We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 137 results
  1. Zigzag mutation: a new mutation operator to improve the genetic algorithm

    Genetic algorithm is an exploratory method inspired by Darwin's theory of natural evolution. This algorithm reflects the natural selection process in...

    Sasan Harifi, Reza Mohamaddoust in Multimedia Tools and Applications
    Article 01 May 2023
  2. A New Algorithm for Bi-objective Problems Based on Gradient Information

    This paper presents a new approach for bi-objective optimization based on the exploitation of available gradient information. The proposed algorithm...
    N. Aslimani, E.-G. Talbi, R. Ellaia in Optimization and Learning
    Conference paper 2022
  3. A Method of Pathing for Underwater Glider Cluster Based on Optimization Algorithm

    Underwater gliders have become one of the iconic technologies in ocean environmental monitoring, which relies on adjusting buoyancy to achieve...
    Lihua Wu, Gang **e, ... Shuang Huang in Bio-Inspired Computing: Theories and Applications
    Conference paper 2024
  4. Compressed sensing based visually secure multi-secret image encryption-sharing scheme

    The existing encryption schemes of visually secure image have drawbacks, such as excessive concentration of image data and insufficient resistance to...

    Bin Wu, Dong **e, ... Yangyang Zeng in Multimedia Tools and Applications
    Article 25 July 2023
  5. Comparing the Brain Storm Optimization Algorithm on the Ambiguous Benchmark Set

    In the field of evolutionary computation, benchmarking has a pivotal place in both the development of novel algorithms, and in performing comparisons...
    Jakub Kudela, Tomas Nevoral, Tomas Holoubek in Advances in Swarm Intelligence
    Conference paper 2022
  6. Uncertain random portfolio optimization with non-dominated sorting genetic algorithm-II and optimal solution criterion

    The complexity of the financial systems inevitably leads to the uncertain information and random information simultaneously. Because asset returns...

    **angfa Li, Bo Li, ... Peiyao Zheng in Artificial Intelligence Review
    Article 06 January 2023
  7. Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data

    Healthcare and telemedicine industries are relying on technology that is connected to the Internet. Digital health data are more prone to cyber...

    S. Aashiq Banu, Rengarajan Amirtharajan in Frontiers of Information Technology & Electronic Engineering
    Article 28 July 2021
  8. Human activity recognition from sensor data using spatial attention-aided CNN with genetic algorithm

    Capturing time and frequency relationships of time series signals offers an inherent barrier for automatic human activity recognition (HAR) from...

    Apu Sarkar, S. K. Sabbir Hossain, Ram Sarkar in Neural Computing and Applications
    Article 26 October 2022
  9. Mean-variance-skewness portfolio optimization under uncertain environment using improved genetic algorithm

    An indeterminacy economic environment includes uncertainty during adopting experts knowledge for the analysis of stock returns. The main goal in this...

    Sunil Kumar Mittal, Namita Srivastava in Artificial Intelligence Review
    Article 15 February 2021
  10. Image encryption algorithm based on cross-scrambling and rapid-mode diffusion

    An efficient encryption algorithm largely depends on the chaotic performance of chaotic map. The stronger the chaotic performance of chaotic map, the...

    **ngyuan Wang, Xuan Chen in The Visual Computer
    Article 17 August 2022
  11. TPE-MM: Thumbnail preserving encryption scheme based on Markov model for JPEG images

    Advances in mobile communication have enabled images to be shared more conveniently, and the consequent risk of privacy breaches has been...

    **uli Chai, Guoqiang Long, ... Yushu Zhang in Applied Intelligence
    Article 23 February 2024
  12. F2D-SIFPNet: a frequency 2D Slow-I-Fast-P network for faster compressed video action recognition

    Recent video action recognition methods directly use RGB pixels in the compressed domain. The cumbersome decoding process of traditional methods is...

    Yue Ming, Jiangwan Zhou, ... Nannan Hu in Applied Intelligence
    Article 16 April 2024
  13. VEER: enhancing the interpretability of model-based optimizations

    Context:

    Many software systems can be tuned for multiple objectives (e.g., faster runtime, less required memory, less network traffic or energy...

    Kewen Peng, Christian Kaltenecker, ... Tim Menzies in Empirical Software Engineering
    Article 04 April 2023
  14. Path Planning for Mobile Robots Based on Improved Ant Colony Algorithm

    In a two-dimensional environment, the traditional ant colony algorithm path planning is prone to problems, such as many turning points, easily...
    Jie Zhang, **uqin Pan in Cognitive Computing – ICCC 2022
    Conference paper 2022
  15. Metaheuristic-based energy-aware image compression for mobile app development

    The widely applied JPEG standard has undergone recent efforts using population-based metaheuristic (PBMH) algorithms to optimise quantisation tables...

    Seyed Jalaleddin Mousavirad, Luís A. Alexandre in Multimedia Tools and Applications
    Article Open access 02 May 2024
  16. Genetic Improvement of TCP Congestion Avoidance

    The Transmission Control Protocol (TCP) protocol, i.e., one of the most used protocols over networks, has a crucial role on the functioning of the...
    Alberto Carbognin, Leonardo Lucio Custode, Giovanni Iacca in Bioinspired Optimization Methods and Their Applications
    Conference paper 2022
  17. Genetic Programming-Based Inverse Kinematics for Robotic Manipulators

    In this paper, we introduce an inverse kinematics model for a robotic manipulator using Genetic Programming (GP). The underlying problem requires...
    Julia Reuter, Christoph Steup, Sanaz Mostaghim in Genetic Programming
    Conference paper 2022
  18. An image encryption algorithm based on pixel bit operation and nonlinear chaotic system

    This paper proposes a new one-dimensional chaotic map—nonlinear coupled Sine-Tent-Logistic chaotic map (1DNCSTL). A series of tests on this map show...

    **ngyuan Wang, Shengnan Chen in The Visual Computer
    Article 31 May 2022
  19. IFMD: image fusion for malware detection

    Significant advances in malware production methods in recent years and their use of advanced concealment mechanisms have made identifying such...

    Hashem Hashemi, Mohammad Ebrahim Samie, Ali Hamzeh in Journal of Computer Virology and Hacking Techniques
    Article 16 August 2022
  20. A parametric segmented multifactorial evolutionary algorithm based on a three-phase analysis

    Evolutionary multitasking optimization, which concentrates on solving multiple tasks simultaneously, has been a core area of interest for researchers...

    Peihua Chai, Langcai Cao, ... Yifeng Zeng in Applied Intelligence
    Article 09 August 2023
Did you find what you were looking for? Share feedback.