Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2020
Exploiting heterogeneity for cost efficient 5G base station deployment using meta‐heuristics
A key concern in the design of 5G is the radio access network, which is expected to be significantly denser and more advanced, with considerably higher infrastructure and power consumption cost than that of conventional mobile network standards. Novel ...
- research-articleSeptember 2020
Integral cryptanalysis on two block ciphers Pyjamask and uBlock
IET Information Security (ISE2), Volume 14, Issue 5Pages 572–579https://doi.org/10.1049/iet-ifs.2019.0624The integral cryptanalysis is a powerful cryptanalytic technique for the security evaluation of block cipher. However, when using the MILP‐aided division property to search the integral distinguishers, many candidates of initial division properties need ...
- research-articleAugust 2020
Efficient improved ant colony optimisation algorithm for dynamic software rejuvenation in web services
Software rejuvenation is an effective technique to counteract software ageing in continuously‐running applications such as web‐service‐based systems. In a client‐server application, where the server is intended to run perpetually, rejuvenation of the ...
- research-articleJuly 2020
Optimal frequency reuse scheme based on cuckoo search algorithm in Li‐Fi fifth‐generation bidirectional communication
IET Communications (CMU2), Volume 14, Issue 15Pages 2554–2563https://doi.org/10.1049/iet-com.2019.1154Huge demand for bandwidth and capacity is exhibited by various wireless users and applications, for that purpose now the light‐fidelity (Li‐Fi)‐based technologies are developing. In visible light communication, the hybrid networks based on Wi‐Fi and Li‐Fi ...
- research-articleJuly 2020
FHCS: Hybridised optimisation for virtual machine migration and task scheduling in cloud data center
IET Communications (CMU2), Volume 14, Issue 12Pages 1942–1948https://doi.org/10.1049/iet-com.2019.1149Cloud computing and virtualisation are recent approaches to develop minimum energy usage in virtualised cloud data centre (DC) for resource management. One of the major problems faced by cloud DCs is energy consumption which increases the cost of cloud ...
- research-articleMay 2020
Optimal bit allocation scheme for distributed detection system with imperfect channels
IET Communications (CMU2), Volume 14, Issue 8Pages 1349–1359https://doi.org/10.1049/iet-com.2019.0664There are two main classes of decision fusion methods, namely hard decision fusion (HD) and soft decision fusion (SD), in which the number of bits transmitted by each local sensor to the fusion centre (FC) is always same, namely one bit in HD and n (n ≥ 2)...
- research-articleApril 2020
Multiple software product lines to configure applications of internet of things
- Guadalupe-Isaura Trujillo-Tzanahua,
- Ulises Juárez-Martínez,
- Alberto-Alfonso Aguilar-Lasserre,
- María-Karen Cortés-Verdín,
- Catherine Azzaro-Pantel
Software product lines (SPL) emulate the industrial production lines that are capable of generating large volumes of products through reuse schemes and mass production. A multi product line (MPL) aims to reuse of several SPL. Feature models are often used ...
- research-articleApril 2020
Maximising network lifetime and energy efficiency of wireless sensor network using group search Ant lion with Levy flight
Wireless sensor network (WSN) is one of the emerging techniques, providing pervasive computing for different implementations. Some of the renowned problems in WSN are energy consumption, as well as, the extension of network lifetime. Moreover, cluster ...
- research-articleMarch 2020
Framework for faster key search using related‐key higher‐order differentialproperties: applications to Agrasta
IET Information Security (ISE2), Volume 14, Issue 2Pages 202–209https://doi.org/10.1049/iet-ifs.2019.0326The relevance of the related‐key model is usually controversial. However, in some cases, related‐key properties have already been used to reduce the effective key length of the cipher in the single‐key model. Hence, research into this direction can be ...
- research-articleMarch 2020
QOSTBC coded MIMO system with reduced complexity and optimised decoding for rank deficient channels
In multiple‐input multiple‐output (MIMO) systems, rank deficient channels are the most common and key areas of research. In these channels, the number of transmit antennas (MTx) is higher than receive antennas (MRx) and subsequently the unknown variables ...
