Based on a panoramic analysis of the serious Yangtze deluge in 1998 and its hydrological traits, the authors elucidate the formative factors of the deluge and review existing flood-control policies in retrospect. In a...Based on a panoramic analysis of the serious Yangtze deluge in 1998 and its hydrological traits, the authors elucidate the formative factors of the deluge and review existing flood-control policies in retrospect. In addition, some countermeas-ures are suggested for coping with similar calamities in the near future.展开更多
Various feature selection algorithms are usually employed to improve classification models’overall performance.Optimization algorithms typically accompany such algorithms to select the optimal set of features.Among t...Various feature selection algorithms are usually employed to improve classification models’overall performance.Optimization algorithms typically accompany such algorithms to select the optimal set of features.Among the most currently attractive trends within optimization algorithms are hybrid metaheuristics.The present paper presents two Stages of Local Search models for feature selection based on WOA(Whale Optimization Algorithm)and Great Deluge(GD).GD Algorithm is integrated with the WOA algorithm to improve exploitation by identifying the most promising regions during the search.Another version is employed using the best solution found by the WOA algorithm and exploited by the GD algorithm.In addition,disruptive selection(DS)is employed to select the solutions from the population for local search.DS is chosen to maintain the diversity of the population via enhancing low and high-quality solutions.Fifteen(15)standard benchmark datasets provided by the University of California Irvine(UCI)repository were used in evaluating the proposed approaches’performance.Next,a comparison was made with four population-based algorithms as wrapper feature selection methods from the literature.The proposed techniques have proved their efficiency in enhancing classification accuracy compared to other wrapper methods.Hence,the WOA can search effectively in the feature space and choose the most relevant attributes for classification tasks.展开更多
Code dissemination is one of the important services of wireless sensor networks (WSNs). Securing the process of code dissemination is essential in some certain WSNs applications, state-of-the-art secure code dissemina...Code dissemination is one of the important services of wireless sensor networks (WSNs). Securing the process of code dissemination is essential in some certain WSNs applications, state-of-the-art secure code dissemination protocols for WSNs aim for the efficient source authentication and integrity verification of code image, however, due to the resource constrains of WSNs and the epidemic behavior of the code dissemination system, existing secure code dissemination protocols are vulnerable to Denial of Service (DoS) attacks when sensor nodes can be compromised (insider DoS attacks). In this paper, we identify five different basic types of DoS attacks exploiting the epidemic propagation strategies used by Deluge. They are (1) Higher-version Advertisement attack, (2) False Request attack, (3) Larger-numbered Page attack, (4) Lower-version Adv attack, and (5) Same-version Adv attack. Simulation shows these susceptibilities caused by above insider DoS attacks. Some simple models are also proposed which promote understanding the problem of insider DoS attacks and attempt to quantify the severity of these attacks in the course of code dissemination in WSNs.展开更多
A new approach for the prediction of lift, drag, and moment coefficients is presented. This approach is based on the support vector machines (SVMs) methodology and an optimization meta-heuristic algorithm called ext...A new approach for the prediction of lift, drag, and moment coefficients is presented. This approach is based on the support vector machines (SVMs) methodology and an optimization meta-heuristic algorithm called extended great deluge (EGD). The novelty of this approach is the hybridization between the SVM and the EGD algorithm. The EGD is used to optimize the SVM parameters. The training and validation of this new identification approach is realized using the aerodynamic coefficients of an ATR-42 wing model. The aerodynamic coefficients data are obtained with the XFoil software and experimental tests using the Price-Paidoussis wind tunnel. The predicted results with our approach are compared with those from the XFoil software and experimental results for different flight cases of angles of attack and Mach numbers. The main pur- pose of this methodology is to rapidly Predict aircraft aerodynamic coefficients.展开更多
文摘Based on a panoramic analysis of the serious Yangtze deluge in 1998 and its hydrological traits, the authors elucidate the formative factors of the deluge and review existing flood-control policies in retrospect. In addition, some countermeas-ures are suggested for coping with similar calamities in the near future.
基金This research is part of a project funded by Imam Abdulrahman Bin Faisal University,under Grant Number 2020-083-BASRC.
文摘Various feature selection algorithms are usually employed to improve classification models’overall performance.Optimization algorithms typically accompany such algorithms to select the optimal set of features.Among the most currently attractive trends within optimization algorithms are hybrid metaheuristics.The present paper presents two Stages of Local Search models for feature selection based on WOA(Whale Optimization Algorithm)and Great Deluge(GD).GD Algorithm is integrated with the WOA algorithm to improve exploitation by identifying the most promising regions during the search.Another version is employed using the best solution found by the WOA algorithm and exploited by the GD algorithm.In addition,disruptive selection(DS)is employed to select the solutions from the population for local search.DS is chosen to maintain the diversity of the population via enhancing low and high-quality solutions.Fifteen(15)standard benchmark datasets provided by the University of California Irvine(UCI)repository were used in evaluating the proposed approaches’performance.Next,a comparison was made with four population-based algorithms as wrapper feature selection methods from the literature.The proposed techniques have proved their efficiency in enhancing classification accuracy compared to other wrapper methods.Hence,the WOA can search effectively in the feature space and choose the most relevant attributes for classification tasks.
文摘Code dissemination is one of the important services of wireless sensor networks (WSNs). Securing the process of code dissemination is essential in some certain WSNs applications, state-of-the-art secure code dissemination protocols for WSNs aim for the efficient source authentication and integrity verification of code image, however, due to the resource constrains of WSNs and the epidemic behavior of the code dissemination system, existing secure code dissemination protocols are vulnerable to Denial of Service (DoS) attacks when sensor nodes can be compromised (insider DoS attacks). In this paper, we identify five different basic types of DoS attacks exploiting the epidemic propagation strategies used by Deluge. They are (1) Higher-version Advertisement attack, (2) False Request attack, (3) Larger-numbered Page attack, (4) Lower-version Adv attack, and (5) Same-version Adv attack. Simulation shows these susceptibilities caused by above insider DoS attacks. Some simple models are also proposed which promote understanding the problem of insider DoS attacks and attempt to quantify the severity of these attacks in the course of code dissemination in WSNs.
基金funded by the Natural Sciences and Engineering Research Council of Canada(NSERC)in the frame of the Canada Research Chair for Aircraft Modeling and Simulation Technologies
文摘A new approach for the prediction of lift, drag, and moment coefficients is presented. This approach is based on the support vector machines (SVMs) methodology and an optimization meta-heuristic algorithm called extended great deluge (EGD). The novelty of this approach is the hybridization between the SVM and the EGD algorithm. The EGD is used to optimize the SVM parameters. The training and validation of this new identification approach is realized using the aerodynamic coefficients of an ATR-42 wing model. The aerodynamic coefficients data are obtained with the XFoil software and experimental tests using the Price-Paidoussis wind tunnel. The predicted results with our approach are compared with those from the XFoil software and experimental results for different flight cases of angles of attack and Mach numbers. The main pur- pose of this methodology is to rapidly Predict aircraft aerodynamic coefficients.