Metaheuristics For Machine Learning - Algorithms and Applications
Metaheuristics For Machine Learning - Algorithms and Applications
1. Cover
2. Table of Contents
3. Series Page
4. Title Page
5. Copyright Page
6. Foreword
7. Preface
8. 1 Metaheuristic Algorithms and Their Applications in
Different Fields: A Comprehensive Review
1. 1.1 Introduction
2. 1.2 Types of Metaheuristic Algorithms
3. 1.3 Application of Metaheuristic Algorithms
4. 1.4 Future Direction
5. 1.5 Conclusion
6. References
9. 2 A Comprehensive Review of Metaheuristics for
Hyperparameter Optimization in Machine Learning
1. 2.1 Introduction
2. 2.2 Fundamentals of Hyperparameter Optimization
3. 2.3 Overview of Metaheuristic Optimization Techniques
4. 2.4 Population-Based Metaheuristic Techniques
5. 2.5 Single Solution-Based Metaheuristic Techniques
6. 2.6 Hybrid Metaheuristic Techniques
7. 2.7 Metaheuristics in Bayesian Optimization
8. 2.8 Metaheuristics in Neural Architecture Search
9. 2.9 Comparison of Metaheuristic Techniques for
Hyperparameter Optimization
10. 2.10 Applications of Metaheuristics in Machine Learning
11. 2.11 Future Directions and Open Challenges
12. 2.12 Conclusion
13. References
10. 3 A Survey of Computer-Aided Diagnosis Systems for Breast
Cancer Detection
1. 3.1 Introduction
2. 3.2 Procedure for Research Survey
3. 3.3 Imaging Modalities and Their Datasets
4. 3.4 Research Survey
5. 3.5 Conclusion
6. 3.6 Acknowledgment
7. References
11. 4 Enhancing Feature Selection Through Metaheuristic Hybrid
Cuckoo Search and Harris Hawks Optimization for Cancer
Classification
1. 4.1 Introduction
2. 4.2 Related Work
3. 4.3 Proposed Methodology
4. 4.4 Experimental Setup
5. 4.5 Results and Discussion
6. 4.6 Conclusion
7. References
12. 5 Anomaly Identification in Surveillance Video Using
Regressive Bidirectional LSTM with Hyperparameter
Optimization
1. 5.1 Introduction
2. 5.2 Literature Survey
3. 5.3 Proposed Methodology
4. 5.4 Result and Discussion
5. 5.5 Conclusion
6. References
13. 6 Ensemble Machine Learning-Based Botnet Attack Detection
for IoT Applications
1. 6.1 Introduction
2. 6.2 Literature Survey
3. 6.3 Proposed System
4. 6.4 Results and Discussion
5. 6.5 Conclusion
6. References
14. 7 Machine Learning-Based Intrusion Detection System with
Tuned Spider Monkey Optimization for Wireless Sensor
Networks
1. 7.1 Introduction
2. 7.2 Literature Review
3. 7.3 Proposed Methodology
4. 7.4 Result and Discussion
5. 7.5 Conclusion
6. References
15. 8 Security Enhancement in IoMT‑Assisted Smart Healthcare
System Using the Machine Learning Approach
1. 8.1 Introduction
2. 8.2 Literature Review
3. 8.3 Proposed Methodology
4. 8.4 Conclusion
5. References
16. 9 Building Sustainable Communication: A Game-Theoretic
Approach in 5G and 6G Cellular Networks
1. 9.1 Introduction
2. 9.2 Related Works
3. 9.3 Methodology
4. 9.4 Result
5. 9.5 Conclusion
6. References
17. 10 Autonomous Vehicle Optimization: Striking a Balance
Between Cost-Effectiveness and Sustainability
1. 10.1 Introduction
2. 10.2 Methods
3. 10.3 Results
4. 10.4 Conclusions
5. References
18. 11 Adapting Underground Parking for the Future:
Sustainability and Shared Autonomous Vehicles
1. 11.1 Introduction
2. 11.2 Related Works
3. 11.3 Methodology
4. 11.4 Analysis
5. 11.5 Conclusion
6. References
19. 12 Big Data Analytics for a Sustainable Competitive Edge: An
Impact Assessment
1. 12.1 Introduction
2. 12.2 Related Works
3. 12.3 Hypothesis and Research Model
4. 12.4 Results
5. 12.5 Conclusion
6. References
20. 13 Sustainability and Technological Innovation in
Organizations: The Mediating Role of Green Practices
1. 13.1 Introduction
2. 13.2 Related Work
3. 13.3 Methodology
4. 13.4 Discussion
5. 13.5 Conclusions
6. References
21. 14 Optimal Cell Planning in Two Tier Heterogeneous
Network through Meta-Heuristic Algorithms
1. 14.1 Introduction
2. 14.2 System Model and Formulation of the Problem
3. 14.3 Result and Discussion
4. 14.4 Conclusion
5. References
22. 15 Soil Aggregate Stability Prediction Using a Hybrid Machine
Learning Algorithm
1. 15.1 Introduction
2. 15.2 Related Works
3. 15.3 Proposed Methodology
4. 15.4 Result and Discussion
5. 15.5 Conclusion
6. References
23. Index
24. Also of Interest
25. End User License Agreement
List of Tables
1. Chapter 1
1. Table 1.1 Strengths and weaknesses of metaheuristic
algorithms.
2. Chapter 2
1. Table 2.1 Breakdown of popular metaheuristics and their
I&D components [75]....
2. Table 2.2 Performance comparison of four different
metaheuristics based on a...
3. Table 2.3 Performance comparison of eight population-
based metaheuristics fo...
3. Chapter 3
1. Table 3.1 Summary of the medical jargon used.
2. Table 3.2 Advantages and disadvantages.
4. Chapter 4
1. Table 4.1 Information regarding the six cancer microarray
data.
2. Table 4.2 Parameter settings of the proposed algorithm.
3. Table 4.3 Accuracies of the proposed algorithm with the
mRMR, mRMR+CSA, and ...
4. Table 4.4 Accuracies of the proposed algorithm with the
mRMR, mRMR+CSA, and ...
5. Table 4.5 Accuracies of the proposed algorithm with the
mRMR, mRMR+CSA, and ...
6. Table 4.6 Comparison of the different published methods
with the proposed me...
5. Chapter 8
1. Table 8.1 Comparison of the accuracy.
2. Table 8.2 Comparison of the precision.
3. Table 8.3 Comparison of the sensitivity.
4. Table 8.4 Comparison of the specificity.
5. Table 8.5 Comparison of the security.
6. Chapter 10
1. Table 10.1 Example of demand and supply data from
expert interviews with the...
2. Table 10.2 Provides an analysis of the logistic network
situation.
7. Chapter 11
1. Table 11.1 Index of the driver, status, and response model
system.
2. Table 11.2 The DSR indexes’ weights and value
attributions.
3. Table 11.3 Rankings of function replacement for each UPS
type.
8. Chapter 12
1. Table 12.1 Results of validity and reliability tests.
2. Table 12.2 HTMT values.
3. Table 12.3 Examine the legitimacy of differences.
4. Table 12.4 The model’s fit outcomes.
9. Chapter 13
1. Table 13.1 Description of the companies.
2. Table 13.2 Presentation of illustrative information.
3. Table 13.3 Impact on the various aspects.
4. Table 13.4 Credibility, dependability, and relevance.
5. Table 13.5 Inferential statistics.
6. Table 13.6 Evaluation of interactions.
10. Chapter 14
1. Table 14.1 Parameter values.
List of Illustrations
1. Chapter 1
1. Figure 1.1 Flowchart of the genetic algorithm.
2. Figure 1.2 Flowchart of simulated annealing.
3. Figure 1.3 Flowchart of the particle swarm optimization.
4. Figure 1.4 Flowchart of the ant colony optimization.
2. Chapter 2
1. Figure 2.1 Tabu search for optimizing the tour cost for a
city plotted vs. ite...
2. Figure 2.2 A Gaussian process approximation of an
objective function being ite...
3. Figure 2.3 Convergence comparison of four metaheuristics
based on the first 10...
4. Figure 2.4 Best score convergence profiles vs. iterations for
eight renowned a...
5. Figure 2.5 Accuracy of metaheuristics for different ML
models [83].
3. Chapter 3
1. Figure 3.1 Pictorial representation of the imaging
modalities.
2. Figure 3.2 CNN architecture as illustrated by Mohamed et
al. in [29].
4. Chapter 4
1. Figure 4.1 The proposed research methodology.
2. Figure 4.2 Hybrid flowchart of the HHO and CSA.
3. Figure 4.3 Error comparison with the SVM classifier.
4. Figure 4.4 The variance observed in the proposed
algorithm (mRMR+CSAHHO) compa...
5. Figure 4.5 Error comparison with the KNN classifier.
6. Figure 4.6 The variance observed in the proposed
algorithm (mRMR+CSAHHO) compa...
7. Figure 4.7 Error comparison with the NB classifier.
8. Figure 4.8 The variance observed in the proposed
algorithm (mRMR+CSAHHO) compa...
5. Chapter 5
1. Figure 5.1 Schematic architecture of our proposed system.
2. Figure 5.2 Normal and abnormal clips from the
ShanghaiTech dataset.
3. Figure 5.3 Accuracy comparison between the suggested
and current techniques.
4. Figure 5.4 Precision comparison between the suggested
and current techniques....
5. Figure 5.5 Recall comparison between the suggested and
current techniques.
6. Figure 5.6 Error rate comparison between the suggested
and current techniques....
