firefly optimization algorithm
Recently Published Documents


TOTAL DOCUMENTS

59
(FIVE YEARS 31)

H-INDEX

8
(FIVE YEARS 2)

Author(s):  
Bharathi Garimella ◽  
G. V. S. N. R. V. Prasad ◽  
M. H. M. Krishna Prasad

The churn prediction based on telecom data has been paid great attention because of the increasing the number telecom providers, but due to inconsistent data, sparsity, and hugeness, the churn prediction becomes complicated and challenging. Hence, an effective and optimal prediction of churns mechanism, named adaptive firefly-spider optimization (adaptive FSO) algorithm, is proposed in this research to predict the churns using the telecom data. The proposed churn prediction method uses telecom data, which is the trending domain of research in predicting the churns; hence, the classification accuracy is increased. However, the proposed adaptive FSO algorithm is designed by integrating the spider monkey optimization (SMO), firefly optimization algorithm (FA), and the adaptive concept. The input data is initially given to the master node of the spark framework. The feature selection is carried out using Kendall’s correlation to select the appropriate features for further processing. Then, the selected unique features are given to the master node to perform churn prediction. Here, the churn prediction is made using a deep convolutional neural network (DCNN), which is trained by the proposed adaptive FSO algorithm. Moreover, the developed model obtained better performance using the metrics, like dice coefficient, accuracy, and Jaccard coefficient by varying the training data percentage and selected features. Thus, the proposed adaptive FSO-based DCNN showed improved results with a dice coefficient of 99.76%, accuracy of 98.65%, Jaccard coefficient of 99.52%.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Lantian Li ◽  
Bahareh Pahlevanzadeh

PurposeCloud eases information processing, but it holds numerous risks, including hacking and confidentiality problems. It puts businesses at risk in terms of data security and compliance. This paper aims to maximize the covered human resource (HR) vulnerabilities and minimize the security costs in the enterprise cloud using a fuzzy-based method and firefly optimization algorithm.Design/methodology/approachCloud computing provides a platform to improve the quality and availability of IT resources. It changes the way people communicate and conduct their businesses. However, some security concerns continue to derail the expansion of cloud-based systems into all parts of human life. Enterprise cloud security is a vital component in ensuring the long-term stability of cloud technology by instilling trust. In this paper, a fuzzy-based method and firefly optimization algorithm are suggested for optimizing HR vulnerabilities while mitigating security expenses in organizational cloud environments. MATLAB is employed as a simulation tool to assess the efficiency of the suggested recommendation algorithm. The suggested approach is based on the firefly algorithm (FA) since it is swift and reduces randomization throughout the lookup for an optimal solution, resulting in improved performance.FindingsThe fuzzy-based method and FA unveil better performance than existing met heuristic algorithms. Using a simulation, all the results are verified. The study findings showed that this method could simulate complex and dynamic security problems in cloud services.Practical implicationsThe findings may be utilized to assist the cloud provider or tenant of the cloud infrastructure system in taking appropriate risk mitigation steps.Originality/valueUsing a fuzzy-based method and FA to maximize the covered HR vulnerabilities and minimize the security costs in the enterprise cloud is the main novelty of this paper.


Author(s):  
T. Poonkodi, Et. al.

E-mail is the most common method of communication because due to its ability to obtain, the rapid modification of messages and low cost of distribution. Spam causes traffic issues and bottlenecks that limit the amount of memory and bandwidth, power and computing speed. For data filtering, various approaches exist that automatically detect and suppress these indefensible messages. A methodology based on Sine- Cosine Algorithm (SCA) introduced which address the problem of space and time complexities are increased in E-Mail spam detection. In this method, WordNet optimized semantic ontology applies different methods based on semantics and similarity measures to reduce the large number of extracted textual features. This paper proposed the Enriched Firefly Optimization Algorithm (EFOA) method effectively selecting suitable features from an upper dimensional space using the fitness function. Once the best feature space is identified through EFOA, the spam classification is done using ANN. Intially, E-mail spam dataset is preprocessed, then the extracted textual features are Semantic-based reduction and Features weights updated using optimized semantic WordNet. The results obtained showed that the ANN classifier after selection of features using EFOA was able to classify e-mails as spam and non-spam. This EFOA demonstrates that the proposed method has led to a remarkable improvement compared to the SCA methods.


Author(s):  
Dr.Shaji. K. A. Theodore M. Samira , Et. al.

Internet of Things is an budding focus of technical, social, and economical importance.  At the same time, Internet of Things hoist momentous challenges that may perhaps plunk in the way of apprehend its prospective reimbursement. The ‘thing’ in IoT may perhaps be a person with a heart monitor or an automobile in the midst of built-in-sensors, i.e. objects that have subsist dole out an IP address and encompass the capability to accumulate and convey data over a network without manual assistance or intervention. The business processes hosted on the wide-spread geographical distribution of sensors should retort to dissimilar sensing events congregate in the dynamic IoT environment as swift as they could. So to Produce better IoT applications, process optimization is indispensable in the IoT environment. For example, data analytics in energy embarrassed IoT Networks uses Optimization Framework to recuperate the network implementation delay and accuracy. Here we imply firefly Optimization Algorithm Framework, wherever the nodes make a decision where their data analytic tasks will be executed, in order to jointly optimize their average execution delay and accuracy, while respecting power consumption constraints compared to previous other techniques. Our new fire fly optimization techniques shows 81% better results compared to previous techniques such as Genetic and ant colony etc…


2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Wukui Dai ◽  
Li Liang ◽  
Bingji Zhang

A project that needs to be uplifted by high-pressure jet grouting (HPJG) is exposed to particular geological and engineering circumstances; meanwhile, HPJG has intense subjectivity, short of the theoretical base, to ascertain the influence angle β and enlarged radius Δ a , which are the main parameters that affect the uplift effect. Therefore, we proposed a new method based on the firefly optimization algorithm to search for the optimal solution for the target function. Stochastic medium theory (SMT) was used in this article, in which the effect of single-pile HPJG was simulated as the superposition effect of the foam slurry at the same distance, to construct a stochastic medium prediction model of the effect of uplift due to multi-HPJG. In accordance with the range of the prediction results of single-pile HPJG and combined with in situ monitoring data to define the target function, the optimal parameters are substituted into the prediction model to predict the subsequent uplift effect due to HPJG. As a result of the global optimization capacity and by comparison with the genetic algorithm, the FOA has a greater advantage in terms of effectiveness and precision. Finally, it is proven that the prediction result meets the requirement of the prediction in advance by statistical data.


Sign in / Sign up

Export Citation Format

Share Document