This book provides comprehensive details of all Swarm Intelligence based Techniques available till date in a comprehensive manner along with their mathematical proofs. It will act as a foundation for authors, researchers and industry professionals. This monograph will present the latest state of the art research being done on varied Intelligent Technologies like sensor networks, machine learning, optical fiber communications, digital signal processing, image processing and many more.
Les mer
This book provides comprehensive details of all Swarm Intelligence based Techniques available till date in a comprehensive manner along with their mathematical proofs. It will act as foundation for authors, researchers and industry professionals.
Les mer
ContentsList of Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiiiPreface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xv1. Evolutionary Computation: Theory and Algorithms . . . . . . . . . . . . . . . .1Anand Nayyar, Surbhi Garg, Deepak Gupta and Ashish Khanna1.1 History of Evolutionary Computation . . . . . . . . . . . . . . . . . . . . . .21.2 Motivation via Biological Evidence . . . . . . . . . . . . . . . . . . . . . . . . .31.3 Why Evolutionary Computing?. . . . . . . . . . . . . . . . . . . . . . . . . . . .51.4 Concept of Evolutionary Algorithms . . . . . . . . . . . . . . . . . . . . . . .61.5 Components of Evolutionary Algorithms . . . . . . . . . . . . . . . . . . .91.6 Working of Evolutionary Algorithms . . . . . . . . . . . . . . . . . . . . . .131.7 Evolutionary Computation Techniques and Paradigms. . . . . . . 151.8 Applications of Evolutionary Computing . . . . . . . . . . . . . . . . . .211.9 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232. Genetic Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26Sandeep Kumar, Sanjay Jain and Harish Sharma2.1 Overview of Genetic Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . .262.2 Genetic Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .312.3 Derivation of Simple Genetic Algorithm . . . . . . . . . . . . . . . . . . .382.4 Genetic Algorithms vs. Other Optimization Techniques . . . . . . 422.5 Pros and Cons of Genetic Algorithms. . . . . . . . . . . . . . . . . . . . . .442.6 Hybrid Genetic Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .442.7 Possible Applications of Computer Science via GeneticAlgorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .452.8 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .46References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473. Introduction to Swarm Intelligence. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52Anand Nayyar and Gia Nhu Nguyen3.1 Biological Foundations of Swarm Intelligence . . . . . . . . . . . . . . .523.2 Metaheuristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .553.3 Concept of Swarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .613.4 Collective Intelligence of Natural Animals. . . . . . . . . . . . . . . . . .623.5 Concept of Self-Organization in Social Insects. . . . . . . . . . . . . . .673.6 Adaptability and Diversity in Swarm Intelligence . . . . . . . . . . .683.7 Issues Concerning Swarm Intelligence . . . . . . . . . . . . . . . . . . . . .703.8 Future Swarm Intelligence in Robotics – Swarm Robotics . . . . . 713.9 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 744. Ant Colony Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77Bandana Mahapatra and Srikanta Pattnaik4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .784.2 Concept of Artificial Ants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .794.3 Foraging Behavior of Ants and Estimating Effective Paths . . . . 814.4 ACO Metaheuristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .854.5 ACO Applied Toward Travelling Salesperson Problem. . . . . . . 894.6 ACO Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .914.7 The Ant Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .934.8 Comparison of Ant Colony Optimization Algorithms . . . . . . . .954.9 ACO for NP Hard Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . .1004.10 Current Trends in ACO. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1034.11 Application of ACO in Different Fields . . . . . . . . . . . . . . . . . . .1044.12 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .107References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1075. Particle Swarm Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .112M. B. Shanthi, D. Komagal Meenakshi and PremKumar5.1 Particle Swarm Optimization – Basic Concepts . . . . . . . . . . . . .1135.2 PSO Variants. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1155.3 Particle Swarm Optimization (PSO) – Advanced Concepts . . . 1315.4 Applications of PSO in Various Engineering Domains. . . . . . .1365.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .138References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1386. Artificial Bee Colony, Firefly Swarm Optimization, and BatAlgorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .141Sandeep Kumar and Rajani Kumari6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1426.2 The Artificial Bee Colony Algorithm. . . . . . . . . . . . . . . . . . . . . .1436.3 The Firefly Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1596.4 The Bat Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1666.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .173References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1737. Cuckoo Search Algorithm, Glowworm Algorithm,WASP, and Fish Swarm Optimization . . . . . . . . . . . . . . . . . . . . . . . . . .179Akshi Kumar7.1 Introduction to Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . .1807.2 Cuckoo Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1827.3 Glowworm Algorithm. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1967.4 Wasp Swarm Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2047.5 Fish Swarm Optimization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2097.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .217References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2178. Misc. Swarm Intelligence Techniques . . . . . . . . . . . . . . . . . . . . . . . . . .221M. Balamurugan, S. Narendiran and Sarat Kumar Sahoo8.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2228.2 Termite Hill Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2238.3 Cockroach Swarm Optimization . . . . . . . . . . . . . . . . . . . . . . . . .2268.4 Bumblebee Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2288.5 Social Spider Optimization Algorithm . . . . . . . . . . . . . . . . . . . .2308.6 Cat Swarm Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2338.7 Monkey Search Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2358.8 Intelligent Water Drop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2378.9 Dolphin Echolocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2388.10 Biogeography-Based Optimization . . . . . . . . . . . . . . . . . . . . . . .2408.11 Paddy Field Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2438.12 Weightless Swarm Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . .2448.13 Eagle Strategy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2458.14 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .246References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2479. Swarm Intelligence Techniques for Optimizing Problems. . . . . . . . .249K. Vikram and Sarat Kumar Sahoo9.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2499.2 Swarm Intelligence for Communication Networks. . . . . . . . . .2509.3 Swarm Intelligence in Robotics . . . . . . . . . . . . . . . . . . . . . . . . . .2539.4 Swarm Intelligence in Data Mining. . . . . . . . . . . . . . . . . . . . . . .2579.5 Swarm Intelligence and Big Data. . . . . . . . . . . . . . . . . . . . . . . . .2609.6 Swarm Intelligence in Artificial Intelligence (AI) . . . . . . . . . . .2649.7 Swarm Intelligence and the Internet of Things (IoT). . . . . . . . .2669.8 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .269References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .274
Les mer

