A binary reptile search algorithm based on transfer functions with a new stochastic repair method for 0–1 knapsack problems
Abstract The Reptile Search Algorithm (RSA), inspired by crocodiles' hunting behavior, is a
recently introduced nature-inspired algorithm. Although the original version of the RSA …
recently introduced nature-inspired algorithm. Although the original version of the RSA …
Recent metaheuristic algorithms with genetic operators for high-dimensional knapsack instances: A comparative study
M Abdel-Basset, R Mohamed, OM Elkomy… - Computers & Industrial …, 2022 - Elsevier
As a new attempt to effectively tackle the high-dimensional 0–1 knapsack (01KP) instances
with uncorrelated, weakly-correlated, and strongly-correlated characteristics, in this paper …
with uncorrelated, weakly-correlated, and strongly-correlated characteristics, in this paper …
[HTML][HTML] A novel binary Kepler optimization algorithm for 0–1 knapsack problems: Methods and applications
M Abdel-Basset, R Mohamed, IM Hezam… - Alexandria Engineering …, 2023 - Elsevier
The 0–1 Knapsack problem is a non-deterministic polynomial-time-hard combinatorial
optimization problem that cannot be solved in reasonable time using traditional methods …
optimization problem that cannot be solved in reasonable time using traditional methods …
Selective disassembly sequence planning under uncertainty using trapezoidal fuzzy numbers: A novel hybrid metaheuristic algorithm
X Zhang, A Fu, C Zhan, DT Pham, Q Zhao… - … Applications of Artificial …, 2024 - Elsevier
Nowadays, recycling end-of-life (EoL) products has emerged as a vital approach to address
resource scarcity. Within the recycling process, disassembly plays a pivotal role and has …
resource scarcity. Within the recycling process, disassembly plays a pivotal role and has …
A novel binary artificial jellyfish search algorithm for solving 0–1 knapsack problems
G Yildizdan, E Baş - Neural Processing Letters, 2023 - Springer
The knapsack problem is an NP-hard combinatorial optimization problem for which it is
difficult to find a polynomial-time solution. Many researchers have used metaheuristic …
difficult to find a polynomial-time solution. Many researchers have used metaheuristic …
A survey on mining and analysis of uncertain graphs
S Banerjee - Knowledge and Information Systems, 2022 - Springer
An uncertain graph (also known as probabilistic graph) is a generic model to represent
many real-world networks from social to biological. In recent times, analysis and mining of …
many real-world networks from social to biological. In recent times, analysis and mining of …
A binary ancient-inspired Giza Pyramids Construction metaheuristic algorithm for solving 0-1 knapsack problem
S Harifi - Soft Computing, 2022 - Springer
The knapsack problem is one of the combinational optimization issues. This problem is an
NP-hard problem. Soft computing methods, including the use of metaheuristic algorithms …
NP-hard problem. Soft computing methods, including the use of metaheuristic algorithms …
A Hybrid Harmony Search Algorithm with Distribution Estimation for Solving the 0‐1 Knapsack Problem
Many optimization algorithms have been applied to solve high‐dimensional instances of the
0‐1 knapsack problem. However, these algorithms often fall into a local optimization trap …
0‐1 knapsack problem. However, these algorithms often fall into a local optimization trap …
Neural network-based subway regenerative energy optimization with variable headway constraints
X Li, Z Pan, H Ma, B Zhang - IEEE Transactions on Intelligent …, 2023 - ieeexplore.ieee.org
For subway regenerative energy optimization, the essential idea is to maximize the amount
of regenerative energy absorption (AREA) between accelerating trains and braking trains by …
of regenerative energy absorption (AREA) between accelerating trains and braking trains by …
Android ransomware detection using binary Jaya optimization algorithm
M Alazab - Expert Systems, 2024 - Wiley Online Library
Ransomware is a serious security concern to mobile devices, as it prevents the use of the
device and its contents until a ransom is paid, resulting in considerable financial losses for …
device and its contents until a ransom is paid, resulting in considerable financial losses for …