6. Chapter 6
1. Figure 6.1 The proposed methodology.
2. Figure 6.2 The dataset’s distribution.
3. Figure 6.3 Architecture of the ANN.
4. Figure 6.4 Results of accuracy.
5. Figure 6.5 Results of precision.
6. Figure 6.6 Results of recall.
7. Figure 6.7 Results of the F-measure.
7. Chapter 7
1. Figure 7.1 Flowchart of the proposed SVM-TSMO model.
2. Figure 7.2 The support vector machine.
3. Figure 7.3 Accuracy of the existing and proposed methods.
4. Figure 7.4 Precision of the existing and proposed methods.
5. Figure 7.5 Recall % of the existing and proposed methods.
6. Figure 7.6 F1-measure of the existing and proposed
methods.
8. Chapter 8
1. Figure 8.1 The IoMT-smart healthcare system.
2. Figure 8.2 A systematic diagram of security enhancement
in the IoMT using mach...
3. Figure 8.3 Diagrammatic representation of the proposed
method.
4. Figure 8.4 The linear SVM model.
5. Figure 8.5 The MLPSO algorithm flowchart.
9. Chapter 9
1. Figure 9.1 IDO based on a game model.
2. Figure 9.2 Spectrum use ratio.
3. Figure 9.3 Offload ratio.
4. Figure 9.4 Throughput analysis.
5. Figure 9.5 Response delay analysis.
6. Figure 9.6 Energy consumption analysis.
10. Chapter 10
1. Figure 10.1 Framework for logistic clusters that limits
supply chain managemen...
2. Figure 10.2 Illustrates the assumptions of the logistic
network model.
3. Figure 10.3 Distribution model simulations with simulated
annealing.
11. Chapter 11
1. Figure 11.1 Weight matrix of attributes.
2. Figure 11.2 Ranking of the factors.
3. Figure 11.3 UPS-type characteristics.
4. Figure 11.4 Renewal time outcomes.
5. Figure 11.5 Analyzing renewal timing and UPS properties.
6. Figure 11.6 Distribution of renewal times.
12. Chapter 12
1. Figure 12.1 Suggested research design.
2. Figure 12.2 Reliability and validity of the CA.
3. Figure 12.3 Reliability and validity of the CR.
4. Figure 12.4 Reliability and validity of the AVE.
13. Chapter 13
1. Figure 13.1 Method of measuring model.
2. Figure 13.2 Model of structure.
14. Chapter 14
1. Figure 14.1 System model.
2. Figure 14.2 Flowchart of the proposed model.
3. Figure 14.3 Optimal user association to BSs with data suit-
1.
4. Figure 14.4 Optimal user association to BSs with data suit-
2.
5. Figure 14.5 Network utility maximization graph.
15. Chapter 15
1. Figure 15.1 Block diagram of soil aggregation.
2. Figure 15.2 C5.0’s algorithm flow.
3. Figure 15.3 Comparative analysis of the RMSE.
4. Figure 15.4 Comparative analysis of the R2.
5. Figure 15.5 Comparative analysis of the nRMSE.
6. Figure 15.6 Comparative analysis of the MAE.
Scrivener Publishing
100 Cummings Center, Suite 541J
Beverly, MA 01915-6106
Publishers at Scrivener
Martin Scrivener ([email protected])
Phillip Carmical ([email protected])
Metaheuristics for Machine Learning
Edited by
Kanak Kalita
Vel Tech University, Avadi, India
Narayanan Ganesh
Vellore Institute of Technology, Chennai, India
and
S. Balamurugan
Intelligent Research Consultancy Services, Coimbatore,
Tamilnadu, India
This edition first published 2024 by John Wiley & Sons, Inc., 111 River Street,
Hoboken, NJ 07030, USA and Scrivener Publishing LLC, 100 Cummings Center, Suite
541J, Beverly, MA 01915, USA
© 2024 Scrivener Publishing LLC
For more information about Scrivener publications please visit
www.scrivenerpublishing.com.
For details of our global editorial offices, customer services, and more information
about Wiley products visit us at www.wiley.com.
ISBN 978-1-394-23392-2
Kanak Kalita
Narayanan Ganesh
S. Balamurugan
1
Metaheuristic Algorithms and
Their Applications in Different
Fields: A Comprehensive Review
Abrar Yaqoob1*, Navneet Kumar Verma2 and Rabia Musheer
Aziz1
1
School of Advanced Science and Language, VIT Bhopal
University, Kothrikalan, Sehore, India
2
State Planning Institute (New Division), Planning Department
Lucknow, Utter Pradesh, India
Abstract
1.1 Introduction
Metaheuristics represent a category of optimization methods
widely employed to tackle intricate challenges in diverse
domains such as engineering, economics, computer science,
and operations research. These adaptable techniques are
designed to locate favorable solutions by exploring an extensive
array of possibilities and avoiding stagnation in suboptimal
outcomes [1]. The roots and advancement of metaheuristics can
be traced back to the early 1950s when George Dantzig
introduced the simplex approach for linear programming [2].
This innovative technique marked a pivotal point in
optimization and paved the way for the emergence of
subsequent optimization algorithms. Nonetheless, the simplex
method’s applicability is confined to linear programming issues
and does not extend to nonlinear problems. In the latter part of
the 1950s, John Holland devised the genetic algorithm, drawing
inspiration from concepts of natural selection and evolution [3].
The genetic algorithm assembles a set of potential solutions and
iteratively enhances this set through genetic operations like
mutation, crossover, and selection [4]. The genetic algorithm
was a major milestone in the development of metaheuristics
and opened up new possibilities for resolving difficult
optimization issues. During the 1980s and 1990s, the field of
metaheuristics experienced significant expansion and the
emergence of numerous novel algorithms. These techniques,
which include simulated annealing (SA), tabu search (TS), ant
colony optimization (ACO), particle swarm optimization (PSO),
and differential evolution (DE), were created expressly to deal
with a variety of optimization issues. They drew inspiration
from concepts like simulated annealing, tabu search, swarm
intelligence, and evolutionary algorithms [5].
Apart from this algorithm, several other algorithms like the sine
cosine algorithm [103, 104], dragonfly algorithm [105, 106], and
symbiotic organism search [107, 108] have widely been used in
literature.
Strengths Weaknesses
1.5 Conclusion
References
Note
1
Department of Computer Science and Engineering, Sona College
of Technology, Salem, India
2
School of Computer Science & Engineering, Vellore Institute of
Technology, Chennai, India
Abstract
2.1 Introduction
Figure 2.1 Tabu search for optimizing the tour cost for a city plotted vs. iterations
[52].
aspiration criterion
EC recombination
mutation
selection
probabilistics construction
kick-move
Metaheuristics I&D component
acceptance criterion
neighborhood choice
shaking phase
acceptance criterion
ƒMEDIAN 0.039912244
ƒSTD 0.002684507
ƒMEDIAN 0.039091125
ƒSTD 0.002267059
ƒMEDIAN 0.041771095
ƒSTD 0.00265998
ƒMEDIAN 0.039871245
ƒSTD 0.002462824
Viol 1.3E - 0 0 0 0
08
2.12 Conclusion
References
Note
Abstract
3.1 Introduction
Medical
Definition Source
term
The Infrared Breast Thermal Images (IBTI) dataset used for this
research work was collected from “Harshmitra Super Speciality
Cancer Centre and Research Institute,” Trichy, Tamil Nadu,
India, and consisted of images captured using the infrared
camera DITI CX320 having a resolution of 320 × 240. It
contained data collected from approximately 50 patients.
Table 3.2 Advantages and disadvantages.
Imaging
Advantages Disadvantages
modality
Sanyal et al. [13] have based the proposed work on the BACH
(Breast Cancer Histology Images) dataset that is posed as a
challenge organized as a part of the ICIAR 2018 conference. The
proposed methodology involves fine-tuning of principal and
popular CNN architectures, namely, VGG 19, InceptionV3,
Inception-ResNetv2, and ResNet-101 to extract classification
critical and discriminative features. As a part of ensemble
learning, XGBoost has been incorporated into the softmax layer
for improving the classification performance. The work
proposes a model performing fourclass classification at the
image and patch level. The classification categories are in situ,
invasive, normal, and benign. The inference of image level is
drawn from the fact that the individual patches together make
an image and the classification at the image level is essentially
made out by using the patches as participants during the voting
procedure.
Das et al. [14] have proposed a methodology for automating the
preprocessing stage wherein manual annotations are required.
It makes use of a deep multiple instance learning-based CNN
framework. Its working can be closely mapped to the popular
bags of words approach that is adopted and widely used for
sentiment analysis in the domain of natural language
processing (NLP). Here, the input test images are represented as
a bag of patches that are obtained during the training phase.
The input test image is classified as benign if and only if all of
the patches are benign and classified as malignant even if
anyone of the patch comes out to be malignant. Additionally,
the versatility of the proposed model has been represented by
testing it on diverse and popular datasets like BreakHis, IUHPL,
and UCSB, registering accuracy figures of 93.06%, 96.63%, and
95.83%, respectively.
3.4.3 Ultrasound
3.4.4 MRI-Based
Image fusion – fusing the DCE and T2w images for producing
the RGB composite
Feature fusion – merging the CNN features extracted from
both the DCE and T2w images and then serving it to the SVM
for classification
Classifier fusion – Aggregation of the malignancy probability
output from both the DCE and T2w via soft voting
3.4.5 Thermography-Based
3.5 Conclusion
From the survey, it has been noticed that most of the works
based on medical image processing have preferred the use of
deep learning techniques over machine learning. However,
machine learning too can be employed over datasets for
representing diagnostic parameters in numerical form as has
been represented in the dataset titled “Breast Cancer Wisconsin
(Diagnostic) Data set” in Kaggle. It has the diagnosis based on 10
real-valued features like radius, texture, perimeter, concavity,
and symmetry to name a few. This, therefore, opens up a new
avenue for research concerning classification based on
numerical diagnostic parameters.
