Results 171 to 180 of about 6,414 (217)
Some of the next articles are maybe not open access.
GWO‐C: Grey wolf optimizer‐based clustering scheme for WSNs
International Journal of Communication Systems, 2020SummaryA wireless sensor network (WSN) is a prominent technology that could assist in the fourth industrial revolution. Sensor nodes present in the WSNs are functioned by a battery. It is impossible to recharge or replace the battery, hence energy is the most important resource of WSNs.
Deepika Agrawal +6 more
openaire +1 more source
Quality and Reliability Engineering International, 2023
AbstractAnalysis and optimization of system reliability have very much importance for developing an optimal design for the system while using the available resources. Several studies are centered towards reliability optimization using metaheuristics. In this study, a recently developed metaheuristic optimization algorithm called hybrid PSO‐GWO (HPSGWO)
Ashok Singh Bhandari +2 more
openaire +1 more source
AbstractAnalysis and optimization of system reliability have very much importance for developing an optimal design for the system while using the available resources. Several studies are centered towards reliability optimization using metaheuristics. In this study, a recently developed metaheuristic optimization algorithm called hybrid PSO‐GWO (HPSGWO)
Ashok Singh Bhandari +2 more
openaire +1 more source
Engineering with Computers, 2019
In this paper, two novel meta-heuristic algorithms are introduced to solve global optimization problems inspired by the Grey Wolf Optimizer (GWO) algorithm. In the GWO algorithm, wolves are likely to be located in regions close to each other. Therefore, as they catch the hunt (approaching the solution), they may create an intensity in the same or ...
Amir Seyyedabbasi, Farzad Kiani
openaire +3 more sources
In this paper, two novel meta-heuristic algorithms are introduced to solve global optimization problems inspired by the Grey Wolf Optimizer (GWO) algorithm. In the GWO algorithm, wolves are likely to be located in regions close to each other. Therefore, as they catch the hunt (approaching the solution), they may create an intensity in the same or ...
Amir Seyyedabbasi, Farzad Kiani
openaire +3 more sources
Grey Wolf Optimization (GWO) Algorithm
2017This chapter describes the grey wolf optimization (GWO) algorithm as one of the new meta-heuristic algorithms. First, a brief literature review is presented and then the natural process of the GWO algorithm is described. Also, the optimization process and a pseudo code of the GWO algorithm are presented in this chapter.
Hossein Rezaei +2 more
openaire +1 more source
Image Contrast Enhancement Using Histogram Equalization-Based Grey Wolf Optimizer (GWO)
2020Image contrast enhancement is a common image enhancement method in various image applications. Histogram equalization (HE) is a popular conventional and improved way to enhance the image contrast. This conventional HE and its updated versions try to maintain the original image characteristics especially in original image brightness distribution during ...
Saorabh Kumar Mondal +2 more
openaire +1 more source
Multi-group grey wolf optimizer (MG-GWO) for estimating photovoltaic solar cell model
Journal of Thermal Analysis and Calorimetry, 2020The use of photovoltaic (PV) solar systems as a direct convertor of electricity is increasing on daily basis at industrial and domestic scales. Such systems are still under worldwide investigation due to their low efficiency to have better performance.
Mohammad AlShabi +4 more
openaire +1 more source
TS-GWO: IoT Tasks Scheduling in Cloud Computing Using Grey Wolf Optimizer
2020The most critical action in the Internet of things (IoT), particularly in the cloud computing (CC) ecosystem, is job/task scheduling. The rule of the task scheduling (TS) means that how to arrange/schedule the jobs over the given virtual machines (VMs) by decreasing the Makespan measured (Mm) values and the cost need.
Laith Abualigah +6 more
openaire +1 more source
2018 Twentieth International Middle East Power Systems Conference (MEPCON), 2018
The optimal coordination of DOCRs becomes a very hard task as the power system becomes complex and larger. In this paper, the recent GWO technique is proposed to find the optimal settings for directional overcurrent relays (DOCR), minimize the total operation time for all primary relays, and maintain the relay coordination margin between relay pairs ...
Ahmed Korashy +3 more
openaire +1 more source
The optimal coordination of DOCRs becomes a very hard task as the power system becomes complex and larger. In this paper, the recent GWO technique is proposed to find the optimal settings for directional overcurrent relays (DOCR), minimize the total operation time for all primary relays, and maintain the relay coordination margin between relay pairs ...
Ahmed Korashy +3 more
openaire +1 more source
2017 Nineteenth International Middle East Power Systems Conference (MEPCON), 2017
The employment of renewable Distributed Generation (DG) sources in Radial Distribution Networks (RDNs) is providing both environmental friendly generation of electric energy and improvement of the overall performance of RDNs. In this study, Grey Wolf Optimization (GWO) algorithm is employed to determine the optimal locations and sizes (OSL) of ...
Mohamed Mohsen +3 more
openaire +1 more source
The employment of renewable Distributed Generation (DG) sources in Radial Distribution Networks (RDNs) is providing both environmental friendly generation of electric energy and improvement of the overall performance of RDNs. In this study, Grey Wolf Optimization (GWO) algorithm is employed to determine the optimal locations and sizes (OSL) of ...
Mohamed Mohsen +3 more
openaire +1 more source
Intrusion Detection System with Grey Wolf Optimizer (GWO)
2019Intrusion detection system (IDS) has started becoming a part of every system with a presence of the growing security breaches in the world. Therefore, intrusion-detection systems have the task of monitoring the usage of such systems to detect apparition of insecure states. One of the main challenges has been to build Secure application.
CHAİMAA, Kouidri +5 more
openaire +1 more source

