorithms are proposed by researchers for invisible watermarking. In this paper, we focus… More >

Displaying 1-10 on page 1 of 32. Per Page