The core goal of this paper is to identify guidance on how the research community can better transition their research into payment card fraud detection towards a transformation away …
Internet of vehicles (IoV) is a branch of the internet of things (IoT) which is used for communication among vehicles. As vehicular nodes are considered always in motion …
The human body has been, and will continue to be, a source of inspiration for researchers across various disciplines owing to its robustness and myriad of functions. While some of …
Q Liu, L Wu, W Xiao, F Wang, L Zhang - Applied Soft Computing, 2018 - Elsevier
Abstract The Bat Algorithm (BA), which is a global optimization method, performs poorly on complex continuous optimization problems due to BA's disadvantages such as the …
L Huang, Y Ding, MC Zhou, Y Jin… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Multiple solutions are often needed because of different kinds of uncertain failures in a plan execution process and scenarios for which precise mathematical models and constraints are …
In this paper, a comprehensive survey of evolutionary computation (EC) methods for cybersecurity of mobile ad hoc networks (MANETs) is presented. Typically, EC methods are …
F Zareen, R Karam - 2018 Asian Hardware Oriented Security …, 2018 - ieeexplore.ieee.org
Security assurance in a computer system can be viewed as distinguishing between self and non-self. Artificial Immune Systems (AIS) are a class of machine learning (ML) techniques …
Gene clustering is a prerequisite in the analysis of microarray data where sets of co- expressed genes are clustered. In this paper, a multi-objective clonal selection optimization …
L Doğan, U Yüzgeç - Proceedings-International Conference on …, 2018 - indexive.com
Path planning problem plays an important role in mobile robot works. The robotic systems use intelligence algorithms to plan the path of the robot from one point to the other point. The …