2017
DOI: 10.1016/j.asoc.2017.06.042
|View full text |Cite
|
Sign up to set email alerts
|

Comparative study of pheromone control heuristics in ACO algorithms for solving RCPSP problems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
28
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 33 publications
(28 citation statements)
references
References 39 publications
0
28
0
Order By: Relevance
“…At that point, this diagram portrayal can be clustered into node groups in light of the topology data of the chart, where each group incorporates emphatically interconnected vertices. 21 The results recommend that the impacts of behavior spread on social networks are firmly content dependent. It works in two phases; in the underlying stage, the nodes are partitioned into gatherings, and in the later stage, endeavors are made to keep up the structure made in the first stage.…”
Section: Introductionmentioning
confidence: 90%
“…At that point, this diagram portrayal can be clustered into node groups in light of the topology data of the chart, where each group incorporates emphatically interconnected vertices. 21 The results recommend that the impacts of behavior spread on social networks are firmly content dependent. It works in two phases; in the underlying stage, the nodes are partitioned into gatherings, and in the later stage, endeavors are made to keep up the structure made in the first stage.…”
Section: Introductionmentioning
confidence: 90%
“…Fog node chain and its communications, as shown in Fig. 1 is constructed by choosing the furthest fog node from the cloud computing using equation (15) and (16), to ensure that fog nodes further from the cloud computing have close neighbours. The neighbouring distances increase progressively since fog nodes already on the chain cannot be revisited.…”
Section: Data Transmission Between Fog Nodes and Data Centrementioning
confidence: 99%
“…They deposit a chemical substance called pheromone on their path as they traverse the network. This method has been used to solve many optimization problems in WSNs [15][16][17]. among the nodes.…”
Section: Introductionmentioning
confidence: 99%
“…The priority rule-based construction heuristic is widely used in RCPSP to generate feasible initial schedules. Then, the obtained schedules are improved by various neighbourhood search methods and meta-heuristic algorithm, including tabu search [9], simulated annealing [10], scatter search [11], ant colony optimization [12], particle swarm optimization [13], and genetic algorithm [14][15][16].…”
Section: Introductionmentioning
confidence: 99%