An enhanced whale optimization algorithm for large scale optimization problems
S Chakraborty, AK Saha, R Chakraborty… - Knowledge-Based …, 2021 - Elsevier
Whale optimization algorithm was developed based on the prey-catching characteristics of
the humpback whales. Due to its simple structure and efficiency, the researchers employed …
the humpback whales. Due to its simple structure and efficiency, the researchers employed …
Boosting whale optimizer with quasi-oppositional learning and Gaussian barebone for feature selection and COVID-19 image segmentation
J Xing, H Zhao, H Chen, R Deng, L Xiao - Journal of bionic engineering, 2023 - Springer
Whale optimization algorithm (WOA) tends to fall into the local optimum and fails to converge
quickly in solving complex problems. To address the shortcomings, an improved WOA …
quickly in solving complex problems. To address the shortcomings, an improved WOA …
Cloud computing load prediction by decomposition reinforced attention long short-term memory network optimized by modified particle swarm optimization algorithm
Computer resources provision over the internet resulted in the wide spread usage of cloud
computing paradigm. With the use of such resources come certain challenges that can …
computing paradigm. With the use of such resources come certain challenges that can …
[HTML][HTML] Hyperparameter Tuning of Load-Forecasting Models Using Metaheuristic Optimization Algorithms—A Systematic Review
Load forecasting is an integral part of the power industries. Load-forecasting techniques
should minimize the percentage error while prediction future demand. This will inherently …
should minimize the percentage error while prediction future demand. This will inherently …
Multivariate workload and resource prediction in cloud computing using CNN and GRU by attention mechanism
J Dogani, F Khunjush, MR Mahmoudi… - The Journal of …, 2023 - Springer
The resources required to service cloud computing applications are dynamic and fluctuate
over time in response to variations in the volume of incoming requests. Proactive …
over time in response to variations in the volume of incoming requests. Proactive …
Recent advances of whale optimization algorithm, its versions and applications
Swarm intelligence (SI) is an approach inspired by natural phenomena that have been
implemented in the optimization field. This field has rapidly increased very fast recently. The …
implemented in the optimization field. This field has rapidly increased very fast recently. The …
A framework for predicting the carbonation depth of concrete incorporating fly ash based on a least squares support vector machine and metaheuristic algorithms
The carbonation of concrete structures is becoming a more serious problem as the global
CO 2 level increases, and poses a great challenge to concrete durability research. In this …
CO 2 level increases, and poses a great challenge to concrete durability research. In this …
Enhancing IoT (Internet of Things) feature selection: A two-stage approach via an improved whale optimization algorithm
Feature selection is a critical task for optimizing system performance and reducing
computational overhead in the context of Internet of Things (IoT) applications. This paper …
computational overhead in the context of Internet of Things (IoT) applications. This paper …
Multi-objective ship path planning using non-dominant relationship-based WOA in marine meteorological environment
Marine environmental issues have become increasingly prominent in recent years, and
ocean transportation has also received extensive attention. Relevant personnel is …
ocean transportation has also received extensive attention. Relevant personnel is …
Network Security Situation Prediction Model Based on VMD Decomposition and DWOA Optimized BiGRU-ATTN Neural Network
S Zhang, Q Fu, D An - IEEE Access, 2023 - ieeexplore.ieee.org
The widespread adoption of Internet-of-Things (IoT) devices has resulted in a
comprehensive transformation of human life. However, the network security challenges …
comprehensive transformation of human life. However, the network security challenges …