3.6 Acknowledgment
References
1. Chaudhury, S., Rakhra, M., Memon, N., Sau, K., Ayana, M.T.,
Breast cancer calcifications: Identification using a novel
segmentation approach. Comput. Math. Methods Med., 2021,
9905808, Oct. 2021, doi: 10.1155/2021/9905808.
2. Loizidou, K., Skouroumouni, G., Nikolaou, C., Pitris, C., An
automated breast micro-calcification detection and
classification technique using temporal subtraction of
mammograms. IEEE Access, 8, 52785–52795, 2020, doi:
10.1109/ACCESS.2020.2980616.
3. Jeong, J.-W., Yu, D., Lee, S., Chang, J.M., Automated detection
algorithm of breast masses in three-dimensional ultrasound
images. Healthc. Inform. Res., 22, 4, 293–298, Oct. 2016, doi:
10.4258/hir.2016.22.4.293.
4. Hamed, G., Marey, M., Amin, S.E., Tolba, M.F., Automated
breast cancer detection and classification in full field digital
mammograms using two full and cropped detection paths
approach. IEEE Access, 9, 116898–116913, 2021, doi:
10.1109/ACCESS.2021.3105924.
5. Celik, Y., Talo, M., Yildirim, O., Karabatak, M., Acharya, U.R.,
Automated invasive ductal carcinoma detection based using
deep transfer learning with whole-slide images. Pattern
Recognit. Lett., 133, 232–239, May 2020, doi:
10.1016/j.patrec.2020.03.011.
6. Ehteshami Bejnordi, B. et al., Automated detection of DCIS in
whole-slide H&E stained breast histopathology images. IEEE
Trans. Med. Imaging, 35, 9, 2141–2150, Sep. 2016, doi:
10.1109/TMI.2016.2550620.
7. Debelee, T.G., Schwenker, F., Ibenthal, A., Yohannes, D., Survey
of deep learning in breast cancer image analysis. Evol. Syst.,
11, 1, 143–163, Mar. 2020, doi: 10.1007/s12530-019-09297-2.
8. Mahmood, T., Li, J., Pei, Y., Akhtar, F., Imran, A., Rehman, K.U.,
A brief survey on breast cancer diagnostic with deep
learning schemes using multi-image modalities. IEEE Access,
8, 165779–165809, 2020, doi: 10.1109/ ACCESS.2020.3021343.
9. Al-Dhabyani, W., Gomaa, M., Khaled, H., Fahmy, A., Dataset of
breast ultrasound images. Data Brief, 28, 104863, Feb. 2020,
doi: 10.1016/j. dib.2019.104863.
10. Witowski, J. et al., The NYU breast MRI dataset v1.0.
11. Venkatachalam, N., Shanmugam, L., Heltin, G.C.,
Govindarajan, G., Sasipriya, P., Enhanced segmentation of
inflamed ROI to improve the accuracy of identifying benign
and malignant cases in breast thermogram. J. Oncol., 2021,
5566853, 2021, doi: 10.1155/2021/5566853.
12. Roy, S.D., Das, S., Kar, D., Schwenker, F., Sarkar, R., Computer
aided breast cancer detection using ensembling of texture
and statistical image features. Sensors, 21, 11, 3628, Art. no.
11, Jan. 2021, doi: 10.3390/s21113628.
13. Sanyal, R., Kar, D., Sarkar, R., Carcinoma type classification
from high-resolution breast microscopy images using a
hybrid ensemble of deep convolutional features and gradient
boosting trees classifiers. IEEE/ACM Trans. Comput. Biol.
Bioinform., 19, 4, 2124–2136, Jul. 2022, doi: 10.1109/
TCBB.2021.3071022.
14. Das, K., Conjeti, S., Chatterjee, J., Sheet, D., Detection of breast
cancer from whole slide histopathological images using deep
multiple instance CNN. IEEE Access, 8, 213502–213511, 2020,
doi: 10.1109/ACCESS.2020.3040106.
15. Han, Z., Wei, B., Zheng, Y., Yin, Y., Li, K., Li, S., Breast cancer
multi-classification from histopathological images with
structured deep learning model. Sci. Rep., 7, 1, 4172, Jun.
2017, doi: 10.1038/s41598-017-04075-z.
16. Mohiyuddin, A. et al., Breast tumor detection and
classification in mammogram images using modified YOLOv5
network. Comput. Math. Methods Med., 2022, 1359019, Jan.
2022, doi: 10.1155/2022/1359019.
17. Darweesh, M.S. et al., Early breast cancer diagnostics based
on hierarchical machine learning classification for
mammography images. Cogent Eng., 8, 1, 1968324, Jan. 2021,
doi: 10.1080/23311916.2021.1968324.
18. Tsochatzidis, L., Koutla, P., Costaridou, L., Pratikakis, I.,
Integrating segmentation information into CNN for breast
cancer diagnosis of mammographic masses. Comput. Methods
Programs Biomed., 200, 105913, Mar. 2021, doi:
10.1016/j.cmpb.2020.105913.
19. Mohapatra, S., Muduly, S., Mohanty, S., Ravindra, J.V.R.,
Mohanty, S.N., Evaluation of deep learning models for
detecting breast cancer using histopathological
mammograms images. Sustainable Oper. Comput., 3, 296–302,
Jan. 2022, doi: 10.1016/j.susoc.2022.06.001.
20. Cheng, H.D., Shan, J., Ju, W., Guo, Y., Zhang, L., Automated
breast cancer detection and classification using ultrasound
images: A survey. Pattern Recognit., 43, 1, 299–317, Jan. 2010,
doi: 10.1016/j.patcog.2009.05.012.
21. Sadad, T., Hussain, A., Munir, A., Habib, M., Ali Khan, S.,
Hussain, S., Yang, S., Alawairdhi, M., Identification of breast
malignancy by marker-controlled watershed transformation
and hybrid feature set for healthcare. Appl. Sci., 10, 6, 1900,
2020, https://doi.org/10.3390/app10061900.
22. Byra, M., Breast mass classification with transfer learning
based on scaling of deep representations. Biomed. Signal
Process. Control, 69, 102828, Aug. 2021, doi:
10.1016/j.bspc.2021.102828.
23. Li, Y., Gu, H., Wang, H., Qin, P., Wang, J., BUSnet: A deep
learning model of breast tumor lesion detection for
ultrasound images. Front. Oncol., 12, 848271, 2022, Accessed:
Dec. 17, 2022. [Online]. Available:
https://www.frontiersin.org/articles/10.3389/fonc.2022.848271
.
24. Dewangan, K.K., Dewangan, D.K., Sahu, S.P., Janghel, R.,
Breast cancer diagnosis in an early stage using novel deep
learning with hybrid optimization technique. Multimed. Tools
Appl., 81, 10, 13935–13960, 2022, doi: 10.1007/ s11042-022-
12385-2.
25. Hu, Q., Whitney, H.M., Giger, M.L., A deep learning
methodology for improved breast cancer diagnosis using
multiparametric MRI. Sci. Rep., 10, 10536, 2020,
https://doi.org/10.1038/s41598-020-67441-4.
26. Ha, W. and Vahedi, Z., Automatic breast tumor diagnosis in
MRI based on a hybrid CNN and feature-based method using
improved deer hunting optimization algorithm. Comput.
Intell. Neurosci., 2021, 5396327, Jul. 2021, doi:
10.1155/2021/5396327.
27. Ma, D., Shang, L., Tang, J., Bao, Y., Fu, J., Yin, J., Classifying
breast cancer tissue by Raman spectroscopy with one-
dimensional convolutional neural network. Spectrochim.
Acta A Mol. Biomol. Spectrosc., 256, 119732, Jul. 2021, doi:
10.1016/j.saa.2021.119732.
28. Jiao, H., Jiang, X., Pang, Z., Lin, X., Huang, Y., Li, L., Deep
convolutional neural networks-based automatic breast
segmentation and mass detection in DCE-MRI. Comput. Math.
Methods Med., 2020, 1–12, May 2020, doi:
10.1155/2020/2413706.
29. Mohamed, E.A., Rashed, E.A., Gaber, T., Karam, O., Deep
learning model for fully automated breast cancer detection
system from thermograms. PLoS One, 17, 1, e0262349, Jan.
2022, doi: 10.1371/journal.pone.0262349.
Note
1. *Corresponding author:
[email protected]
4
Enhancing Feature Selection
Through Metaheuristic Hybrid
Cuckoo Search and Harris Hawks
Optimization for Cancer
Classification
Abrar Yaqoob1*, Navneet Kumar Verma1, Rabia Musheer
Aziz2 and Akash Saxena3
1
School of Advanced Science and Language, VIT Bhopal
University, Kothrikalan, Sehore, India
2
State Planning Institute (New Division), Planning Department
Lucknow, Utter Pradesh, India
3
School of Engineering and Technology, Central University of
Haryana, Mahendergarh, India
Abstract
Gene expression platforms offer vast amounts of data that can
be utilized for investigating diverse biological processes.
