scholarly journals Cheetah chase algorithm (CCA): a nature-inspired metaheuristic algorithm

2018 ◽  
Vol 7 (3) ◽  
pp. 1804
Author(s):  
M Goudhaman

In recent years, appreciable attention among analysts to take care of the extraordinary enhancement issues utilizing metaheuristic algorithms in the domain area of Swarm Intelligence. Many metaheuristic algorithms have been developed by inspiring various nature phenomena’s. Exploration and exploitation are distinctive capacities and confine each other, along these lines, customary calculations require numerous parameters and bunches of expenses to accomplish the adjust, and furthermore need to modify parameters for various enhancement issues. In this paper, another populace based algorithm, the Cheetah Chase Algorithm (CCA), is presented. Distinctive features of Cheetah and their characteristics has been the essential motivation for advancement of this optimization algorithm. Cheetah Chase Algorithm (CCA) has awesome capacities both in exploitation and exploration, is proposed to address these issues. To start with, CCA endeavours to locate the optimal solution in the assigned hunt territory. It at that point utilizes history data to pursue its prey. CCA can, hence, decide the situation of the worldwide ideal. CCA accomplishes solid exploitation and exploration with these highlights. Additionally, as indicated by various issues, CCA executes versatile parameter change. The self-examination and analysis of this exploration show that each CCA capacity can have different beneficial outcomes, while the execution correlation exhibits CCAs predominance over conventional metaheuristic algorithms. The proposed Cheetah Chase Algorithm is developed by the process of hunting and chasing of Cheetah to capture its prey with the parameters of high speed, velocity and greater accelerations.  

Author(s):  
Noor Syahirah Nordin ◽  
Mohd Arfian Ismail ◽  
Tole Sutikno ◽  
Shahreen Kasim ◽  
Rohayanti Hassan ◽  
...  

<div>Phishing attack is a well-known cyber security attack that happens to many people around the world. The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. One of the methods is applying fuzzy system. Fuzzy system is a rule-based system that utilize fuzzy sets and fuzzy logic concept to solve problems. However, it is hard to achieve optimal solution when applied to complex problem where the process of identify the fuzzy parameter becomes more complicated. To cater this issue, an optimization method is needed to identify the parameter of fuzzy automatically. The optimization method derives from the metaheuristic algorithm. Therefore, the aim of this study is to make a comparative analysis between the metaheuristic algorithms in fuzzy modelling. The study was conducted to analyse which algorithm performed better when applied in two datasets: website phishing dataset (WPD) and phishing websites dataset (PWD). Then the results were obtained to show the performance of every metaheuristic algorithm in terms of convergence speed and four metrics including accuracy, recall, precision, and f-measure. </div>


2018 ◽  
Vol 11 (1) ◽  
pp. 26 ◽  
Author(s):  
Mahdi Bidar ◽  
Samira Sadaoui ◽  
Malek Mouhoub ◽  
Mohsen Bidar

Exploitation and exploration are two main search strategies of every metaheuristic algorithm. However, the ratio between exploitation and exploration has a significant impact on the performance of these algorithms when dealing with optimization problems. In this study, we introduce an entire fuzzy system to tune efficiently and dynamically the firefly algorithm parameters in order to keep the exploration and exploitation in balance in each of the searching steps. This will prevent the firefly algorithm from being stuck in local optimal, a challenge issue in metaheuristic algorithms. To evaluate the quality of the solution returned by the fuzzy-based firefly algorithm, we conduct extensive experiments on a set of high and low dimensional benchmark functions as well as two constrained engineering problems. In this regard, we compare the improved firefly algorithm with the standard one and other famous metaheuristic algorithms. The experimental results demonstrate the superiority of the fuzzy-based firefly algorithm to standard firefly and also its comparability to other metaheuristic algorithms.


2010 ◽  
Vol 34-35 ◽  
pp. 1314-1318
Author(s):  
Xin Hua Wang ◽  
Shou Qiang Hu ◽  
Qian Yi Ya ◽  
Shu Wen Sun ◽  
Xiu Xia Cao

Structure and principle of a new kind of diphase opposition giant magnetostrictive self-sensing actuator (SSA for short) is introduced, for which a kind of double outputs high-precision NC stable voltage power is designed. With the method of combining with the hardware design and the software setting, the controllability and reliability of the actuator are greatly improved. And the whole design becomes more reasonable, which saves the cost and improves the practicability. In addition, based on the micro controller unit (MCU) with high-speed control, the scheme design of the real-time separation circuit for dynamic balance signal can effectively identify out and pick up the self-sensing signal which changes from foreign pressure feed back. Then the SSA real-time, dynamic and accurately control is realized. The experiment results show that the voltage power can high-speed and accurately output both output voltages with high current, and that the self-sensing signal decoupling circuit can isolate the self-sensing signals without distortion


