Bioinspired computational intelligence and transportation systems: a long road ahead

J Del Ser, E Osaba… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper capitalizes on the increasingly high relevance gained by data-intensive
technologies in the development of intelligent transportation system, which calls for the …

Recent trends in computational intelligence for educational big data analysis

AC Ikegwu, HF Nweke, CV Anikwe - Iran Journal of Computer Science, 2024 - Springer
Educational big data analytics and computational intelligence have transformed our
understanding of learning ability and computing power, catalyzing the emergence of …

A novel hybrid whale optimization algorithm with flower pollination algorithm for feature selection: Case study Email spam detection

H Mohammadzadeh… - Computational …, 2021 - Wiley Online Library
Feature selection (FS) in data mining is one of the most challenging and most important
activities in pattern recognition. In this article, a new hybrid model of whale optimization …

Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication

K Mabodi, M Yusefi, S Zandiyan, L Irankhah… - The journal of …, 2020 - Springer
The internet of things (IoT) is able to provide a prediction of linked, universal, and smart
nodes that have autonomous interaction when they present services. Because of wide …

Securing wireless sensor networks against denial‐of‐sleep attacks using RSA cryptography algorithm and interlock protocol

R Fotohi, S Firoozi Bari, M Yusefi - International Journal of …, 2020 - Wiley Online Library
Wireless sensor networks (WSNs) have been vastly employed in the collection and
transmission of data via wireless networks. This type of network is nowadays used in many …

Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles

M Faraji-Biregani, R Fotohi - The journal of supercomputing, 2021 - Springer
Unmanned aerial vehicles (UAVs) can be deployed to monitor very large areas without the
need for network infrastructure. UAVs communicate with each other during flight and …

A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms

R Fotohi, S Firoozi Bari - The Journal of Supercomputing, 2020 - Springer
Wireless sensor networks (WSNs) contain numerous nodes that their main goals are to
monitor and control environments. Also, sensor nodes distribute based on network usage …

Elephant herding optimization Ad Hoc on-demand multipath distance vector routing protocol for MANET

S Sarhan, S Sarhan - IEEE Access, 2021 - ieeexplore.ieee.org
Energy consumption always represents a challenge in the ad hoc networks which spurred
the researchers to benefit from the bio-inspired algorithms and their fitness functions to …

Adaptive routing protocol in mobile ad-hoc networks using genetic algorithm

N Shah, H El-Ocla, P Shah - IEEE Access, 2022 - ieeexplore.ieee.org
Mobile Adhoc Network (MANET) is a wireless network in which data is transferred in a
forwarding direction from the source node to the destination node via multiple intermediate …

NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things

B Seyedi, R Fotohi - The Journal of Supercomputing, 2020 - Springer
Abstract Internet of Things (IoTs) is a new concept in computer science that connects the
objects with limited resources to unreliable internet through different technologies. The …