Mathematical Problems in Engineering

Mathematical Problems in Engineering / 2015 / Article
Special Issue

Nature-Inspired Algorithms and Applications: Selected Papers from CIS2013

View this Special Issue

Editorial | Open Access

Volume 2015 |Article ID 641780 |

Yuping Wang, Yiu-ming Cheung, Xiao-Zhi Gao, Patrick Wang, Hailin Liu, "Nature-Inspired Algorithms and Applications: Selected Papers from CIS2013", Mathematical Problems in Engineering, vol. 2015, Article ID 641780, 2 pages, 2015.

Nature-Inspired Algorithms and Applications: Selected Papers from CIS2013

Received26 Mar 2015
Accepted26 Mar 2015
Published22 Apr 2015

With the fast development of computer science and technology, the computational intelligence (CI) methods have been successfully applied to deal with security and trusted problems during the past decades. It has been a necessary and emerging task to cross-fertilize and integrate the ideas and techniques of these two important fields: CI and information security (IS). This special issue selects 11 high-quality extended papers from a total of 171 accepted papers of the 2013 International Conference on Computational Intelligence and Security (CIS2013). These papers can be classified into two groups. The first group contains seven papers developing new CI models with applications in solving real-world problems, and the second group has four papers focusing on the theoretical study of novel CI algorithms.

In the first group, the paper entitled “Emergency Vehicle Scheduling Problem with Time Utility in Disasters” by X. Gan et al. proposes a fuzzy optimization model for the flexible emergency rescue system and uses the particle swarm optimization (PSO) method to handle this model. The paper entitled “Effective Task Scheduling and IP Mapping Algorithm for Heterogeneous NoC-Based MPSoC” by P. Yang and Q. Wang develops a new task scheduling scheme for the NoC- (network-on-chip-) based MPSoC (multiprocessor system-on-chip) design process and uses the PSO to acquire the minimum task execution time with the least task running and transfer cost. The paper entitled “Optimal Vaccine Distribution Strategy for Different Age Groups of Population: A Differential Evolution Algorithm Approach” by X.-M. Hu et al. applies the evolutionary algorithms to find the optimal strategy for the vaccine distribution of different age groups of population. This approach can minimize the number of the infectious individuals during the epidemic outbreak. In one of the papers, W. Wang et al. present an optimization model using a convex risk measure for the portfolio selection problems and design a genetic algorithm on the basis of this effective model. X. Deng and J. Deng establish a machine learning approach for the prisoners’ dilemma problem in the game theory and provide an effective method for the incomplete information game problems in their paper. C. Ruan and J. Yang investigate a fuzzy software quality evaluation method via the index system models and fuzzy methods that are applicable to those cases, in which the experts have inconsistent and uncertain judgments for software quality. J. Qu et al. present a new cascade pedestrian detection technique using the orthogonal scene motion pattern model in a general density video and a specifically designed feature classifier. The static classification and surveillance video experiments demonstrate the effectiveness of their method.

In the second group, D. Jiang and Z. Fan suggest a new idea to design algorithms: automatically designing evolutionary algorithms by computers according to the problem requirements. H. Li and L. Fang propose an efficient evolutionary algorithm for handling interval linear bilevel programming problems. H. Li and L. Zhang investigate a differential evolution method for the constrained bilevel programming problems by using the hybrid mutations and an improved constraint handling technique, which has been validated in the simulations of some linear and nonlinear bilevel programming problems. R. Wang et al. propose an improved adaptive growing and pruning algorithm (IAGP) for neural networks, and simulation results show that it can quickly and accurately predict the traffic capacity.

By publishing the above interesting papers in this special issue, we wish to provide our readers with some inspiring ideas for developing new CI models with applications in attacking practical problems.

Yuping Wang
Yiu-ming Cheung
Xiao-Zhi Gao
Patrick Wang
Hailin Liu

Copyright © 2015 Yuping Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

More related articles

859 Views | 407 Downloads | 0 Citations
 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder

Related articles

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.