Produktdetaljer

ISBN
9781138482517
Publisert
2018-09-18
Utgiver
Vendor
CRC Press
Vekt
566 gr
Høyde
234 mm
Bredde
156 mm
Aldersnivå
U, G, 05, 01
Språk
Product language
Engelsk
Format
Product format
Innbundet
Antall sider
312

Biographical note

Anand Nayyar received a PhD degree in Computer Science from Desh Bhagat University, Mandi Gobindgarh. Currently, he is Faculty, Researcher and Scientist in Graduate School at Duy Tan University, Vietnam. He has a total academic teaching experience of 12 years with more than 250 publications in reputed international conferences, journals and book chapters (Indexed By: SCI, SCIE, Scopus, ACM, DBLP). He is a Certified Professional with more than 75 certifications from various IT companies like: CISCO, Microsoft, Oracle, Cyberoam, GAQM, Beingcert.com, ISQTB, EXIN, Google and many more.           His areas of interest include: Wireless Sensor Networks, MANETS, Cloud Computing, Network Security, Swarm Intelligence, Machine Learning, Network Simulation, Ethical Hacking, Forensics, Internet of Things (IoT), Big Data, Linux and Open Source and Next Generation Wireless Communications. He is a Programme Committee Member/Technical Committee Member/Reviewer for more than 300 International Conferences to date. He has published 18 books in Computer Science by GRIN, Scholar Press, VSRD Publishing. He has been awarded 20 Awards for Teaching and Research including: Young Scientist, Best Scientist, Exemplary Educationist, Young Researcher and Outstanding Reviewer Award. Dac-Nhuong Le is PhD, Deputy-Head of Faculty of Information Technology, Haiphong University, Vietnam, and Vice-Director of Information Technology Apply Center at the same university. He is a research scientist at the Research and Development Center of Visualization & Simulation in (CSV), Duy Tan University, Danang, Vietnam. He has more than 45 publications in reputed international conferences, journals and online book chapter contributions (Indexed By: SCI, SCIE, SSCI, Scopus, ACM, DBLP). His areas of research include: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, image processing in biomedical. His core work is in network security, wireless, soft computing, mobile computing and biomedical. Recently, he has been on the technique program committee, the technique reviews, the track chair for international conferences: FICTA 2014, CSI 2014, IC4SD 2015, ICICT 2015, INDIA 2015, IC3T 2015, INDIA 2016, FICTA 2016, IC3T 2016, ICDECT 2016, IUKM 2016, INDIA 2017, FICTA 2017, CISC 2017, ICICC 2018, ICCUT 2018 under Springer-ASIC/LNAI/CISC Series. Presently, he is serving on the editorial board of international journals and he authored six computer science books by Springer, Wiley, CRC Press, Lambert Publication, VSRD Academic Publishing and Scholar Press. Nhu Gia Nguyen received a PhD degree in Computer Science from Ha Noi University of Science at Vietnam National University, Vietnam. Currently, he is Dean of the Graduate School at Duy Tan University, Vietnam. He has a total academic teaching experience of 18 years with more than 50 publications in reputed international conferences, journals and online book chapter contributions (Indexed By: SCI, SCIE, SSCI, Scopus, ACM, DBLP). His areas of research include: Network Communication, Security and Vulnerability, Network Performance Analysis and Simulation, Cloud Computing, Image Processing in Biomedical. Recently, he has been the technique program committee, the technique reviews, the track chair for international conferences: FICTA 2014, ICICT 2015, INDIA 2015, IC3T 2015, INDIA 2016, FICTA 2016, IC3T 2016, IUKM 2016, INDIA 2017, under Springer-ASIC/LNAI Series. Presently he is Associate Editor of the International Journal of Synthetic Emotions (IJSE).