However, due to the existence of redundant and irrelevant
genes, it remains challenging to identify crucial genes from
high-dimensional biological data. To overcome this obstacle,
researchers have introduced different feature selection (FS)
methods. Developing more efficient and accurate FS techniques
is essential to select important genes for the classification of
complex biological information with multiple dimensions for
many purposes. To tackle the difficulty of selecting genes in
high-dimensional biological datasets, a novel approach called
the Harris hawks optimization and cuckoo search algorithm
(HHOCSA) is proposed for commonly used machine learning
classifiers such as K-nearest neighbors (KNN), support vector
machine (SVM), and naive Bayes (NB). The effectiveness of the
hybrid gene selection algorithm was assessed using six
commonly used datasets and compared to other techniques for
selecting features. The experimental findings demonstrate that
the HHOCSA outperforms alternative methods when
considering performance metrics of accuracy measures such as
precision, sensitivity, and specificity. Furthermore, the HHOCSA
approach proposed in this study is both computationally
efficient and consistent in terms of variability when compared
to the other methods. Therefore, the proposed hybrid algorithm
can be used as a useful instrument for the classification of
cancer datasets and can help medical professionals make
better-informed decisions in cancer diagnosis.
4.1 Introduction
Brood Parasitism: Uses another bird’s nest as its own, hides its
eggs there, and then relies on the host bird to raise the young.
Host Bird: Owner of the host nest, responsible for raising and
feeding the cuckoo chicks.
Parasite Bird: Birds that deposit eggs within the host bird nest.
For 1 < λ ≤ 3
(4.1)
The process of using Levy flights to generate random numbers
comprises two parts from the perspective of implementation.
(4.3)
where rd1, rd2, rd3, rd4, and p are the random variables and lb,
ub represents lower and upr bounds, and Tm(H) denotes the
mean position and is calculated as follows:
(4.4)
(4.5)
where E0 is the rabbit’s (the prey’s) initial state of energy,
randomly produced using a [-1, 1] range, and Max IT is the most
iterations allowed. When |E| > 1, the hawks are looking in
more areas to find where their prey is. According to this, the
exploitation phase of the HHO discovery process starts at |E| <
1.
(4.6)
(4.7)
(4.8)
where J is the rabbit’s power of chance leaps, and rd is a
random variable. Equation 4.9 illustrates a harsh siege that took
place for |E|< 0.5.
(4.9)
The HHO method models the prey jumping frog for increasing
fast diving using the Levy flight (FL) principle, which occurs for
|E|>= 0 and n < 0.5. The hawks’ ability to dive successfully or
unsuccessfully is measured by the following:
(4.10)
When the dive in Equation 4.10 fails, hawks perform a dive
based on Levy flying based on Equation 4.11.
(4.11)
where W is the random variable, and Pdim stands for the issue
dimension. The Levy flight functn Ly is calculated as follows:
(4.12)
(4.13)
(4.14)
(4.15)
(4.16)
Figure 4.2 Hybrid flowchart of the HHO and CSA.
HYBRID CSAHHO ALGORITHM
Inputs:
population size h
Max_iter
Harris Hawks Optimization pa
Cuckoo Search Optimization n
Initial assignment
4.3.4.3 NB Classifier
4.3.4.4. mRMR
Class No. of
Dataset Classes Genes S
balance samples
p
a
la
m
th
S
m
m
lu
a
ti
fr
ca
g
o
m
re
p
th
b
c
im
u
w
T
d
c
sa
A
A
sa
Parameter Value
Limit 5 iterations
5-fold cross-validation
mRM
mRMR+CSA mRMR+HHO
CSA
5-fold cross-validation
5-fold cross-validation
High-
Acute Prostate
Methods Colon grade
leukemia tumor
glioma
DL + DIP 96.33% – – –
[41]
NN +CT – 97.63 – –
[43]
miRNA – – – –
[46]
High-
Acute Prostate
Methods Colon grade
leukemia tumor
glioma
FHTWSVM – – 90.48% –
[47]
4.6 Conclusion
The study investigated the effectiveness of three optimization
methods for identifying and classifying cancer features. The
findings revealed that, for the given problem, the CSAHHO
algorithm demonstrated superior efficiency and effectiveness
compared to the other two algorithms. However, the study
highlighted the need for further experimentation and
evaluation on different cancer datasets and scenarios to verify
the generalizability and scalability of the suggested algorithm.
The findings emphasize the importance of carefully tuning
algorithm input parameters and evaluating algorithms across
multiple problem instances to obtain a comprehensive
understanding of their performance. The work gives knowledge
for more research in this area and aids in the development of
hybrid optimization algorithms for cancer feature selection and
classification.
References
Note
1
Department of Computer Science and Engineering, Koneru
Lakshmaiah Education Foundation, Vaddeswaram, India
2
School of Computer Science & Engineering, Vellore Institute of
Technology, Chennai, India
Abstract
5.1 Introduction
The use of video anomaly detection in surveillance systems has
received a lot of interest. Even if the amount of installing
monitoring devices has decreased dramatically in recent years,
aberrant activities like fighting, abuse, and theft still need to be
detected by humans. The development of efficient video
anomaly detection algorithms is necessary due to the increased
expense of human labor and the loss of productive time [1].
Anomaly identification is challenging because anomalies are ill-
defined and annotated data are not readily available. Protection
of ourselves and one’s property is more vital nowadays. The
real-time video surveillance serves a beneficial purpose. As a
result of these demands, cameras are installed at every turn,
and video surveillance systems can comprehend the situation
and recognize unusual activity right away [2]. The primary
component recognizes the activity and automatically alerts the
operator or users when an unexpected occurrence occurs.
When it comes to managing personal safety and security as well
as public safety, video surveillance works more effectively than
conventional approaches. To reduce the burden of an observer,
as well as build an autonomous surveillance device to replace
observer-oriented services provided by humans. Cameras are
used to gather information on various events that indicate the
behavior of anomalies in a surveillance-enforced environment
during the anomaly identification process. The system’s
functionality conducts feature extraction on the gathered data,
processes it, and then converts the generated features into
various inputs for the designated algorithm [3]. Contextual,
local, and communal anomalies are all possible. Data instances
that are examined against a specific context connected with the
data instance are referred to as contextual anomalies. Single
data examples that vary from others are referred to as point
anomalies. Intelligent video surveillance systems detect
suspicious activity and sound alarms without human
involvement [4]. Data are gathered by visual sensors in the
surveillance environment throughout the detecting phase. The
next step is feature extraction and preprocessing of these raw
visual data. Video surveillance anomaly detection is a delay-
sensitive application that needs minimal latency [5].
5.3.1 Dataset
The ShanghaiTech Campus dataset [12] is a large-scale video
anomaly detection dataset used in this article. It comprises
videos captured by street surveillance cameras with a fixed
perspective. The dataset includes 337 videos from 13 different
settings, of which 80 are abnormal and 257 are normal. This
dataset is a standard benchmark used in anomaly detection
tasks and contains data that are both anomalous and typical in
nature.
Figure 5.2 Normal and abnormal clips from the ShanghaiTech dataset.
Model, detector<-CREATE ()
End for
(5.2)
Detector.APPLY (thresholds)
For every Tn do
If (T_eroorn<(thresholds) then
Tn is a normal point
Else
An<-Tn is anomalous
Return [Tn]
Stop for
Stop procedure
←hasher.HASH(p);
estimator ←0;
Stop
(5.3)
(5.4)
Figure 5.4 illustrates the precision of the proposed system as
well as the precision of current systems’ consumption
predictions. The GCN achieves 60%, the MLEP achieves 71%, the
3D ConvNets achieves 81%, and the suggested system achieves
98% precision. This demonstrates that the proposed approach is
more effective than the current ones.
(5.5)
Figure 5.4 Precision comparison between the suggested and current techniques.
Figure 5.5 displays the recall of the proposed system as well as
the recall of the consumption estimates from existing systems.
The suggested system achieves 90% recall, while the GCN
achieves 74%, the MLEP achieves 83%, and the 3D ConvNets
achieves 62%. This proves that the suggested technique is more
efficient than the current ones.
The error rate is the ratio of invalid data units to all other data
units delivered.
Figure 5.5 Recall comparison between the suggested and current techniques.
Figure 5.6 Error rate comparison between the suggested and current techniques.
(5.6)
Figure 5.6 illustrates the error rate of the proposed system, the
prediction of consumption of error rate in existing systems, and
the suggested technique. The GCN has attained 0.15%, the MLEP
has acquired 0.14%, the 3D ConvNets has reached 0.12%, and
the suggested technique has an error rate of 0.07%. This shows
that the proposed approach has a lower error rate than those of
the existing ones.
5.5 Conclusion
Due to several variables influencing outcomes, such as video
noise, outliers, and resolution, the detection of anomalies in
video surveillance is a tough task. In this study, we suggested an
RBLSTM with HO to improve anomaly detection in intelligent
video surveillance. It makes use of higher-quality features taken
from the Video Swin Transformer model. In this investigation, a
video of an anomaly was accurately detected with a 98.5%
accuracy rate, 98% precision, 90% recall, and 0.07% error rate.
According to experimental results that show the importance of
anomaly detection, locating anomalies in the frame helps to
provide outstanding results throughout extensive video
surveillance, and this method is highly robust. Due to the rare
incidence of anomalous occurrences, inconsistent behavior of
various types of anomalies, and an uneven availability of data
for normal and abnormal settings, anomaly identification in
videos is a difficult challenge. In the future, further tests may be
conducted by experimenting with various methods to reduce
the noise present in the positive bag.
References
Note
Abstract
6.1 Introduction
6.3.1 Dataset
(6.1)
(6.2)
(6.3)
(6.4)
Therefore, the activation function assumes a crucial role in
obtaining these ideal weight vectors. Equations 6.1–6.3 show
some well-known activations, such as the sigmoid, ReLU, and
tanh functions.
6.4.1 Accuracy
(6.5)
(6.6)
6.4.3 Recall
(6.7)
Comparative data for the recall metrics are shown in Figure 6.6.
Recall rates for the CNN are 97.6%; for the LGBA-NN, 90%; for
the PSO-NN, 85%; and the RT-ANN, 99%.
