Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2022
A synergic quantum particle swarm optimisation for constrained combinatorial test generation
AbstractCombinatorial testing (CT) can efficiently detect failures caused by interactions of parameters of software under test. The CT study has undergone a transition from traditional CT to constrained CT, which is crucial for real‐world systems ...
- research-articleJanuary 2022
Exact and Approximation Algorithms for the Expanding Search Problem
INFORMS Journal on Computing (INFORMS-IJOC), Volume 34, Issue 1Pages 281–296https://doi.org/10.1287/ijoc.2020.1047Suppose a target is hidden in one of the vertices of an edge-weighted graph according to a known probability distribution. Starting from a fixed root node, an expanding search visits the vertices sequentially until it finds the target, where the next ...
- research-articleSeptember 2021
Soil moisture content prediction model for tea plantations based on SVM optimised by the bald eagle search algorithm
Cognitive Computation and Systems (CCS2), Volume 3, Issue 4Pages 351–360https://doi.org/10.1049/ccs2.12034AbstractIn order to solve the problem of low accuracy and efficiency of soil moisture content prediction in tea plantations and improve the level of soil water content prediction, a soil moisture content prediction model for tea plantations based on the ...
- research-articleJuly 2021
Wavelet method optimised by ant colony algorithm used for extracting stable and unstable signals in intelligent substations
CAAI Transactions on Intelligence Technology (CIT2), Volume 7, Issue 2Pages 292–300https://doi.org/10.1049/cit2.12054AbstractPartial discharge (PD) signals are an important index to evaluate the operation state of intelligent substations. The correct distinction of PD pulse and interference pulse has become a challenging task. Because of the noise and the low signal‐...
- research-articleMay 2021
Software defect prediction based on stacked sparse denoising autoencoders and enhanced extreme learning machine
AbstractSoftware defect prediction is an important software quality assurance technique. Nevertheless, the prediction performance of the constructed model is easily susceptible to irrelevant or redundant features in the software projects and is not ...
-
- research-articleMay 2021
A new population initialisation method based on the Pareto 80/20 rule for meta‐heuristic optimisation algorithms
AbstractIn this research, a new method for population initialisation in meta‐heuristic algorithms based on the Pareto 80/20 rule is presented. The population in a meta‐heuristic algorithm has two important tasks, including pushing the algorithm toward the ...
- research-articleMay 2021
A new localization method based on improved particle swarm optimization for wireless sensor networks
AbstractWireless sensor network (WSN) node localisation technology based on received signal strength indication (RSSI) is widely used as it does not need additional hardware devices. The ranging accuracy of RSSI is poor, and the particle swarm ...
- research-articleApril 2021
Modified branch‐and‐bound algorithm for unravelling optimal PMU placement problem for power grid observability: A comparative analysis
CAAI Transactions on Intelligence Technology (CIT2), Volume 6, Issue 4Pages 450–470https://doi.org/10.1049/cit2.12038AbstractSafe operation of the power grid requires a complete and robust control network to ensure full observability. However, redundancy measurements can create problems in expense, management, and control. The optimal phasor measurement unit (PMU) ...
- research-articleMarch 2021
Bat optimization algorithm for wrapper‐based feature selection and performance improvement of android malware detection
AbstractAndroid malware is a serious threat to the mobile users and their data. The losses incurred are unimaginable, which stretch to the extent of identity theft, financial loss, sensitive information loss, espionage, sabotage, cyber fraud, to mention a ...
- research-articleJanuary 2021
Searching relevant papers for software engineering secondary studies: Semantic Scholar coverage and identification role
AbstractSearching relevant papers is a fundamental task for the elaboration of secondary studies. This task is known to be tedious and time‐consuming when it is made manually, especially with the presence of several academic repositories. Recently, ...
- research-articleDecember 2020
Time‐specific encrypted range query with minimum leakage disclosure
AbstractA time‐specific encrypted range query scheme that has the following properties is proposed. (1) The proposed scheme has trapdoor privacy and data privacy so that a semi‐honest cloud is not able to get any useful information from given ciphertexts ...
