Pub Date : 2023-01-31DOI: 10.1007/s12065-023-00815-5
Pingping Chen, Long Chen
{"title":"Prediction method of intelligent building electricity consumption based on deep learning","authors":"Pingping Chen, Long Chen","doi":"10.1007/s12065-023-00815-5","DOIUrl":"https://doi.org/10.1007/s12065-023-00815-5","url":null,"abstract":"","PeriodicalId":46237,"journal":{"name":"Evolutionary Intelligence","volume":"16 1","pages":"1637 - 1644"},"PeriodicalIF":2.6,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45252667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-28DOI: 10.1007/s12065-023-00823-5
Ashutosh Kumar Singh, G. Kumar, Guneet Singh Dhillon, H. Taneja
{"title":"Hybridization of chaos theory and dragonfly algorithm to maximize spatial area coverage of swarm robots","authors":"Ashutosh Kumar Singh, G. Kumar, Guneet Singh Dhillon, H. Taneja","doi":"10.1007/s12065-023-00823-5","DOIUrl":"https://doi.org/10.1007/s12065-023-00823-5","url":null,"abstract":"","PeriodicalId":46237,"journal":{"name":"Evolutionary Intelligence","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2023-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45820448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-19DOI: 10.1007/s12065-023-00821-7
Xingcheng Pu, Xi Song, Ling Tan, Yi Zhang
{"title":"Improved ant colony algorithm in path planning of a single robot and multi-robots with multi-objective","authors":"Xingcheng Pu, Xi Song, Ling Tan, Yi Zhang","doi":"10.1007/s12065-023-00821-7","DOIUrl":"https://doi.org/10.1007/s12065-023-00821-7","url":null,"abstract":"","PeriodicalId":46237,"journal":{"name":"Evolutionary Intelligence","volume":"1 1","pages":"1-14"},"PeriodicalIF":2.6,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45557001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-17DOI: 10.1007/s12065-023-00820-8
M. Muni, Pragyan Kumar Pradhan, P. R. Dhal, Saroj Kumar, Rabinarayan Sethi, S. K. Patra
{"title":"Improving navigational parameters and control of autonomous robot using hybrid SOMA–PSO technique","authors":"M. Muni, Pragyan Kumar Pradhan, P. R. Dhal, Saroj Kumar, Rabinarayan Sethi, S. K. Patra","doi":"10.1007/s12065-023-00820-8","DOIUrl":"https://doi.org/10.1007/s12065-023-00820-8","url":null,"abstract":"","PeriodicalId":46237,"journal":{"name":"Evolutionary Intelligence","volume":"1 1","pages":"1-17"},"PeriodicalIF":2.6,"publicationDate":"2023-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46684327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-13DOI: 10.1007/s12065-023-00817-3
Saideep Gona, C. Harish
{"title":"Intelligent mobility planning for a cost-effective object follower mobile robotic system with obstacle avoidance using robot vision and deep learning","authors":"Saideep Gona, C. Harish","doi":"10.1007/s12065-023-00817-3","DOIUrl":"https://doi.org/10.1007/s12065-023-00817-3","url":null,"abstract":"","PeriodicalId":46237,"journal":{"name":"Evolutionary Intelligence","volume":"1 1","pages":"1-15"},"PeriodicalIF":2.6,"publicationDate":"2023-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47335617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-12DOI: 10.1007/s12065-023-00858-8
Tibet Duman, E. Duman
{"title":"Solving a new application of asymmetric TSP by modified migrating birds optimization algorithm","authors":"Tibet Duman, E. Duman","doi":"10.1007/s12065-023-00858-8","DOIUrl":"https://doi.org/10.1007/s12065-023-00858-8","url":null,"abstract":"","PeriodicalId":46237,"journal":{"name":"Evolutionary Intelligence","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2023-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45451416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-07DOI: 10.1007/s12065-022-00811-1
Yong Zhang
{"title":"Track and field training state analysis based on acceleration sensor and deep learning","authors":"Yong Zhang","doi":"10.1007/s12065-022-00811-1","DOIUrl":"https://doi.org/10.1007/s12065-022-00811-1","url":null,"abstract":"","PeriodicalId":46237,"journal":{"name":"Evolutionary Intelligence","volume":"1 1","pages":"1-10"},"PeriodicalIF":2.6,"publicationDate":"2023-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49659928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01Epub Date: 2022-06-14DOI: 10.1007/s12065-021-00683-x
Priyanka, Amit Kumar Singh
Recently, medical image encryption has attracted many researchers because of security issues in the communication process. The recent COVID-19 has highlighted the fact that medical images are consistently created and disseminated online, leading to a need for protection from unauthorised utilisation. This paper intends to review the various medical image encryption approaches along with their merits and limitations. It includes a survey, a brief introduction, and the most utilised interesting applications of image encryption. Then, the contributions of reviewed approaches are summarised and compared regarding different technical perspectives. Lastly, we highlight the recent challenges along with several directions of potential research that could fill the gaps in these domains for researchers and developers.
{"title":"A survey of image encryption for healthcare applications.","authors":"Priyanka, Amit Kumar Singh","doi":"10.1007/s12065-021-00683-x","DOIUrl":"10.1007/s12065-021-00683-x","url":null,"abstract":"<p><p>Recently, medical image encryption has attracted many researchers because of security issues in the communication process. The recent COVID-19 has highlighted the fact that medical images are consistently created and disseminated online, leading to a need for protection from unauthorised utilisation. This paper intends to review the various medical image encryption approaches along with their merits and limitations. It includes a survey, a brief introduction, and the most utilised interesting applications of image encryption. Then, the contributions of reviewed approaches are summarised and compared regarding different technical perspectives. Lastly, we highlight the recent challenges along with several directions of potential research that could fill the gaps in these domains for researchers and developers.</p>","PeriodicalId":46237,"journal":{"name":"Evolutionary Intelligence","volume":"16 3","pages":"801-818"},"PeriodicalIF":2.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9192930/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10660009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}