6.4.4 F-Measure
(6.8)
6.5 Conclusion
References
Note
1. Email: [email protected]
7
Machine Learning-Based
Intrusion Detection System with
Tuned Spider Monkey
Optimization for Wireless Sensor
Networks
Ilavendhan Anandaraj1* and Kaviarasan Ramu2
1
School of Computer Science and Engineering, Vellore Institute of
Technology, Chennai, India
2
Department of Computer Science and Engineering, RGM College
of Engineering and Technology, Nandyal, India
Abstract
A digital test bed with a star topology and hosts and servers
connected to the OpenFlow OVS-switch mimics the actual
network environment. The signature-based Snort IDS monitors
and detects attacks by mirroring server traffic. The risk
assessment demonstrates that the Snort IDS sufficiently protects
the network topology against threats, except for a few that
require mitigation. A flow-based IDS model is created for
architecture-scaled threat detection. The flow-based outlier
detection using machine learning defeats the signature-based
IDS [5]. Verma and Ranga [6] proposed ML classification
techniques that are used to secure the Internet of Things (IoT)
against DoS attacks. Classifiers that enhance anomaly-based
IDSs are thoroughly studied. Classifiers are evaluated using
popular metrics and validation techniques. CIDDS-001, UNSW-
NB15, and NSL-KDD datasets are used to benchmark classifiers.
Friedman and Nemenyi tests compare classifiers quantitatively.
Raspberry Pi tests classifier response time on IoT frameworks.
The primary focus of the study is on the latest most
authoritative literature available on the subject of machine
learning techniques and their implementation in the IoT and
the IDS for the purpose of protecting computer networks.
Therefore, the aim of the study is to conduct a comprehensive
literature review of current publications that address the
intersection of the IoT and ML in the IDS for computer
networks [7]. The IDSs have been using deep learning (DL),
along with other new approaches, to improve their
effectiveness in safeguarding computer networks and hosts.
Lansky et al. [8] proposed a comprehensive study and
categorization of DL-based intrusion detection techniques. It
begins with a presentation of the fundamental ideas of IDS
designs and the different DL techniques. Then, it groups the
designs according to the specific DL techniques they employ. It
explains how the use of deep learning networks can enhance
the accuracy of intrusion detection. The expansion of
cybersecurity research projects, such as those focusing on
intrusion detection and prevention systems, is of critical
importance. The use of an intrusion detection system, often
known as an IDS, is an efficient method of guarding against
harmful assaults. During the course of research conducted by
Alrowaily et al. [9], the CICIDS2017 intrusion detection dataset
was used in a variety of tests carried out on seven different
machine learning algorithms. The most effective method of
preventive control against assaults originating from IoT devices
is the use of ML and DL techniques, as Asharf et al. [10]
provided an overview of intrusion detection techniques and a
detailed assessment of the technologies, protocols, design, and
dangers connected to IoT systems that arise from compromised
IoT devices. That study also includes an evaluation of several
machine learning and deep learning-based strategies that may
be used to spot Internet of Things devices affected by
intrusions. Rahman et al. [11] proposed two approaches, semi-
distributed and distributed, that combine high-performing
feature extraction and selection with the possibility of fog-edge
synchronized analytics to overcome the limitations of the
centralized IDS for devices with limited resources. To divide up
the work, they each create their simultaneous ML algorithms
for a split intrusion dataset. On the semi-distributed side,
parallel methods are used for feature choices on both the edge
and fog sides, and then a single multilayer perceptron is used
for categorization. In the distributed manner, feature extraction
and multilayer perceptron categorization are carried out
independently by the parallel systems, and then the results are
aggregated by a coordinating edge or fog. Sarker et al. [12]
described an intrusion detection tree machine learning-based
security model that first ranks security mechanisms by
relevance and then builds a tree-based generalized intrusion
detection algorithm based on the chosen critical features. The
model predicts unseen test cases accurately and reduces
computation costs by lowering feature dimensionality. Dang
[13] analyzed the existing research by explicating the choices
made by IDSs constructed in earlier research. Users’ confidence
in using the system will increase if they have a stronger grasp
of the IDS, while programmers may depend on the explanation
to tweak the system. Based on the model’s interpretation, the
experimental findings indicate that they may greatly lower the
computing power requirements of the IDS. Idrissi et al. [14]
analyzed well-known security risks in accordance with the
Cisco IoT reference model architecture to examine the current
state of the art in IoT security threats and vulnerabilities.
Existing studies in the subject of IoT security are also reviewed,
with a focus on those that use DL methods to detect intrusions.
DL techniques are on the rise and are becoming more
important in many sectors, including cybersecurity. Sethi et al.
[15] presented a deep reinforcement learning-based adaptive
cloud IDS framework that overcomes the restrictions
mentioned above while performing accurate determination and
fine-grained categorization of novel and sophisticated assaults.
They conducted thorough testing using the benchmark UNSW-
NB15 dataset, which demonstrates higher accuracy and lower
False Positive Rate (FPR) when matched to state-of-the-art IDSs.
Network entities are susceptible to serious assaults due to a lack
of security measures. An effective security framework for
dealing with threats and detecting assaults is required to solve
that. To address the massive volume of intrusion data
categorization difficulties and enhance detection accuracy by
lowering false alarm rates, Ethala and Kumarappan [16]
proposed a hybrid optimization technique that combines the
spider monkey optimization and hierarchical particle swarm
optimization. The random forest classifier was used to classify
assaults from the NSL-KDD and UNSW-NB 15 datasets after
identifying the most optimal values. Wang [17] used the NSL-
KDD dataset to analyze the effectiveness of several attack
techniques against deep learning-based intrusion detection. It is
experimentally shown that neural networks used by IDSs are
vulnerable in certain ways. The function of various
characteristics in producing hostile data is investigated, and
they analyze the practicality and viability of the assault
strategies in light of their results.
7.3.2 Methodology
The investigation used the NSL-KDD dataset, and data
preparation was conducted to remove undesirable data from
the dataset. In the SVM and the TSMO, the characteristics from
which the leader selects whether to split or merge are
discussed, resulting in the selection of the optimal feature
value. Additionally, the TSMO hierarchically arranges the
particles based on their optimal function and categorizes the
attacks using the SVM. The flowchart of the SVM-TSMO is
illustrated in Figure 7.1.
(7.1)
Phase 1: Initialization
(7.2)
where Jmin m and Jmax m are limits of Jr in the mth vector. I(0,1) is
an arbitrary number (0, 1).
At this stage, the SMs will be aware of what their local leader
and their nearby neighbor know, and they will update their
location as a result. The following are the steps involved:
(7.3)
s
Phase 3: Global Leader
(7.2)
Phase 4: Local Leader Learning
(7.5)
During this phase, the group undergoes both fission and fusion,
particularly regarding the concept of a limit global leader,
which suggests that global leaders do not need to meet a
specific threshold to be considered as such.
7.4.1 Accuracy
(7.6)
7.4.2 Precision
(7.7)
7.4.3 Recall
(7.8)
7.4.4 F1 Score
7.5 Conclusion
Note
1
Department of Master of Computer Applications, MEASI
Institute of Information Technology, Royapettah, Chennai, India
2
Department of BCA, The New College, Chennai, India
3
Department of Computer Science and Engineering, Sathyabama
Institute of Science and Technology, Chennai, India
Abstract
8.1 Introduction
(8.2)
The basic goal of the SVM model is to choose the hyperplane
that optimally divides classes and maximizes the lowest
distance between any two data points (margin). In this sense, all
boundary points are support vectors. Figure 8.4 shows a
simplified representation of the basic variant of this system, the
linear SVM model.
(8.3)
where
for j ← 1 ti M do
L = 0;
for i ← 1 to Sv do
dist = 0
for r ← 1 to ft do
g ← Sv [i]mul l(r)
t ← g sub gg
dist ← t2
end
r ← −x mul dist
LL ← e mul r
L ← LL add LL
end
out ← L mul p
end
(8.4)
(8.5)
where iter denotes the j th− generational iteration, Randj
denotes ranges of random integers between 0 and 1 that are
dispersed equally, zj denotes the particle’s unique velocity
value, and h denotes the inertia weight that established the
particle’s speed before the present speed and acts as a hybrid of
the global search algorithm and the local search capability.
Figure 8.5 The MLPSO algorithm flowchart.
8.3.5.1 Accuracy
(8.6)
8.3.5.2 Precision
(8.7)
SVM-MLPSO (Proposed) 98
Table 8.2 Comparison of the precision.
8.3.5.3. Sensitivity
(8.8)
8.3.5.4 Specificity
SVM-MLPSO (Proposed) 96
Table 8.4 Comparison of the specificity.
SVM-MLPSO (Proposed) 95
(8.9)
8.3.5.5 Security
8.4 Conclusion
References
Note
Abstract
9.1 Introduction
9.3 Methodology
MBS has a greater coverage area, but APs within its range with
lesser coverage areas have nonoverlapping zones of coverage.
For this offloading process in this network that is diverse, we
take into account one MBS and many APs in order to simulate it
accurately.
(9.1)
where
(9.2)
(9.3)
The 5G and 6G communication models are shown in the above
graphic. Every user is online and working on downloading and
uploading tasks. We use the integrated data offloading (IDO)
using a game concept to prevent the congestion problem.
(9.5)
P denotes a team of players, and EB indicates the entry point in
Equation 9.5 from 1 to m [2]. For each AP, the different sorts of
data are represented by the Cartesian product of the two sets
previously indicated:
(9.6)
(9.7)
(9.8)
(9.9)
(9.10)
In Equation 9.10, Kr demonstrates the immediate pace of
EB, where Thro stands for throughput. The sum of the two
nodes represents the heterogonous network’s entire amount.
