Knowledge worker scheduling optimization model based on bacterial foraging algorithm

Y Dan, J Tao - Future Generation Computer Systems, 2021 - Elsevier
Bacterial foraging algorithm comes from the best survival selection mechanism of animals in
nature. As the representative of the heuristic algorithm, the bacterial foraging algorithm has …

[HTML][HTML] Power and Energy Losses in Medium-Voltage Power Grids as a Function of Current Asymmetry—An Example from Poland

G Hołdyński, Z Skibko, W Walendziuk - Energies, 2024 - mdpi.com
In connection with the growing requirements regarding the quality and continuity of energy
supply and the dynamic development of renewable energy sources, the need for a thorough …

Optimal Phase Arrangement of Distribution Transformers for System Unbalance Improvement and Loss Reduction

CS Tu, MT Tsai - Energies, 2020 - mdpi.com
This paper presents an efficient strategy for transformer planning to reduce the system
losses by means of transformer rearrangement. The customer connected to the distribution …

Enhancement three-pass protocol security with combination caesar cipher and vigenere cipher

R Rahim, MA Rosid, AS Fitrani, AD GS… - Journal of Physics …, 2019 - iopscience.iop.org
Key-based security is still the most widely used form of security today with a key distribution
process between senders and receivers that is commonly perform and also it is a classic …

[PDF][PDF] Embedding the three pass protocol messages into transmission control protocol header

S Suherman, D Dikmawanto, S Hasan, M Al-Akaidi - 2021 - academia.edu
Transmission control protocol provides reliable communication between two or more parties.
Each transmitted packet is acknowledged to make sure successful deliveries. Transport …

Feature Selection Techniques Using Improved Bacterial Forage Optimization Algorithm for Network Intrusion Detection System

R Rajeshwari, MP Anuradha - Journal of Electrical Systems, 2024 - search.proquest.com
The increasing interconnections and accessibility of computing devices have become
essential for improving our day-to-day operations. Distributed denial of services (DDoS) …

A Review on Cryptography Protocol for Securing Data

R Rahim - Journal of Physics: Conference Series, 2019 - iopscience.iop.org
Cryptography is one type of protection that is widely used to secure information, encryption
and decryption and the use of keys is a common process used to secure information; and …

Normalized scores for routes in MANET to analyze and detect collaborative blackhole attack

A Bajpai, S Nigam - Smart and Innovative Trends in Next Generation …, 2018 - Springer
The divergent Ad-hoc network environs are exposed to various intrusions and threats like
Black hole and Gray hole. These intrusions are hard to detect as the intruders attract the …

一种基于细菌觅食优化算法的舌体分割算法

朱峰, 戴璞微, 潘斌, 郭小明, 王玉铭, 钟凡 - 图学学报, 2019 - txxb.com.cn
针对医学舌体数字图像的准确分割, 提出了一种基于细菌觅食优化算法(BFOA) 和Snake
活动轮廓模型相组合的舌体分割算法. 首先, 以信息熵与Kapur 算法相结合作为自适应函数来 …

Q-learning-based adaptive bacterial foraging optimization

B Niu, B Xue - Machine Learning for Cyber Security: Third …, 2020 - Springer
As a common biological heuristic algorithm, Bacterial Foraging Optimization (BFO) is often
used to solve optimization problems. Aiming at increasing the solution accuracy and …