Metaheuristic research: a comprehensive survey
Because of successful implementations and high intensity of research, metaheuristic research has been extensively reported in literature, which covers algorithms, applications, comparisons, and analysis. Though, it has been evidenced that little has been done on insightful analysis of metaheuristic...
| Main Authors: | Hussain, Kashif, Mohd Salleh, Mohd Najib, Shi, Cheng, Yuhui, Shi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer Nature
2018
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/4839/ http://eprints.uthm.edu.my/4839/1/AJ%202018%20%28122%29.pdf |
Similar Items
Common benchmark functions for metaheuristic evaluation: a review
by: Hussain, Kashif, et al.
Published: (2017)
by: Hussain, Kashif, et al.
Published: (2017)
On the exploration and exploitation in popular swarm-based
metaheuristic algorithms
by: Hussain, Kashif, et al.
Published: (2018)
by: Hussain, Kashif, et al.
Published: (2018)
Enhancing Classification Algorithms with Metaheuristic Technique
by: Cokro, Nurwinto, et al.
Published: (2024)
by: Cokro, Nurwinto, et al.
Published: (2024)
Comprehensive survey on Big Data Privacy
Protection
by: BinJubeir, Mohammed, et al.
Published: (2019)
by: BinJubeir, Mohammed, et al.
Published: (2019)
A review of training methods of ANFIS for applications in business and economic
by: Mohd Salleh, Mohd Najib, et al.
Published: (2016)
by: Mohd Salleh, Mohd Najib, et al.
Published: (2016)
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2021)
by: Noor Syahirah, Nordin, et al.
Published: (2021)
African Buffalo Optimization (ABO): A New Metaheuristic
Algorithm
by: Odili, Julius Beneoluchi, et al.
Published: (2015)
by: Odili, Julius Beneoluchi, et al.
Published: (2015)
Trust Evaluation Model in IoT Environment: A Comprehensive Survey
by: ABDULKARIM ALHANDI, SOMYA, et al.
Published: (2023)
by: ABDULKARIM ALHANDI, SOMYA, et al.
Published: (2023)
Comparative study of five metaheuristic algorithms for team formation problem
by: Kader, Md. Abdul, et al.
Published: (2021)
by: Kader, Md. Abdul, et al.
Published: (2021)
A review of training methods of ANFIS for applications in business and economics
by: Mohd Salleh, Mohd Najib, et al.
Published: (2016)
by: Mohd Salleh, Mohd Najib, et al.
Published: (2016)
PMT : opposition based learning technique for enhancing metaheuristic algorithms performance
by: Hammoudeh, S. Alamri
Published: (2020)
by: Hammoudeh, S. Alamri
Published: (2020)
Performance analyses of graph heuristics and selected trajectory metaheuristics on examination timetable problem
by: Mandal, Ashis Kumar, et al.
Published: (2020)
by: Mandal, Ashis Kumar, et al.
Published: (2020)
A Survey of schema matching research using database schemas and instances
by: Aljuboori, Ali Alwan, et al.
Published: (2017)
by: Aljuboori, Ali Alwan, et al.
Published: (2017)
An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion
by: Haque, Ariful
Published: (2018)
by: Haque, Ariful
Published: (2018)
Survey on input output relation based combination test data generation strategies
by: Alsewari, Abdulrahman A., et al.
Published: (2015)
by: Alsewari, Abdulrahman A., et al.
Published: (2015)
A Mobile Application Development for Recognising Unused Medical Equipment Using Deep Learning Models
by: Wong, Shi Ting
Published: (2021)
by: Wong, Shi Ting
Published: (2021)
Improvement of fuzzy neural network using mine blast algorithm for classification of Malaysian Small Medium Enterprises based on strength
by: Hussain Talpur, Kashif
Published: (2015)
by: Hussain Talpur, Kashif
Published: (2015)
A broad survey of Web-based Bioinformatics research and data mining using BLAST / by Tan Wooi Keng.
by: Tan, Wooi Keng
Published: (2002)
by: Tan, Wooi Keng
Published: (2002)
A comprehensive usability model for evaluating smartphone apps
by: Rahmat, Hazwani, et al.
Published: (2018)
by: Rahmat, Hazwani, et al.