Energies ◽  
2020 ◽  
Vol 13 (19) ◽  
pp. 5097
Author(s):  
Gianfranco Chicco ◽  
Andrea Mazza

In the power and energy systems area, a progressive increase of literature contributions that contain applications of metaheuristic algorithms is occurring. In many cases, these applications are merely aimed at proposing the testing of an existing metaheuristic algorithm on a specific problem, claiming that the proposed method is better than other methods that are based on weak comparisons. This ‘rush to heuristics’ does not happen in the evolutionary computation domain, where the rules for setting up rigorous comparisons are stricter but are typical of the domains of application of the metaheuristics. This paper considers the applications to power and energy systems and aims at providing a comprehensive view of the main issues that concern the use of metaheuristics for global optimization problems. A set of underlying principles that characterize the metaheuristic algorithms is presented. The customization of metaheuristic algorithms to fit the constraints of specific problems is discussed. Some weaknesses and pitfalls that are found in literature contributions are identified, and specific guidelines are provided regarding how to prepare sound contributions on the application of metaheuristic algorithms to specific problems.


Ritið ◽  
2019 ◽  
Vol 19 (1) ◽  
pp. 223-254
Author(s):  
Soffía Auður Birgisdóttir

This article deals with the authorship of Elísabet Kristín Jökulsdóttir, with special emphasis on the autofictional novel Heilræði lásasmiðsins (The locksmith’s advice), as well as other works that are based on autobiographical material. Elísabet writes a lot about the female body, its desires and erotic longings, as well as how helpless and weak it can be in particular situations. Her writing on the self, body and sexuality centres on the opposition between love and rejection. The desire for love is the driving force behind her writing and a deep and ruthless self-examination is at work in her fictional world. This desire is closely connected to the female body and sexual drive and Elísabet scrutinizes the nature of ‚femininity‘ and asks what it means to be ,a woman‘. Elísabet describes the female body in all its nakedness and vulnerability and shows how the body is the battleground where the main conflicts between self and others take place. Elísabet frequently describes two oppositional worlds in her works. There are conflicts between the magical world and reality, the father and the mother, the child and the grown-up, psychological difficulties and ‚sanity‘. a divided self is a persistent theme in her writings, as well as the struggle to remain on the right side of the „borders“, which are frequently mentioned. Elísabet’s writings reveal a struggle for marking a place for oneself in the world, to be heard and seen, to be able to createand recreate the self and through her writing, she copes with existence and difficulties that are rooted in childhood. Through writing, she finds a way out and the writing process serves as self-analysis and therapy. In her works Elísabet also creates her own personal mythology, which she connects with women’s struggle for self-realization, freedom and social space. The analysis of Elísabet’s works is inspired by the writings of feminist scholars, such as Simone de Beauvoir, Kate millett and Hélène Cixous.


2004 ◽  
Vol 20 (6) ◽  
pp. 479-492
Author(s):  
A. N. Veselkov ◽  
R. J. Eaton ◽  
V. I. Pahomov ◽  
O. V. Rogova ◽  
V. S. Volynkin ◽  
...  

2020 ◽  
Vol 2020 ◽  
pp. 1-20
Author(s):  
Zhan Xing ◽  
Jianhui Lin ◽  
Yan Huang ◽  
Cai Yi

The feature extraction of wheelset-bearing fault is important for the safety service of high-speed train. In recent years, sparse representation is gradually applied to the fault diagnosis of wheelset-bearing. However, it is difficult for traditional sparse representation to extract fault features ideally when some strong interference components are imposed on the signal. Therefore, this paper proposes a novel feature extraction method of wheelset-bearing fault based on the wavelet sparse representation with adaptive local iterative filtering. In this method, the adaptive local iterative filtering reduces the impact of interference components effectively and contributes to the extraction of sparse impulses. The wavelet sparse representation, which adopts L1-regularized optimization for a globally optimal solution in sparse coding, extracts intrinsic features of fault in the wavelet domain. To validate the effectiveness of this proposed method, both simulated signals and experimental signals are analyzed. The results show that the fault features of wheelset-bearing are sufficiently extracted by the proposed method.


Sign in / Sign up

Export Citation Format

Share Document