Studies of Computational Intelligence Based on the Behaviour of Cockroaches

2016 ◽  
pp. 1039-1086
Author(s):  
Amartya Neogi

In this chapter, the author expands the notion of computational intelligence using the behavior of cockroaches. An introduction to cockroach as swarm intelligence emerging research area and literature review of its growing concept is explained in the beginning. The chapter also covers the ideas of hybrid cockroach optimization system. Next, the author studies the applicability of cockroach swarm optimization. Thereafter, the author presents the details of theoretical algorithm and an experimental result of integration of robot to some cockroaches to make collective decisions. Then, the author proposes his algorithm for traversing the shortest distance of city warehouses. Then, a few comparative statistical results of the progress of the present work on cockroach intelligence are shown. Finally, conclusive remarks are given. At last, the author hopes that even researchers with little experience in swarm intelligence will be enabled to apply the proposed algorithm in their own application areas.

Author(s):  
Amartya Neogi

In this chapter, the author expands the notion of computational intelligence using the behavior of cockroaches. An introduction to cockroach as swarm intelligence emerging research area and literature review of its growing concept is explained in the beginning. The chapter also covers the ideas of hybrid cockroach optimization system. Next, the author studies the applicability of cockroach swarm optimization. Thereafter, the author presents the details of theoretical algorithm and an experimental result of integration of robot to some cockroaches to make collective decisions. Then, the author proposes his algorithm for traversing the shortest distance of city warehouses. Then, a few comparative statistical results of the progress of the present work on cockroach intelligence are shown. Finally, conclusive remarks are given. At last, the author hopes that even researchers with little experience in swarm intelligence will be enabled to apply the proposed algorithm in their own application areas.


Author(s):  
Ravichander Janapati ◽  
Ch. Balaswamy ◽  
K. Soundararajan

Localization is the key research area in wireless sensor networks. Finding the exact position of the node is known as localization. Different algorithms have been proposed. Here we consider a cooperative localization algorithm with censoring schemes using Crammer Rao bound (CRB). This censoring scheme  can improve the positioning accuracy and reduces computation complexity, traffic and latency. Particle swarm optimization (PSO) is a population based search algorithm based on the swarm intelligence like social behavior of birds, bees or a school of fishes. To improve the algorithm efficiency and localization precision, this paper presents an objective function based on the normal distribution of ranging error and a method of obtaining the search space of particles. In this paper  Distributed localization of wireless sensor networksis proposed using PSO with best censoring technique using CRB. Proposed method shows better results in terms of position accuracy, latency and complexity.  


Author(s):  
Jan G Langhof ◽  
Stefan Güldenberg

The purpose of this article is multi-layered. First, we focus on gaining a comprehensive insight into a research area which just recently received more recognition in management literature: servant leadership. Second, we identify antecedent and outcomes of servant leadership within the existing research body. Third, we synthesize and develop a comprehensive servant leadership model. It assists academics and practitioners in keeping pace with the increasing servant leadership literature. The systematic literature review provides explanations as to why managers practice servant leadership. The study also contributes to a better understanding of the outcomes of servant leadership and brings clarity to a discombobulated group of studies.


2021 ◽  
Vol 21 (2) ◽  
pp. 1-31
Author(s):  
Bjarne Pfitzner ◽  
Nico Steckhan ◽  
Bert Arnrich

Data privacy is a very important issue. Especially in fields like medicine, it is paramount to abide by the existing privacy regulations to preserve patients’ anonymity. However, data is required for research and training machine learning models that could help gain insight into complex correlations or personalised treatments that may otherwise stay undiscovered. Those models generally scale with the amount of data available, but the current situation often prohibits building large databases across sites. So it would be beneficial to be able to combine similar or related data from different sites all over the world while still preserving data privacy. Federated learning has been proposed as a solution for this, because it relies on the sharing of machine learning models, instead of the raw data itself. That means private data never leaves the site or device it was collected on. Federated learning is an emerging research area, and many domains have been identified for the application of those methods. This systematic literature review provides an extensive look at the concept of and research into federated learning and its applicability for confidential healthcare datasets.


Author(s):  
Saber Elsayed ◽  
Ruhul Sarker ◽  
Daryl Essam

Many infrastructures, such as those of finance and banking, transportation, military and telecommunications, are highly dependent on the Internet. However, as the Internet’s underlying structural protocols and governance can be disturbed by intruders, for its smooth operation, it is important to minimize such disturbances. Of the available techniques for achieving this, computational intelligence methodologies, such as evolutionary algorithms and swarm intelligence approaches, are popular and have been successfully applied to detect intrusions. In this paper, we present an overview of these techniques and related literature on intrusion detection, analyze their research contributions, compare their approaches and discuss new research directions which will provide useful insights for intrusion detection researchers and practitioners.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Kamrul Ahsan ◽  
Shams Rahman

PurposeThis study conducts a systematic literature review of e-tail product returns research. E-tail product returns are essentially acquisition of products that have been sold through purely online or brick-and-click channels and then returned by consumer to business.Design/methodology/approachUsing a systematic literature review protocol, we identified 75 peer-reviewed articles on e-tail product returns, conducted bibliometric analysis and content analysis of the articles and summarised our findings.FindingsThe findings reveal that the subject of e-tail returns is a new research area; academics have started to investigate several aspects of e-tail returns through different research methodologies and theoretical foundations. Further research is required in leading e-commerce countries and on key areas such as omni-channel returns management, customer satisfaction and service, the impact of resources such as people skills, the benefits of technology and IT systems in managing e-tail returns.Practical implicationsThe study offers a summative account of current e-tail knowledge areas, which can serve as a reference guide for e-tailers to develop strategies for more efficient and competitive product returns.Originality/valueThis study contributes theoretically by developing clusters of key themes or knowledge areas about e-tail returns. It also provides a conceptual framework for e-tail returns management, which can be used as a springboard for further empirical research.


