A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Comparative Study on Search Performance between GA and PSO for Stacking Optimization of Laminated Plates
2018
EPI International Journal of Engineering
The optimization is performed by using two metaheuristic methods, Genetic Algorithm (GA) and Particle Swarm Optimization (PSO), and comparison is made to evaluate differences in search performance of the ...
This paper deals with the optimization problem to maximize the vibration performance of laminated composite plates by properly tailoring the fiber orientation angles in the layers. ...
Kennedy and Eberhart published a book [7] to describe many theoretical aspects in PSO and swarm intelligence. Extensive surveys of PSO applications were made by Poli [8, 9] . ...
doi:10.25042/epi-ije.022018.16
fatcat:chb5ujc77rc5dg33g56bur2vou
Swarm and Entropic Modeling for Landmine Detection Robots
[chapter]
2008
Lecture Notes in Electrical Engineering
A message with zero life count is not broadcast. ...
In our model, a drone has a specific number of proximity sensors n PSA that are placed symmetrically on a circle. Each sensor is assumed to cover an angle equal to 2π n PSA . ...
doi:10.1007/978-0-387-74935-8_7
fatcat:foytpqabaneurj2d6lpc5blhxa
Detection of Spoofed IP nodes using BAT Algorithm and Extreme Learning Machine
2019
International Journal of Engineering and Advanced Technology
This paper provides creating a threat model of detecting the Spoofed IP nodes among 105 network wireless communication scenario using computational intelligence algorithm, the features are selected from ...
recently some author come up with ideas of using computational intelligence methods for detecting the different types of attacks in wireless communications which results in accurate prediction. ...
Shin[13]
Hop Count
Filtering
Host
Level
Validates the source prefix
binded with hop count value.
Produces False negatives.
By modifying the TTL value
HCF can be bypassed.
A. Yaar, A. ...
doi:10.35940/ijeat.b2962.129219
fatcat:4spq5yslzvewhgzxjngfoi4fdq
Solenopsis: A Framework for the Development of Ant Algorithms
2007
2007 IEEE Swarm Intelligence Symposium
Bioinspired techniques such as swarm intelligence algorithms, have proved to be robust and suitable for managing tasks like routing, load-balancing or resource discovery. ...
The system provides a modular and scalable environment that can be distributed over a network. Ants are coded using a simple programming language, and are able to migrate across nodes. ...
ACKNOWLEDGMENT Solenopsis has been developed thanks to the financial support of the Swiss Hasler Foundation [20] in the framework of the "ManCom Initiative" (ManCom for "Managing Complexity of Information ...
doi:10.1109/sis.2007.367954
dblp:conf/swis/BroccoHC07
fatcat:idnskcdlnncd7hscqeamsmuaxq
An Organic Computing architecture for visual microprocessors based on Marching Pixels
2007
2007 IEEE International Symposium on Circuits and Systems
They are crawling as hardware agents within a pixel field, e.g. to identify and to detect center points of an arbitrary number of objects given in an image. ...
It is impossible to meet such strict requirements for megapixel resolutions with serial processing schemes in particular if multiple given objects have to be detected. ...
In [11] an approach is presented which allows to find the center point in symmetric objects. ...
doi:10.1109/iscas.2007.377967
dblp:conf/iscas/FeyKSL07
fatcat:zgjth4kqxjbdlgcpbfqygrtisa
Efficient Networks Communication Routing Using Swarm Intelligence
2012
International Journal of Information Technology and Computer Science
In this paper we give disadvantages of previously used network routing algorith ms and how we can apply swarm intelligence to overcome these problems. ...
A new class of algorith ms, inspired by swarm intelligence is currently being developed that can potentially solve nu merous problems of modern co mmunicat ions networks. ...
Swarm problem solving is a bottom-up approach to controlling and optimizing d istributed systems. ...
doi:10.5815/ijitcs.2012.12.07
fatcat:e3mjlt2kxfgwjhpdqs65ziuq2e
A biologically-inspired clustering protocol for wireless sensor networks
2007
Computer Communications
Our protocol is found to ensure a good distribution of clusterheads through a totally distributed approach. ...
In order to allow for a realistic evaluation, a comprehensive simulator involving critical components of the communication stack is used. ...
Acknowledgments The authors would like to thank the anonymous reviewers for their valuable comments and suggestions. ...
doi:10.1016/j.comcom.2007.05.010
fatcat:2efqdkvasratfeapcifuvnrfry
Optimized Spatial Partitioning via Minimal Swarm Intelligence
[article]
2017
arXiv
pre-print
Some improvements in particle swarm optimizer results on multimodal test functions from partitioned initial positions in two space are also illustrated. ...