(9.11)
In Equation 9.11, ThroughputMBS shows the throughput of MBS,
and ThroughputEBs represents throughput of EBs autonomous
decision-making from a variety of methods is used to study the
construction of real-world models and how they interact. Three
things are involved: players, strategy, and payout. It defines
how players react and make decisions, as well as how they
adopt different positions and work together. The payoff
function is given by the following:
(9.12)
(9.13)
In Equation 9.13, r ∈ B, S exemplifies the game, Bf symbolizes
MBS participants in the game, and EBs and Gr represent a
group of strategies that players can use to obtain the highest
payout, and Br is the reward or a scoring mechanism that
depicts the players’ earnings.
(9.14)
where lO = {r1, r2,…,r0},lK = {r1, r2,…,rk},lG = {r1, r2,…,rg}, and lD =
{r1, r2,…,rd}
(9.15)
Data are offloaded using a kind-based method that takes into
account a clearly determined importance; for example, video
data may stream with a higher priority than text data. We
remove the second-order derivative pertaining to km after
confirming its wrap and seeing that Utlm continues to l. The
following equation makes a leading derivative assumption:
(9.16)
(9.17)
The optimum result for the ideal reaction would be for all
traffic downloaded by any EB is limited to the EB’s full
capability. In any case, the former would not be as good and
could not match the later. This limitation may thus be
mathematically represented as indicated below [9]:
(9.18)
The variables in Equation 9.18 are σr, the unloading fee, which
provides a driving incentive, and K (fr), which depicts the Best
Response feature. The aforementioned connection meets the
game’s positive attributes. The immediate rate of AP, which
includes the component specified in Equation 9.15, would be
approached by the Best Response function in order to increase
revenue. Adding to the Best Response relation is the following:
(9.19)
(9.20)
(9.21)
In Equations 9.20 and 9.21, the variables Kr (αl) show the Best
Respone function for the cost paid for offloading. fe shows the
offloaded traffic. Combining Equations 9.17 and 9.18 and
simplifying them, we obtain as change parameter,
which is always greater than 0; therefore, using the Best
Response feature is also scalable. By satisfying all three criteria,
it is ensured that the Best Response function is a standard
function and satisfies the Nash equation.
(9.22)
(9.23)
(9.24)
Subject to β ≤ βmax.
(9.25)
(9.26)
(9.28)
(9.29)
(9.30)
(9.31)
9.4 Result
9.5 Conclusion
The usage of data-hungry services has greatly increased
network traffic as a result of the widespread adoption of the
newest smart gadgets and fast Internet connections. Mobile
network operators must respond to the scenario by meeting the
substantial requirements, the volume, scope, and superior QoS
to secure the longevity of their connection with users and to
profit in a more sophisticated manner. All providers can afford
mobile data offloading, which improves QoS by lightening the
strain on the network. Offloading data off the cellular network,
many technologies are utilized, including Wi-Fi, mobile
networks using WiMAX, femtocells, opportunistic
communication, and IP. Internet offloading, however, is
common among them since it is cost-effective for both service
suppliers and customers. In order to test the linkage of Wi-Fi
employing cellular networks to offload, we developed many
scenarios and investigated offloading through Wi-Fi may be a
choice. Our major goal was to use the Stackelberg technique to
get the most offloading over Wi-Fi. We investigated the
Stackelberg approach’s effects on the commercial market. A
model for a game with two levels has been presented. In the
first stage, the MBS gives the APs economic stimulation
depending on the kinds of traffic they utilize, and in the second
phase, the APs take advantage of these impulses by releasing
other forms of traffic. To analyze our efforts, a mathematical
model is created and put through simulation and
experimentation. In order to investigate the impact of
incentives on offloading, we presented simulations for a range
of incentive levels using the simulation program MATLAB. The
performance of the QoS parameter was also examined and
contrasted with that of the current model. The trials
demonstrated showing the suggested model outperforms the
current model, and the proposed approach enabled Nash
equilibria to be reached using the Best Response potential
function. The suggested traffic type-based game also attained a
fully unique equilibrium. The suggested traffic type-based game
is deemed to be objectively better in all significant structures
and operations as a result of these numerical results. Our
methodology achieves maximum offloading and increased
throughput based on the best incentives. In such a two-way
offloading procedure, privateness and security is a contentious
subject for investigation, and research into numerous base
stations and many connected APs with criteria for efficiency
and delivery disparities is the unresolved problem that needs
more study.
References
1. Buffa, S. et al., 5th generation district heating and cooling
systems: A review of existing cases in Europe. Renew. Sustain.
Energy Rev., 104, 504–522, 2019, doi:
10.1016/j.rser.2018.12.059.
2. Stergiou, C.L. et al., IoT-based big data secure management in
the fog over a 6G wireless network. IEEE Internet Things J., 8,
7, 5164–5171, 2020, doi: 10.1109/JIOT.2020.3033131.
3. Youn, J.Y. et al., High-density proximity mapping reveals the
subcellular organization of mRNA-associated granules and
bodies. Mol. Cell, 69, 3, 517–532.e11, 2018, doi:
10.1016/j.molcel.2017.12.020.
4. Chen, S. et al., A survey on user-centric cell-free massive
MIMO systems. Digit. Commun. Netw., 8, 5, 695–719, 2022, doi:
10.1016/j.dcan.2021.12.005.
5. Enkavi, G. et al., Multiscale simulations of biological
membranes: The challenge to understand biological
phenomena in a living substance. Chem. Rev., 119, 9, 5607–
5774, 2019, doi: 10.1021/acs.chemrev.8b00538.
6. Luo, Y. et al., Secure and reliable D2D communications with
active attackers: A game-theoretic perspective and machine
learning approaches, in: Machine Learning and Intelligent
Communications, Proc. 5: 5th International Conference,
MLICOM 2020, Shenzhen, China, September 26-27, 2020,
Springer International Publishing, pp. 519–533, 2021, doi:
10.1007/978-3-030-66785-6_55.
7. Sarma, S.S. and Hazra, R., Interference mitigation methods
for D2D communication in 5G network, in: Cognitive
Informatics and Soft Computing: Proceeding of CISC, Springer,
Singapore, pp. 521–530, 2020, doi:10.1007/978-981-15-1451-
7_54.
8. Sanguanpuak, T. et al., Radio resource sharing and edge
caching with latency constraint for local 5G operator:
Geometric programming meets Stackelberg game. IEEE
Trans. Mob. Comput., 20, 2, 707–721, 2019, doi: 10.1109/
TMC.2019.2948630.
9. Liang, H. and Zhang, W., A survey and taxonomy of resource
allocation methods in wireless networks. J. Commun. Inf.
Netw., 6, 4, 372–384, 2021, doi: 10.23919/JCIN.2021.9663102.
10. Hashad, O. et al., Resources allocation in underlay device-to-
device communications networks: A reduced-constraints
approach. IEEE Access, 8, 228891–228904, 2020, doi:
10.1109/ACCESS.2020.3046417.
11. Lai, S. et al., Intelligent secure mobile edge computing for
beyond 5G wireless networks. Phys. Commun., 45, 101283,
2021, doi: 10.1016/j. phycom.2021.101283.
12. Cite Guo, F., Yu, F.R., Zhang, H., Ji, H., Leung, V.C., Li, X., An
adaptive wireless virtual reality framework in future
wireless networks: A distributed learning approach. IEEE
Trans. Veh. Technol., 69, 8, 8514–8528, 2020.
13. Kadam, S., Bhargao, K.S., Kasbekar, G.S., Node cardinality
estimation in a heterogeneous wireless network deployed
over a large region using a mobile base station. J. Network
Comput. Appl., 221, 103779, 2024.
Note
1
Department of Computer Science and Engineering, Koneru
Lakshmaiah Education Foundation, Vaddeswaram, Guntur, India
2
Department of Computer Science and Engineering, Vignan’s
Foundation for Science Technology and Research Deemed to be
University, Vadlamudi, Guntur, India
Abstract
10.1 Introduction
10.2 Methods
10.3 Results
The data used to create the logistic network model for the food
industry were obtained through professional interviews. Fifty
Lithuanian businesses involved in the continent’s food industry
took part in the interview. Invoices and other significant data
have been acquired, and several supply chain-related questions
have been raised. A significant portion of the interview’s results
were previously published. Table 10.1 shows a sample of the
collected data. The primary finding from the conversation was
that tiny markets frequently use partial goods. Typically,
businesses have between 5 and 20 pallets of cargo that need to
be imported or exported. The cost per pallet when shipping a
full truck is roughly 50 euros; however, when transporting
lower quantities, the cost per pallet might increase three to four
times. These findings compel the establishment of logistic
clusters of small- and medium-sized businesses, which will
share resources like transportation and information. For some
sectors, partial goods transit might be a challenge. In this
instance, we emphasized the results in light of the food
business. The food sector was selected as a reference sector
because it frequently uses temperature-controlled
transportation methods, which have a greater negative impact
on the environment than would other industries Figure 10.2.
Table 10.1 Example of demand and supply data from expert interviews with the food
industry.