2015 ◽  
Vol 37 ◽  
pp. 154-169 ◽  
Author(s):  
Shuzhu Zhang ◽  
C.K.M. Lee ◽  
H.K. Chan ◽  
K.L. Choy ◽  
Zhang Wu

Author(s):  
Z.F. Khasanova

The purpose of this article is to study the methods for manufacturing, wearing and ways of use of the Bashkir chest decorations in the end of the 20th — beginning of the 21st c. The research area includes the Republic of Bashkortostan and neighboring regions where the Bashkirs live. Information for neighboring regions was collected using the Internet and social networks: VKontakte, Instagram, YouTube. The chronological framework of the study covers the end of the 20th — beginning of the 21st c., that is the time of a renaissance of traditions and the growth of interest in them. Field materials collected by the author during the expeditions in 2010–2019 to different districts of the Republic of Bashkortostan, archival materials, museum collections of Ufa and Internet resources where old and modern photos with Bashkir chest decorations are posted became the source base of the study. The article uses general scientific methods: comparative-historical, and the method of scientific description and analysis. During the collection of field materials, we relied on ethnographic methods, such as in-depth interviews, observation, and photo fixation. To study the current state of tradition, monitoring of social networks was used. Different types of female bibs used to be popular among Bashkirs — selter, sakal, hakal, yaga, muynsa, almaizy and others. They were very highly valued and used as essential part of the bride dowry. Chest decorations made of silver coins and real corals were very expensive. Until the end of the 19th — beginning of the 20th c., chest decoration retained its ethnic, social, and sacred functions. In the beginning of the 20th c., the traditional culture was undergoing a difficult period. During the hunger years of the 1920s, the period of the creation of collective farms, many Bashkirs were forced to surrender their jewelry for nothing. In the postwar years, very few people still had their authentic national decorations. In the end of the 20th — beginning of 21st c., on the wave of mobilization of ethnic identity and revival of interest in traditions, the bib as an ethnic marker became popular again. It has been revealed that there are five basic trends of manufacturing of the Bashkir bibs: from historical reconstructions to highly stylized pieces, from everyday to festive. Nowadays they are worn both for beauty and designating the ethnic identity, traditions, culture, demonstration of national Bashkir ownership. The initial spiritual and guarding function of chest decorations has now been lost.


Author(s):  
Faten H. MohammedSediq Al-Kadei

<p><span>Encryption and hiding images are becoming a hot research area and a broad prospect for application. This article uses a secure algorithm with Low Significant Bit method to hide an encrypted high-resolution color bitmap image in two selectively color images (i.e., two cover images). The paper introduces a two-level hiding encrypted image using MATLAB-GUI programming language. In the beginning, with a key image using XOR bit operation, the original RGB image is encrypted. After that, the encrypted image is hidden into the first cover image. The cover image is then hidden into another cover to make the secret image safer without changing the perceptual quality for both covers. Then, the algorithm is tested on many bitmap images, which can be an important image, fingerprint image, samples of secret medicine, or bank account pattern. The correlation histograms demonstrate a high correlation for all encrypted images. The PSNR is used to find steganography quality for the two cover images after hiding the secret image showing a high quality for the two levels of hiding operation</span></p>


Author(s):  
Alexandra Lagorio ◽  
Roberto Pinto ◽  
Ruggero Golini

Purpose The last decades have witnessed an increased interest in urban logistics originating from both the research and the practitioners’ communities. Sustainable freight transports today are on the political, social and technological agenda of many actors operating in urban contexts. Due to the extent of the covered areas and the continuous progress in many fields, the resulting body of research on urban logistics appears quite fragmented. From an engineering management perspective, the purpose of this paper is to present a systematic literature review (SLR) that aims to consolidate the knowledge on urban logistics, analyse the development of the discipline, and provide future research directions. Design/methodology/approach The paper discusses the main evidence emerging from a SLR on urban logistics. The corpus resulting from the SLR has been used to perform a citation network analysis and a main path analysis that together underpin the identification of the most investigated topics and methodologies in the field. Findings Through the analysis of a corpus of 104 articles, the most important research contributions on urban logistics that represent the structural backbone in the development of the research over time in the field are detected. Based on these findings, this work identifies and discusses three areas of potential interest for future research. Originality/value This paper presents an SLR related to a research area in which the literature is extremely fragmented. The results provide insights about the research path, current trends and future research directions in the field of urban logistics.


Sign in / Sign up

Export Citation Format

Share Document