2020
DOI: 10.1007/s00530-020-00716-y
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid firefly and particle swarm optimization algorithm applied to multilevel image thresholding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(8 citation statements)
references
References 35 publications
0
7
0
Order By: Relevance
“…PSO 15 is a popular swarm-intelligence based meta-heuristic algorithm that has been leveraged on a wide range of problems pertaining to the optimization paradigm, including continuous optimization 51 , task scheduling 52 , data clustering 53 , image thresholding 54 and segmentation 55 . Binary variants of PSO 56 , 57 have also been introduced and used for FS tasks 58 .…”
Section: Related Workmentioning
confidence: 99%
“…PSO 15 is a popular swarm-intelligence based meta-heuristic algorithm that has been leveraged on a wide range of problems pertaining to the optimization paradigm, including continuous optimization 51 , task scheduling 52 , data clustering 53 , image thresholding 54 and segmentation 55 . Binary variants of PSO 56 , 57 have also been introduced and used for FS tasks 58 .…”
Section: Related Workmentioning
confidence: 99%
“…( 2011 ) used Particle Swarm Optimization Algorithm for image clustering using two distinct fitness functions and showed that PSO works better than conventional K-means method because of its ability to generate more compact clusters. A hybrid Firefly and Particle Swarm Optimization Algorithm was used in the similiar purpose in the works of Rahkar Farshi and Ardabili ( 2021 ) which resulted in comparatively superior performance than 4 other metaheuristic algorithms that they compared with. In Rahkar Farshi et al.…”
Section: Related Workmentioning
confidence: 99%
“…At the combination level of artificial neural network and intrusion detection technology, relevant European researchers tend to use artificial intelligence technology combined with encryption technology to monitor and analyze intrusion objects. The main technology includes random key management algorithm, which mainly adopts the random allocation of secret materials [ 16 , 17 ]; corresponding researchers proposed hybrid encryption algorithm based on the above random key allocation algorithm, which is mainly based on elliptic curve cryptography algorithm and advanced encryption standard algorithm for hybrid processing, so as to improve the performance of intrusion detection system [ 18 , 19 ]; relevant researchers combined with artificial intelligence algorithm proposed the intrusion detection technology of trust-based adaptive confirmation, which uses the trust algorithm of Kalman filter [ 20 ]; relevant American researchers propose refining the data model by constantly searching the corresponding relationship between data and reduce the corresponding redundant knowledge, so as to further reduce the information overload and improve the decision-making ability of the corresponding information model [ 21 , 22 ]. In the corresponding privacy protection strategy of wireless sensor networks, its main algorithms include data privacy protection scheme based on data disturbance, data privacy protection scheme based on secure multi-party technology, privacy data protection scheme based on polynomial regression, and encryption technology based on the same data state [ 23 , 24 ].…”
Section: Related Research: Research Status Of Privacy Protection and ...mentioning
confidence: 99%