Results 91 to 100 of about 46,625 (244)

Explainable artificial intelligence (XAI)‐powered design framework for lightweight strain‐hardening ultra‐high‐performance composites (SH‐UHPC)

open access: yesStructural Concrete, EarlyView.
Abstract Lightweight strain‐hardening ultra‐high‐performance concrete composite (SH‐UHPC) is an outstanding alternative for engineering applications and infrastructure thanks to its outstanding strength, toughness, ductility, and low density. The integration of artificial intelligence (AI)‐based modeling strategies into engineering problems can ...
Metin Katlav, Kazim Turk
wiley   +1 more source

Preserving Privacy in Association Rule Mining Using Metaheuristic-Based Algorithms: A Systematic Literature Review

open access: yesIEEE Access
The current state of Association Rule Mining (ARM) technology is heading towards a critical yet profitable direction. The ARM process uncovers numerous association rules, determining correlations between itemsets, forming building blocks that have led to
Shahad S. Aljehani, Youseef A. Alotaibi
doaj   +1 more source

Metaheuristic Algorithms and Tree Decomposition [PDF]

open access: yes, 2015
This chapter deals with the application of evolutionary approaches and other metaheuristic techniques for generating tree decompositions. Tree decomposition is a concept introduced by Robertson and Seymour [1] and it is used to characterize the difficulty of constraint satisfaction and NP-hard problems that can be represented as a graph.
Thomas Hammerl   +2 more
openaire   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Bio‐Inspired Optimisation Methods Applied to Low Carbon Power and Energy Problems: A Survey

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Bio‐inspired optimisation methods have been widely applied to complex real‐world problems, particularly in low‐carbon power and energy systems, where optimisation tasks often involve high‐dimensional, constrained and mixed‐integer characteristics.
Tianyu Hu   +4 more
wiley   +1 more source

A generalized evolutionary metaheuristic (GEM) algorithm for engineering optimization

open access: yesCogent Engineering
Many optimization problems in engineering and industrial design applications can be formulated as optimization problems with highly nonlinear objectives, subject to multiple complex constraints.
Xin-She Yang
doaj   +1 more source

AI‐Powered Anomaly Detection for Secure Internet of Things (IoT): Optimising XGBoost and Deep Learning With Bayesian Optimisation

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Intelligent and adaptive defence systems that can quickly thwart changing cyberthreats are becoming more and more necessary in the dynamic and data‐intensive Internet of things (IoT) environment. Using the NSL‐KDD benchmark dataset, this paper presents an improved anomaly detection system that combines an optimised sequential neural network ...
Seong‐O Shim   +4 more
wiley   +1 more source

A comprehensive review of metaheuristic algorithms for mobile robot path planning

open access: yesApplied Computer Science
Path planning and optimization are essential topics in robotics because they directly affect the effectiveness and safety of robot navigation. The application of metaheuristic methods and algorithms in the field of robot motion planning has attracted ...
Sheren SADIQ, Araz ABRAHIM, Haval SADEEQ
doaj   +1 more source

A new approach to minimize the makespan of various resource-constrained project scheduling problems [PDF]

open access: yes, 2014
Conferência realizada de 30 de março a 2 de abril de 2014This abstract presents a new solution approach to solve the resource-constrained project scheduling problem in the presence of multiple modes with mode identity constraints and two types of logical
Coelho, José, Vanhoucke, Mario
core  

A Formation Inversion Algorithm Based on Collaborative Fuzzy Gradient Neural Dynamics for Natural Gamma Logging While Drilling

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT A formation inversion algorithm with real‐time performance and accuracy is crucial for natural gamma logging while drilling (LWD). However, traditional inversion algorithms are often limited by high computational resource consumption and insufficient accuracy.
Juntao Liu   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy