全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Nipotepat Muangkote , Khamron Sunat , Sirapat Chiewchanwattana ...
来源:[J].Renewable Energy(IF 2.989), 2019, Vol.134, pp.1129-1147Elsevier
摘要:... In recent years, the evolutionary algorithm (EA), swarm intelligence (SI), and other nature-inspired (NI) algorithms have been widely used for the parameters extraction of PV modules. This paper presents a new method by improving the existing R cr -IJADE with an onlooker-rank...
作者:Liliana Pérez , Suzana Dragićević
来源:[J].Ecological Informatics(IF 1.961), 2010, Vol.6 (1), pp.62-72Elsevier
摘要:... Intelligent reasoning is introduced by a swarm intelligence (SI) algorithm integrated with the ABM that depicts indirect communication, collective behaviour and self-organized aggregation of insects in a forest ecosystem. The objectives of this study are the following: 1) to ...
作者:Judhisthir Dash , Bivas Dam , Rajkishore Swain
来源:[J].Engineering Applications of Artificial Intelligence(IF 1.625), 2019, Vol.79, pp.87-99Elsevier
摘要:... This work proposes the automatic realization of narrow-width digital signal tuning over its complete range employing most popular artificial swarm intelligence (SI) in order to fulfill different modern signal processing and communication network applications. Modern SI acts a...
作者:M. Ashwin , S. Kamalraj , M. Azath
来源:[J].Cluster Computing(IF 0.776), 2019, Vol.22 (5), pp.10687-10695Springer
摘要:... Swarm intelligence (SI) is an efficient option for optimizing routing in a complex network situation, where traditional routing strategies come up short. Particle swarm optimization (PSO) employs the concept of social interactions to get optimal solutions. Simulation resul...
作者:Z. Z. Abidin , M. R. Arshad , U. K. Ngah
来源:[J].Artificial Intelligence Review(IF 1.565), 2015, Vol.43 (4), pp.501-514Springer
摘要:... Any natural system that congregates as a result of some form of collective intelligence of nature is also known as swarm intelligence (SI). This metaphor inspires a variety of techniques to solve the problem of calculating, in most cases dealing with optimization problems ...
作者:Majad Mansoor , Adeel Feroz Mirza , Qiang Ling ...
来源:[J].Solar Energy(IF 2.952), 2020, Vol.198, pp.499-518Elsevier
摘要:Abstract(#br)Recently depletion of fossil fuels and environmental concerns triggered the extensive research on alternative energy resources, paricularly solar energy. The power of PV systems may be decreased by the oscillation, random fluctuation, and slow speed of their pow...
作者:Waheed A. H. M. Ghanem , Aman Jantan
来源:[J].Neural Processing Letters(IF 1.24), 2020, Vol.51 (2), pp.905-946Springer
摘要:Abstract(#br)Arguably the most recurring issue concerning network security is building an approach that is capable of detecting intrusions into network systems. This issue has been addressed in numerous works using various approaches, of which the most popular one is to consider ...
作者:S. Raju , M. Chandrasekaran
来源:[J].Cluster Computing(IF 0.776), 2019, Vol.22 (5), pp.12263-12274Springer
摘要:... The swarm intelligence is defined as the behaviour of the artificial, natural, self-organized and decentralized systems. The multi-objective optimization (MOO) also known as the vector optimization is optimized in place of a single objective. The artificial fish swarm optimiz...
作者:Wei-Chang Yeh
来源:[J].Knowledge-Based Systems(IF 4.104), 2015, Vol.82, pp.60-69Elsevier
摘要:Abstract(#br)This paper introduces an improved simplified swarm optimization (iSSO) by undertaking a major revision of the update mechanism (UM) of traditional SSO. To test its performance, the proposed iSSO is compared with another recently introduced swarm-based algorithm, the ...
作者:Marjan Kuchaki Rafsanjani , Hamideh Fatemidokht
来源:[J].AEUE - International Journal of Electronics and Communications(IF 0.551), 2015, Vol.69 (11), pp.1613-1621Elsevier
摘要:... Bio/Nature-inspired routing algorithms (Swarm Intelligence) such as BeeAdHoc have been offered for developing routing algorithms for MANETs. In this paper, the security vulnerabilities of BeeAdHoc are investigated and then a security framework, FBeeAdHoc, which utilizes fuzzy...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×