Quantity
Loading of cargo, Delivery Required
country-city Euro countrycity temperature
pallets
(10.1)
(10.3)
10.4 Conclusions
References
Note
1
Department of Computer Science and Engineering, Koneru
Lakshmaiah Education Foundation, Vaddeswaram, Guntur, India
2
Department of Computer Science and Engineering, Sree Vahini
Institute of Science and Technology, Tiruvuru, India
Abstract
11.1 Introduction
11.3 Methodology
Favorable Structure’s
length (ST3)
Standards Nature Index Factors
Favorable Area height
(ST4)
Favorable Proportion of
ground-to-
building
exposure
(ST5)
Favorable Use of
groundlevel
floor (DR4)
Standards Nature Index Factors
Favorable Several
functions
(DR5)
Favorable Connection
(DR6)
Index 2 1 Weight
Index 2 1 Weight
Index 2 1 Weight
(11.1)
(11.2)
bj is the case of No. j, vi is the attribute of No.i, and wji = e
(bj, vi) is the utility function value of case j for attribute i. CQ is
the decision criterion in this scenario. Equation 11.2 may be
used to evaluate and order different UPS service choices based
on the selection criteria. Various utility function matrices and
criteria for making decisions lead to matching mega-attribute
processes for making decisions. The function substitute
evaluation for UPS entails six steps, all of which are by the
general procedure of multiple goals and mega-attribute-making
choices: (i) setting up the selection matrices, (ii) creating a
recursive hierarchy, (iii) normalizing the values of the
attributes, (iv) determining the index’s weight, (v) calculating
the complete characteristic usefulness value, and (vi) ranking
the various possible schemes.
We first create substitute libraries for the UPS functionality. The
renewal purpose possibilities for city UPS are arranged and
described, presenting regional rules, industrial standards for
design, and possible uses in future urbanization.
(11.3)
Figure 11.1 Weight matrix of attributes.
The mean of the 13 indications was 1.52 for all 200 instances.
The mean value of 200 instances for each of the six Driver
indices was 1.64 (Dr1), 1.43 (Dr2), 1.8 (Dr3), 1.53 (Dr4), 1.32
(Dr5), and 1.13 (Dr6), accordingly. The mean values for all
instances for each of the six Status indices were
correspondingly 1.36 (St1), 1.52 (St2), 1.53 (St3), 1.67 (St4), 1.75
(St5), and 1.43 (St6). The reaction index had an average value of
1.87. The Drivers index had a weighted mean of 1.48. The
current state indices’ weighted mean was 1.52.
The green region in the top right side represents the current
phase of growth, the yellow regions at the higher left and
bottom right sides indicate the medium-term phase of
expansion, and the red region in the lowered left corner
represents the long-term phase of expansion. Figure 11.4
reveals that a total of 92 instances have been categorized as
medium-term expansion, of which 30 are type 3 instances and
26 are type 2, 48 instances have been categorized as short-term
expansion, of which 18 are type 2 instances and 10 are each of
types 1, 3, and 4. Of the 60 instances categorized as recent
expansion, 34 are type 3 instances and 14 are type 4, while 30
are type 3 instances and 26 are type 2, and there are 92
instances categorized as medium-term expansion. Nearly half
of type 3 (44%) is growing rapidly compared to more than one-
third of type 2 (37%) and half of types 1, 2, and 3. Figure 11.4
also demonstrates the varied relationships between the Dr and
St. Type 3 Dr and St have a lesser positive association, whereas
Dr and St of other kinds have lesser opposing interactions.
Culture & 4 9 19 2 4
Entertainment
Office 5 8 23 5 5
DataCenter 1 10 25 7 7
Laboratory 7 3 19 3 6
Exhibition 2 2 13 8 1
Logistics 9 1 27 9 8
Commercial 6 5 30 10 9
Stadium 8 4 16 1 3
School 3 6 17 6 2
Type Type Type Type
Functions Ranking
2 4 1 3
Library 10 7 31 4 10
11.5 Conclusion
References
Note
1
Department of Computer Science and Engineering, Koneru
Lakshmaiah Education Foundation, Vaddeswaram, Guntur, India
2
Chaitanya Bharathi Institute of Technology, Hyderabad, India
3
Department of Humanities and Sciences, Vardhaman College of
Engineering, Shamshabad, Hyderabad, India
4
Sri Durga Malleswara Siddhartha Mahila Kalasala, Vijayawada,
India 5Department of Mathematics and Humanities, R V R and J C
College of Engineering, Chowdavaram, Guntur, India
Abstract
One of Industry 4.0’s key components is big data analytics
(BDA), a cornerstone. It has developed into an effective
instrument for boosting businesses’ competitive advantages by
improving data-driven performance. While this is happening,
the global resource problem is forcing corporations to take a
commission based on sustainability seriously. According to the
literature, BDA and innovation can increase a company’s
productivity and provide a competitive advantage. According to
this study, a sustainable competitive advantage (SCA) might be
produced by combining big data analytics capabilities (BDACs)
with elevated levels of data availability (DA). Research from the
past and the dynamic capacity hypothesis support this claim.
PLS-SEM, a statistical method that uses partial least squares to
model structural equations, was utilized to analyze the results
of this study’s survey of 117 manufacturing companies.
According to the findings, BDAC significantly boosts internal
consistency (IC) and is highly dependent on DA. Additionally,
statistics show that compared to BDAC, IC directly impacts a
firm’s SCA. This study provides important theoretical and
practical insights into the challenges of BDA application to
achieve suitable procedures, promoting industrial
organizations to improve their sustainable business
performance (SBP).
Keywords: Sustainable competitive advantage (SCA), data
availability (DA), big data analytics (BDA), firm performance
(FPER)
12.1 Introduction
12.4 Results
Construct R2 CA CR AVE
(12.1)
(12.2)
BDAC DA IC SCA
BDAC
DA 0.56554
IC 0.62260 0.48970
1 2 3 4
1 BDAC 0.75
2 DA 0.41 0.76
t- B- p- T
STDEV
value value value statistics
12.4.3 Discussion
References
Note
1
Department of Computer Science and Engineering, Koneru
Lakshmaiah Education Foundation, Vaddeswaram, Guntur, India
2
Department of Computer Science and Engineering, GITAM
Deemed to be University, Visakhapatnam, India
3
Department of Humanities and Sciences, Chebrolu Hanumaiah
Institute of Pharmaceutical Sciences, Chowadaram, Guntur, India
4
Department of Mathematics, GRIET, Hyderabad, India
5
Chaitanya Bharathi Institute of Technology, Hyderabad, India
Abstract
A few of an organization’s goals are innovation, large profits,
and continued survival. Even so, sustainability has evolved into
a rigorous activity for both commercial and charity
organizations, since it pushes businesses to greater
effectiveness. Sustainability requires enough funds and
expertise. The factors that impact sustainability were examined
in previous studies, but innovation is rarely considered from
this angle. The present study investigates the connection among
organizational performance, technical innovation, and
management creativity, with sustainability acting as a
mediating element. We tested the model using structural
equation modeling in the analysis of moment structures
(AMOS) using actual information collected from 304 CEOs and
top managers in various countries. The findings suggest that
incorporating new management practices and technologies into
an organization may greatly enhance its effectiveness and
longevity. Sustainability acts as a mediator between
management innovation and organizational performance and
between organizational performance and technical innovation.
To improve long-term viability and success, we urge CEOs and
other senior managers to invest in management and technical
innovation.
13.3 Methodology
Variables % Period
Bachelor 28.0 85
Nature of industry
Variables % Period
13.3.3 Control
Peak
Parameters Threshold Average S
performance
Sl.
Variables and items Estimate
no.
Management innovation
Management innovation
Technological innovation
Management innovation
Sustainability
Management innovation
Organization performance
Management innovation
13.3.7 Correlation
Factors AVE CR I II I
Qualification - - 1
Years - - 0.074 1
Unreliable Standard
parameters parameters
13.4 Discussion
Coefficients
Unreliable Standard
parameters parameters
13.5 Conclusions
This study offers a clear image of opposing hypotheses about
the connection between sustainability and financial success, as
well as the RBV hypothesis. Because of the inconsistent findings
of other research, this study aims to assess the impact of
management innovation and technology innovation on the
efficiency of companies with an intermediary function for
sustainability. To assess our strategy, we used a model made up
of structural equations in AMOS and SPSS to analyze
information gathered from 304 executives and other senior
executives. Our investigation revealed that TI is more crucial
than MI for the viability and success of businesses in
developing countries’ emerging economies. Firm leadership
should pay close attention to how MI is configured across
divisions, since doing so significantly improves performance
and longevity. Companies would do well to focus on MI and TI
rather than relying on just one, as they are the primary
markers of long-term viability and financial success. In
conclusion, we advocate for CEOs and executives to give MI and
TI implementation the time and care it needs in order to
succeed in the long run.
References
1. Cheng, Y. et al., How do technological innovation and fiscal
decentralization affect the environment? A story of the
fourth industrial revolution and sustainable growth. Technol.
Forecast. Soc. Change, 162, 120398, 2021, doi:
10.1016/j.techfore.2020.120398.
2. Pan, X. et al., Dynamic relationship among environmental
regulation, technological innovation and energy efficiency
based on large scale provincial panel data in China. Technol.
Forecast. Soc. Change, 144, 428–435, 2019, doi:
10.1016/j.techfore.2017.12.012.
3. Garousi Mokhtarzadeh, N. et al., Investigating the impact of
networking capability on firm innovation performance:
Using the resource-action performance framework. J.
Intellect. Cap., 21, 6, 1009–1034, 2020, doi: 10.1108/ JIC-01-
2020-0005.
4. Teece, D.J., A capability theory of the firm: An economics and
(strategic) management perspective. N. Z. Econ. Pap., 53, 1, 1–
43, 2019, doi: 10.1080/00779954.2017.1371208.
5. Parida, V. et al., Reviewing literature on digitalization,
business model innovation, and sustainable industry: Past
achievements and future promises. Sustainability, 11, 2, 391,
2019, doi: 10.3390/su11020391.
6. El-Kassar, A.N. and Singh, S.K., Green innovation and
organizational performance: The influence of big data and
the moderating role of management commitment and HR
practices. Technol. Forecast. Soc. Change, 144, 483–498, 2019,
doi: 10.1016/j.techfore.2017.12.016.
