2018
DOI: 10.1016/j.ins.2018.01.041
|View full text |Cite
|
Sign up to set email alerts
|

A new dynamic firefly algorithm for demand estimation of water resources

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
49
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 139 publications
(49 citation statements)
references
References 32 publications
0
49
0
Order By: Relevance
“…Based on the above analysis, dimension learning is embedded into Equations (12) and (13). Then, the new search models are rewritten as below:…”
Section: Dimensional Learningmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the above analysis, dimension learning is embedded into Equations (12) and (13). Then, the new search models are rewritten as below:…”
Section: Dimensional Learningmentioning
confidence: 99%
“…To effectively solve optimization problems, intelligent optimization methods have been presented. Some representative algorithms are particle swarm optimization [1][2][3][4][5], artificial bee colony (ABC) [6,7], differential evolution [8,9], firefly algorithm [10][11][12][13], earthworm optimization algorithm [14], cuckoo search [15,16], moth search [17], pigeon inspired optimization [18], bat algorithm [19][20][21][22][23], krill herd algorithm [24][25][26][27], and social network optimization [28]. Among these algorithms, ABC has few control parameters and strong exploration abilities [29,30].…”
Section: Introductionmentioning
confidence: 99%
“…Intelligent optimization algorithms (IOAs) have attracted much attention in the past several years. Recently, different 2 Mathematical Problems in Engineering IOAs were proposed to solve various optimization problems [5][6][7][8][9][10][11][12][13]. ABC is a popular optimization algorithm based on swarm intelligence [1].…”
Section: Standard Abcmentioning
confidence: 99%
“…The inside KGAs are that the test server launched keyword-guessing attacks. Actually, such kind of attack also has been considered in deduplication system [30] and other security protocols [3,[31][32][33]. Specifically, the malicious server can create their ciphertext since the production of a PEKS ciphertext of keyword involves only public parameters.…”
Section: Introductionmentioning
confidence: 99%