- research-articleDecember 2020
An upgraded fruit fly optimisation algorithm for solving task scheduling and resource management problem in cloud infrastructure
AbstractIn this manuscript, an upgraded Fruit Fly Optimization Algorithm (FFOA) is proposed for optimising task scheduling and resource management processes. The proposed FOA algorithm is utilized to address the issues. In the proposed algorithm, every ...
- research-articleFebruary 2021
Likelihood ascent search augmented sphere decoding receiver for MIMO systems using M‐QAM constellations
IET Communications (CMU2), Volume 14, Issue 22Pages 4152–4158https://doi.org/10.1049/iet-com.2019.1316MIMO systems employing sphere decoding (SD) algorithm are known to achieve near maximum likelihood (ML) performance at a reduced complexity by restricting the candidate search space to a sphere of a certain radius. The performance of SD depends on the ...
- research-articleFebruary 2021
Robust underlay cognitive network download beamforming in multiple users, multiple groups multicell scenario
- Ahmed Al‐Asadi,
- Muthana Al‐Amidie,
- Saddam K. Alwane,
- Hayder M. Albehadili,
- Ronald G. McGarvey,
- and Naz E. Islam
IET Communications (CMU2), Volume 14, Issue 21Pages 3934–3943https://doi.org/10.1049/iet-com.2020.0572Achieving high quality of service (QOS) at the end‐users while maintaining the low interference power at the primary users is the main goal in underlay cognitive radio networks. This goal becomes a more difficult task in the designing of beamforming ...
- research-articleFebruary 2021
Energy efficiency maximisation based on RALA protocol for underlay D2D communication
IET Communications (CMU2), Volume 14, Issue 21Pages 3828–3836https://doi.org/10.1049/iet-com.2020.0558Energy efficiency (EE) maximisation is one of the most important necessities of the fifth‐generation (5G) wireless networks. In this study, both power allocation and channel assignment issues for the cellular network underlaid with device to device (D2D) ...
- research-articleNovember 2020
Heuristic approach for jointly optimising FeICIC and UAV locations in multi‐tier LTE‐advanced public safety HetNet
IET Communications (CMU2), Volume 14, Issue 20Pages 3585–3598https://doi.org/10.1049/iet-com.2019.1315Unmanned aerial vehicles (UAVs) enabled networks can enhance wireless connectivity and support emerging services. However, this would require system‐level understanding to modify and extend the existing terrestrial network infrastructure. In this study, ...
- research-articleNovember 2020
Multi‐objective design of energy harvesting enabled wireless networks based on evolutionary genetic optimisation
Sustainable operation of energy‐restrained wireless network services requires multiple objectives to be satisfied synchronously. Among these objectives, reduced spectrum outage, energy conservation, and minimal packet transmission failures considerably ...
- research-articleOctober 2020
Delay aware scheduling in UAV‐enabled OFDMA mobile edge computing system
IET Communications (CMU2), Volume 14, Issue 18Pages 3203–3211https://doi.org/10.1049/iet-com.2020.0274In infrastructure‐less scenarios such as rural environments, wild emergency response, military applications and disaster relief, unmanned aerial vehicles (UAVs) are capable of providing enhanced mobile edge computing (MEC) services for ground users. ...
- research-articleOctober 2020
Enhancing multi‐tenancy security in the cloud computing using hybrid ECC‐based data encryption approach
IET Communications (CMU2), Volume 14, Issue 18Pages 3212–3222https://doi.org/10.1049/iet-com.2020.0255In this study, elliptic curve cryptography (ECC) is elected for tenant authentication, data encryption, and data decryption due to its minimum key size. The proposed ECC‐based authentication approach allows the authorised person to access private data; ...
- research-articleSeptember 2020
Effective PAPR reduction in SCFDM‐based massive MIMO system using binary crow search algorithm for visible light communication towards 5G networks
IET Communications (CMU2), Volume 14, Issue 16Pages 2780–2785https://doi.org/10.1049/iet-com.2020.0334Presently, the single‐carrier frequency division multiplexing (SCFDM)‐based visible light communication (VLC) system is extensively implemented for secure and high‐speed data transmission. However, the effect of additive white Gaussian noise in VLC with ...