7. Ode, E. and Ayavoo, R., The mediating role of knowledge
application in the relationship between knowledge
management practices and firm innovation. J. Innov. Knowl.,
5, 3, 210–218, 2020, doi: 10.1016/j.jik.2019.08.002.
8. Demir, A. et al., Links between knowledge management and
organizational sustainability: Does the ISO 9001 certification
have an effect? ISO 9001. Knowl. Manage. Res. Pract., 21, 1,
183–196, 2023, doi: 10.1080/14778238.2020.1860663.
9. Chege, S.M. et al., Impact of information technology
innovation on firm performance in Kenya. Inf. Technol. Dev.,
26, 2, 316–345, 2020, doi: 10.1080/02681102.2019.1573717.
10. Chen, Q. et al., Effects of organizational innovation and
technological innovation capabilities on firm performance:
Evidence from firms in China’s Pearl River Delta. Asia Pac.
Bus. Rev., 26, 1, 72–96, 2020, doi:
10.1080/13602381.2019.1592339.
11. Singh, S.K. et al., Top management knowledge value,
knowledge sharing practices, open innovation and
organizational performance. J. Bus. Res., 128, 788–798, 2021,
doi: 10.1016/j.jbusres.2019.04.040.
12. Abubakar, A.M. et al., Knowledge management, decision-
making style and organizational performance. J. Innov.
Knowl., 4, 2, 104–114, 2019, doi: 10.1016/j.jik.2017.07.003.
13. Sinha, N. and Dhall, N., Mediating effect of TQM on
relationship between organisational culture and
performance: Evidence from Indian SMEs. Total Qual.
Manage. Bus. Excell., 31, 15-16, 1841–1865, 2020, doi:
10.1080/14783363.2018.1511372.
14. De, D. et al., Impact of lean and sustainability oriented
innovation on sustainability performance of small and
medium sized enterprises: A data envelopment analysis-
based framework. Int. J. Prod. Econ., 219, 416–430, 2020, doi:
10.1016/j.ijpe.2018.07.003.
15. Chege, S.M. and Wang, D., The influence of technology
innovation on SME performance through environmental
sustainability practices in Kenya. Technol. Soc., 60, 101210,
2020, doi: 10.1016/j.techsoc.2019.101210.
16. Abbas, J., Impact of total quality management on corporate
sustainability through the mediating effect of knowledge
management. J. Cleaner Prod., 244, 118806, 2020, doi:
10.1016/j.jclepro.2019.118806.
17. Yu, M. and Zhao, R., Sustainability and firm valuation: An
international investigation. Int. J. Account. Inf. Manage., 23,
289–307, 2015, https://doi.org/10.1108/IJAIM-07-2014-0050.
Note
1
Department of ECE, VelTech Rangarajan Dr. Sagunthala R&D
Institute of Science and Technology, Tamil Nadu, India
2
Department of ECE, National Institute of Technology Silchar,
Assam, India
Abstract
14.1 Introduction
(14.1)
(14.2)
The received modulated signal at the EU, when the channel gain
between the BS and the EU is hk,i, can be written as:
(14.3)
(14.4)
(14.5)
where |Hk,i|2 is the normalized channel response of the ith EU.
Ik is the interference received from the other EUs from the
same NOMA cluster and can be represented as:
(14.6)
(14.7)
(14.8)
where can be represented as:
(14.9)
(14.10)
(14.11)
Accordingly, the optimization problem for resource allocation
can be formulated as:
(14.12)
S.t.
(14.13)
(14.14)
(14.15)
(14.16)
(14.17)
(14.18)
s (14.19)
(14.20)
Equation 14.19 states that the power allocated to all of the EUs
is less than the total budget of the power pk.
Where the network resources are nothing but the power and
the bandwidth used in any communication. We should evaluate
about how much power is transmitted through the entire
process or how much power is there for the process of
transmission. Coming to bandwidth, we have to evaluate how
much bandwidth is generally utilized by one communication
node while utilizing channels in this entire process. Now,
coming to air traffic, it is the data transferred in the air from
one user to another user or may be from one base station to
another base station.
In general, users within the coverage area of one SBS also come
under the coverage of the MBS. Thus, received power-based
association gives the first priority to SBS, whereas demand
fulfillment has to be taken care of with the SINR. Thus, user’s
association has to perform with SBS or MBS based on received
power and data rate. In case a device is free to choose its
association with a BS. The association with the SBSs is
established on a first-come, first-served basis. When the
threshold is reached, the users are connected to the MBS
regardless of their geographical location.
Parameters Value
QoS exponent 3
Data Suit-1
Data Suit-2
14.4 Conclusion
References
Note
Abstract
15.1 Introduction
At a sieving size of 2 mm, the soil was dried at 40°C. The pH,
quantity of organic matter (OM), and distribution of particle
sizes were measured in a suspension of soil and water prepared
from the sieved fraction (clay, silt, and sand). The proposed
method emphasizes that unstable aggregates degrade when
submerged in water and uses moisture screening equipment to
assess aggregate stability. The wet sieving methodology includes
the fundamental mechanisms of aggregate dispersion, slaking,
and mechanical dispersion, simulating the pressures associated
with water infiltration into SA in the field. A 0.25-mm filter
holding distilled water and 4.0 g of solid crystals between 1 and
2 mm is repeatedly raised and lowered for 3 minutes during the
experiment. Stable aggregates that pass through the sieve
during the 3-minute wet sifting procedure are collected in the
distilled water container below the sieve. After the sieves have
been cleaned until only sand and small root fragments remain,
the canisters are reinstalled and filled with a dispersing
solution. Both sets of cans are then dried at 110°C after
dewatering. Distilled water and dispersing solution are added
to the canisters, and the weights of the water-filled can and its
contents are calculated and subtracted. The weight of the stable
materials is calculated by subtracting the weight of the
dispersing solution and 0.2 g of that solution from the weight of
the container containing the aggregates. The weight of the
stable aggregates obtained in the cans of dispersing solution is
then divided by the sum of the weights of the stable and
unstable aggregates in Equation 15.1, where 100% indicates
that no aggregates were broken and 0% indicates that all
aggregates were broken. The WSA index is then calculated
using the percentage of stable aggregates.
(15.1)
The following data formula uses the most popular decision tree
algorithm, C5.0:
(15.2)
(15.3)
(15.4)
Such that each hyperplane is closer to and further distant from
the data points of one class than the data points of the other. It
is given the class name +1 or 1 depending on how close together
the two hyperplanes’ data samples are. TBSVM resolves the two
quadratic programming problems (QPPs) by using the objective
function of one class and constraints related to the other class.
(15.5)
and
(15.6)
(15.7)
(15.8)
(15.9)
(15.10)
(15.11)
(15.12)
(15.13)
Since β≥ 0, Equation 15.9 gives us:
(15.14)
Here is the identity matrix, etc. Equation 15.14 becomes true if
V1 = [w1,b1]T, H = [A e1] and G = [B e2]
(15.15)
The dual of the QPP can be found by combining Equation
15.15 with Equations 15.8 through 15.13 in the Lagrangian.
(15.16)
(15.17)
(15.19)
(15.20)
(15.21)
Figure 15.4 demonstrates that for the R2, the suggested method
(0.82%) outperformed the results of the current methods of RF
(0.74%), KNN (0.21%), SVM (0.28%), and ANN (0.15%). It shows
the suggested system’s better performance.
(15.22)
(15.23)
15.5 Conclusion
References
Note
1. Email: [email protected]
Index
Feature extraction, 23, 74, 85, 86, 87, 88, 89, 136, 137, 139, 141,
143, 153, 167, 192
Feature selection, 8, 14, 41, 61, 65, 79, 95, 96, 97, 98, 100, 101,
103, 104, 114, 119, 121, 125, 130, 151, 152, 154, 155
Firefly algorithm, 14, 59
Flower pollination algorithm, 16
Genetic algorithm, 1, 2, 3, 5, 23, 39, 43, 44, 49, 100, 101, 102
Global optimization, 2, 51, 62
Global search, 2, 50, 98, 188
Glowworm swarm optimization, 18
Grasshopper optimization algorithm, 19
Gray wolf optimizer, 14, 19, 45, 57
Imaging, 73, 75, 76, 77, 78, 79, 80, 81, 82, 83, 90, 91, 101
Imaging modalities, 73, 76, 82, 83, 90, 91
Imperialist competitive algorithm, 14, 15
Intrusion detection, 151, 163–167, 177
IoT, 149–152, 154, 156, 160, 166–167, 183, 196, 221–222, 256,
264–265, 295
Machine learning, 1, 3, 14, 23, 37–40, 44, 50, 53, 61, 63–64, 73,
76, 83, 86, 91, 95–97, 101–102, 104, 113–114, 122, 130, 142, 149,
151–152, 154, 163–167, 179, 183–185, 193, 197, 301, 313
Magnetic resonance, 81, 101
Mammography, 23, 79, 80, 81, 82, 91
Metaheuristic algorithm, 1, 2, 3, 10, 21–26, 38–39, 42, 46, 49,
53–56, 59, 62–65, 287, 288, 295
Moth–flame optimization, 19–20, 57
Tele-Healthcare
Applications of Artificial Intelligence and Soft Computing
Techniques
Edited by R. Nidhya, Manish Kumar and S. Balamurugan
Published 2022. ISBN 978-1-119-84176-0
Computation in Bioinformatics
Multidisciplinary Applications
Edited by S. Balamurugan, Anand Krishnan, Dinesh Goyal,
Balakumar Chandrasekaran and Boomi Pandi
Published 2021. ISBN 978-1-119-65471-1
www.scrivenerpublishing.com
WILEY END USER LICENSE
AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.