2021
DOI: 10.1007/s10586-021-03304-5
|View full text |Cite
|
Sign up to set email alerts
|

An efficient harris hawk optimization algorithm for solving the travelling salesman problem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 61 publications
(24 citation statements)
references
References 83 publications
0
14
0
Order By: Relevance
“…This article uses the random numbers generated by the Fortuna Accumulator method of Crypto encryption module in python as plaintexts, and then uses the cryptographic algorithm library in the same module to encrypt the plaintexts to obtain the ciphertexts. The encryption key and initialization vector are generated by the Cipher encryption module of Crypto ( Gharehchopogh & Abdollahzadeh, 2021 ), and we use AES, 3DES, Blowfish, CAST and RC2 from cryptographic algorithm library to generate ciphertexts using a fixed 16-bit string key in ECB mode. We chose five ciphertext sizes: 1, 8, 64, 256, 512 KB, and each with 100 files, totaling 500 files for one cryptographic algorithm, so 2,500 files for five algorithms.…”
Section: Experimental Environmentmentioning
confidence: 99%
“…This article uses the random numbers generated by the Fortuna Accumulator method of Crypto encryption module in python as plaintexts, and then uses the cryptographic algorithm library in the same module to encrypt the plaintexts to obtain the ciphertexts. The encryption key and initialization vector are generated by the Cipher encryption module of Crypto ( Gharehchopogh & Abdollahzadeh, 2021 ), and we use AES, 3DES, Blowfish, CAST and RC2 from cryptographic algorithm library to generate ciphertexts using a fixed 16-bit string key in ECB mode. We chose five ciphertext sizes: 1, 8, 64, 256, 512 KB, and each with 100 files, totaling 500 files for one cryptographic algorithm, so 2,500 files for five algorithms.…”
Section: Experimental Environmentmentioning
confidence: 99%
“…Swarm search algorithms are widely used in robotics, such as inverse solution computation ( Zhao et al, 2022 ), control ( Liu G et al, 2021 ; Wu et al, 2022 ), pose recognition ( Li et al, 2019a ; Tao et al, 2022a ) and other nonlinear problems ( Huang et al, 2019 ; Sun et al, 2020d ; Hao et al, 2022 ). Recently published optimisers ( Ghafori and Gharehchopogh, 2012 ; Abedi and Gharehchopogh, 2020 ; Abdollahzadeh et al, 2021a ; Gharehchopogh et al, 2021a ; Abdollahzadeh et al, 2021b ; Benyamin et al, 2021 ; Gharehchopogh et al, 2021b ; Gharehchopogh and Abdollahzadeh, 2021 ; Goldanloo and Gharechophugh, 2021 ; Mohammadzadeh and Gharehchopogh, 2021 ; Zaman and Gharehchopogh, 2021 ; Gharehchopogh, 2022 ) have achieved good performance but may not suit industrial scenarios with high real-time requirements. The particle swarm optimization algorithm (PSO) is used to search for the global time-optimal trajectory of a spatial robot in conjunction with robot dynamics ( Huang and Xu, 2006 ).…”
Section: Related Workmentioning
confidence: 99%
“…These strategies improve the exploration efficiency of the HHO algorithm, and can also avoid the occurrence of local optimal. It has also been furthermore applied in solving other global optimization algorithm such as travelling salesman problems [ 66 , 67 ], multiple objective feature selection problems [ 68 ].…”
Section: Preliminariesmentioning
confidence: 99%