An improved equilibrium optimization algorithm for feature selection problem in network intrusion detection

ZA Varzaneh, S Hosseini - Scientific Reports, 2024 - nature.com
In this paper, an enhanced equilibrium optimization (EO) version named Levy-opposition-
equilibrium optimization (LOEO) is proposed to select effective features in network intrusion …

[HTML][HTML] Development of an Improved GWO Algorithm for Solving Optimal Paths in Complex Vertical Farms with Multi-Robot Multi-Tasking

J Shen, TS Hong, L Fan, R Zhao, MKA Mohd Ariffin… - Agriculture, 2024 - mdpi.com
As the global population grows, achieving Zero Hunger by 2030 presents a significant
challenge. Vertical farming technology offers a potential solution, making the path planning …

DTSA: Dynamic Tree-Seed Algorithm with Velocity-Driven Seed Generation and Count-Based Adaptive Strategies

J Jiang, J Huang, J Wu, J Luo, X Yang, W Li - Symmetry, 2024 - mdpi.com
The Tree-Seed Algorithm (TSA) has been effective in addressing a multitude of optimization
issues. However, it has faced challenges with early convergence and difficulties in …

A Hybrid Approach Based on LMP and VCG Mechanism to Create a Positive Interaction Between Distribution Companies and Owners of DG Units

SAM Lahaghi, B Zaker… - … on Smart Grid …, 2024 - ieeexplore.ieee.org
Nowadays, with the expansion of electric energy distribution networks and the increasing
penetration of distributed generation (DG) units in these systems, the existence of a solution …

Grey Wolf optimizer for efficient feature selection in robotic systems

K Obaideen, M AlShabi, M Bettayeb… - … Optical Metrology and …, 2024 - spiedigitallibrary.org
This paper offers an investigation of Grey Wolf Optimizer (GWO) in robotic systems, using
bibliometric data and VOSviewer analysis from 2016 to 2023. These years represent a …

An Enhanced Sine Cosine Algorithm for Feature Selection in Network Intrusion Detection

Z Asgari Varzaneh, S Hosseini - Computer and Knowledge Engineering, 2024 - cke.um.ac.ir
For computer networks to remain secure, intrusion detection is essential. Analyzing network
traffic data is part of this activity to spot possible cyber threats. However, the curse of …