CVT based methods require global knowledge of spatial boundaries, do not readily allow for weighted regions, have challenging implementations, and are inefficiently extended to high dimensional spaces. ...
In order to optimally search challenging terrains, sensors must rely on rapid swarm intelligence for efficacy and survival. ...
arXiv:1701.05553v1
fatcat:zxm7rju2hbawjgcvk3mp5b25ey
Categories, Quantum Computing, and Swarm Robotics: A Case Study
2022
Mathematics
The swarms of robots are examples of artificial collective intelligence, with simple individual autonomous behavior and emerging swarm effect to accomplish even complex tasks. ...
Aiming to build up a general model, we first sketch a diagrammatic classification of swarms relating ideal swarms to existing implementations, inspired by category theory. ...
, stacking together to perform a more complex task). ...
doi:10.3390/math10030372
fatcat:4h5wh3awojhfta4xx6nvrorptq
Lightweight Swarm Attestation
2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17
To this end, it makes two contributions: (1) a new metric, called QoSA: Quality of Swarm Attestation, that captures the information offered by a swarm attestation technique; this allows comparing efficacy ...
This paper's main goal is to advance swarm attestation by bringing it closer to reality. ...
Acknowledgments The authors are grateful to AsiaCCS'17 anonymous reviewers for helpful comments and improvement suggestions. UCI authors were supported, in part, by funding from: (1) ...
doi:10.1145/3052973.3053010
dblp:conf/ccs/CarpentDRT17
fatcat:d64tijdqxfcbranudbuei62mjm
Ant based Algorithm for Load Balancing in Mobile Ad Hoc Networks
2012
International Journal of Computer Applications
A new family of algorithms inspired by Swarm Intelligence has come into existence to provide route optimization through routing load distribution. ...
Each node is also a router that forwards data packets to its proper destination. ...
Swarm intelligence is a relatively new approach to problem solving that takes inspiration from the social behavior of insects and of other animals. ...
doi:10.5120/4819-7068
fatcat:7rwulccevjeelaoektyx57ewoq
Local control of cognitive radio networks
2009
Annales des télécommunications
We have implemented a working prototype showing the feasibility of this technique in two simulation environments and in a hardware testbed, and find that a solution based on swarm intelligence is well ...
This technique is built upon the principles of swarm intelligence, as seen in schools of fish and flocks of birds, and allows for efficient and robust coordination of a cognitive radio network in a variety ...
a sufficient degree of average hop counts. ...
doi:10.1007/s12243-009-0102-5
fatcat:25uwymf4fbgdrlvp7u2mqlfusy
Bio-Mimic Optimization Strategies in Wireless Sensor Networks: A Survey
2013
Sensors
In conventional optimization approaches, the methods need to comply with the structure of the objective function which is to be solved [2], but sometimes the derivative of the objective function cannot ...
For the last two decades bio-mimetic strategies have been widely used to solve these issues as they can solve non-differential nonlinear objective functions which are really hard to find using classical ...
Acknowledgments Authors would like to thank Universiti Teknologi Malaysia and Ministry of Higher Education, Malaysia for sponsoring this research under vote numbers: 4D062, 07J04, and 08J35. ...
doi:10.3390/s140100299
pmid:24368702
pmcid:PMC3926559
fatcat:lndlgfl2ajflxhvninklnukww4
MINDS: Mobile Agent Itinerary Planning Using Named Data Networking in Wireless Sensor Networks
2021
Journal of Sensor and Actuator Networks
The mobile agents utilise a modified version of the Depth-First Search algorithm to move through the tree infrastructure according to a hop-count-aware fashion. ...
In turn, a named data networking approach is used to form the cluster-heads as a data-centric, tree-based communication infrastructure. ...
This utilises glow-worm swarm optimisation to route drones over a field of randomly located 3D objects. The target is to find an optimal path to fly over the field with no collisions. ...
doi:10.3390/jsan10020028
doaj:740c41f157b044d98671a559c762ada7
fatcat:ex7eyynqcvcs5dndsm37kuedxu
Modeling of Explainable Artificial Intelligence for Biomedical Mental Disorder Diagnosis
2022
Computers Materials & Continua
In order to ensure a better ASD diagnostic outcome, a series of simulation process was conducted on ASD dataset. ...
The abundant existence of both structured and unstructured data and rapid advancement of statistical models stressed the importance of introducing Explainable Artificial Intelligence (XAI), a process that ...
FS is modelled as a multi-objective optimization issue but two differing objectives are achieved i.e., less count of FS and superior classifier accuracy. ...
doi:10.32604/cmc.2022.022663
fatcat:r5rreccsu5babh5d3zexm53w64
« Previous
Showing results 1 — 15 out of 770 results