- research-articleFebruary 2020
Scheme for tour planning of mobile sink in wireless sensor networks
Exploiting mobile sink (MS) for data gathering in the wireless sensor networks has been extensively studied in the recent researches to address energy‐hole issues, thereby facilitating balanced energy consumption among nodes and so prolonging network ...
- research-articleJanuary 2020
Implementing confidential transactions with lattice techniques
IET Information Security (ISE2), Volume 14, Issue 1Pages 30–38https://doi.org/10.1049/iet-ifs.2018.5491The notion of confidential transactions plays a central role in ensuring the confidentiality of transaction amounts in a block‐chain‐based cryptocurrency. Past researches have confirmed that the access policy of transaction amounts influences the ...
- research-articleDecember 2019
Are MAs profitable to search‐based PLA design?
- João Choma Neto,
- Cristiano da Silva Herculano,
- Thelma Elita Colanzi,
- Aline Maria Malachini Miotto Amaral
The architectural properties of product‐line architecture (PLA) design have been successfully optimised by multi‐objective genetic algorithms (GAs). Memetic algorithms (MAs) extend GA by adding a local search after the global search process. MA ...
- research-articleOctober 2019
Search‐based software engineering for optimising usability of user interfaces within model transformations
Search‐based Software Engineering stands for an important area of research which involves finding optimal solutions for software engineering problems according to a set of conflicting objectives. One of these problems is improving the software quality ...
- research-articleAugust 2019
Cooperative scheduling of multi‐core and cloud resources: multi‐thread‐based MCC offloading strategy
IET Communications (CMU2), Volume 13, Issue 14Pages 2146–2154https://doi.org/10.1049/iet-com.2019.0270Modern multi‐core mobile devices are the main application objects of mobile cloud computing (MCC). In previous works, researchers have formulated various heuristic algorithms to solve the NP problem. This work combines MCC with multi‐threaded computing (...
- research-articleJuly 2019
TLBO with variable weights applied to shop scheduling problems
CAAI Transactions on Intelligence Technology (CIT2), Volume 4, Issue 3Pages 148–158https://doi.org/10.1049/trit.2018.1089The teaching–learning‐based optimisation (TLBO) algorithm is a population‐based metaheuristic inspired on the teaching–learning process observed in a classroom. It has been successfully used in a wide range of applications. In this study, the authors ...
- research-articleJune 2019
Efficient discrete firefly algorithm for Ctrie based caching of multiple sequence alignment on optimally scheduled parallel machines
CAAI Transactions on Intelligence Technology (CIT2), Volume 4, Issue 2Pages 92–100https://doi.org/10.1049/trit.2018.1040This study introduces a two‐level strategy for efficient execution of multiple sequence alignment (MSA) of complex heterogeneous sequences. The two levels of the proposed technique are comprised of: designing the discrete firefly algorithm (DFFA) for the ...
- research-articleApril 2019
Mixed construction of OOC for optical code division multiple access networks
Optical orthogonal codes play an important role in optical code division multiple access networks and optical wireless systems. In this study, by combining combinatorial design and meta‐heuristic search algorithm, a mixed construction of (v,k,1)‐OOCs is ...
- research-articleFebruary 2019
Maximum entropy searching
CAAI Transactions on Intelligence Technology (CIT2), Volume 4, Issue 1Pages 1–8https://doi.org/10.1049/trit.2018.1058This study presents a new perspective for autonomous mobile robots path searching by proposing a biasing direction towards causal entropy maximisation during random tree generation. Maximum entropy‐biased rapidly‐exploring random tree (ME‐RRT) is proposed ...
- research-articleNovember 2018
Fast feature matching based on r ‐nearest k ‐means searching
CAAI Transactions on Intelligence Technology (CIT2), Volume 3, Issue 4Pages 198–207https://doi.org/10.1049/trit.2018.1041Feature matching has been frequently applied in computer vision and pattern recognition. In this paper, the authors propose a fast feature matching algorithm for vector‐based feature. Their algorithm searches r ‐nearest neighborhood clusters for the query ...