News

We take different parameters in the MPFA algorithm and get the results shown in Table 2.. In Table 2, we find a satisfactory solution when taking different. 4. Conclusion. In this paper, we define a ...
In this paper, we propose a new attack called function-oriented programming(FOP) to construct malicious program behavior. FOP takes advantage of the existing function of the C program to induce attack ...
The solution of high dimensional function has always been a hot topic. In this paper, a novel algorithm based on Kernel Fuzzy C-means and dolphin swarm algorithm are proposed to solve high-dimensional ...
The Ackley function is widely used for testing optimization algorithms. In its two-dimensional form, as shown in the plot above, it is characterized by a nearly flat outer region, and a large hole at ...