Published: (2018)
Perspective on selected sample on SDL in JAVA-an analysis of a learning module design for pre-evaluation purposes
by: Ibrahim, Zakir Hussain
Published: (2001)
by: Ibrahim, Zakir Hussain
Published: (2001)
A Rule Extraction Algorithm That Scales Between Fidelity and Comprehensibility
by: Muthu Anbananthen, Kalaiarasi Sonai, et al.
Published: (2012)
by: Muthu Anbananthen, Kalaiarasi Sonai, et al.
Published: (2012)
Forced Convection of MHD Radiative Jeffrey Nanofluid Over a Moving Plate
by: Syazwani, Mohd Zokri, et al.
Published: (2021)
by: Syazwani, Mohd Zokri, et al.
Published: (2021)
A Survey of UML Tools
by: Weng, Jie Thong, et al.
Published: (2015)
by: Weng, Jie Thong, et al.
Published: (2015)
Comprehensive analysis on the influences of computer ethics on information security
by: Abdul Rahim, Fiza
Published: (2009)
by: Abdul Rahim, Fiza
Published: (2009)
Comprehensive review of the development of the harmony search algorithm and its applications
by: Al-Omoush, A.A., et al.
Published: (2019)
by: Al-Omoush, A.A., et al.
Published: (2019)
A survey of arabic text mining
by: Salloum, Said A., et al.
Published: (2017)
by: Salloum, Said A., et al.
Published: (2017)
A Systematic Survey on the Research of AI-predictive Models for Wastewater Treatment Processes
by: Mohan, Varun Geetha, et al.
Published: (2023)
by: Mohan, Varun Geetha, et al.
Published: (2023)
A novel hybrid metaheuristic algorithm for short term load forecasting
by: Zuriani, Mustaffa, et al.
Published: (2017)
by: Zuriani, Mustaffa, et al.
Published: (2017)
A survey of multi-biometrics and fusion levels
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Higher derivative block methods of generalised steplength for the direct solution of fuzzy ordinary differential equations
by: Hussain, Kashif
Published: (2023)
by: Hussain, Kashif
Published: (2023)
GEOGIRA II : Pendekatan ke arah rekabentuk berbantukan komputer
by: Salleh, Shaharuddin, et al.
Published: (1992)
by: Salleh, Shaharuddin, et al.
Published: (1992)
T-Way Testing Strategies: A Critical Survey and Analysis
by: Kamal Z., Zamli, et al.
Published: (2013)
by: Kamal Z., Zamli, et al.
Published: (2013)
Cloud computing issues, challenges, and needs: A survey
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
A comprehensive performance evaluation of MIPv6 and PMIPv6 mobility management protocols in wireless mesh network
by: Hoh, Wei Siang, et al.
Published: (2021)
by: Hoh, Wei Siang, et al.
Published: (2021)
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Routing problem in rectangular mesh network using shortest path based Greedy method
by: Noraziah, Adzhar, et al.
Published: (2019)
by: Noraziah, Adzhar, et al.
Published: (2019)
Fragmentation techniques for ideal performance in distributed database - a survey
by: Sharifah Hafizah, Syed Ahmad Ubaidillah, et al.
Published: (2020)
by: Sharifah Hafizah, Syed Ahmad Ubaidillah, et al.
Published: (2020)
Validation of a Proposed Dashboard Model for Researchers In Social Research Network Sites
by: Siti Hawa, Apandi, et al.
Published: (2015)
by: Siti Hawa, Apandi, et al.
Published: (2015)
A Design of Proposed Dashboard Model for Researchers in Social Research Network Sites
by: Siti Hawa, Apandi, et al.
Published: (2015)
by: Siti Hawa, Apandi, et al.
Published: (2015)
A comparison study between Doane’s and Freedman-Diaconis’ binning rule in characterizing potential water resources availability
by: Chuan, Zun Liang, et al.
Published: (2019)
by: Chuan, Zun Liang, et al.
Published: (2019)
Similar Items
-
Common benchmark functions for metaheuristic evaluation: a review
by: Hussain, Kashif, et al.
Published: (2017) -
On the exploration and exploitation in popular swarm-based
metaheuristic algorithms
by: Hussain, Kashif, et al.
Published: (2018) -
Enhancing Classification Algorithms with Metaheuristic Technique
by: Cokro, Nurwinto, et al.
Published: (2024) -
Comprehensive survey on Big Data Privacy
Protection
by: BinJubeir, Mohammed, et al.
Published: (2019) -
A review of training methods of ANFIS for applications in business and economic
by: Mohd Salleh, Mohd Najib, et al.
Published: (2016)