A comprehensive survey on the chicken swarm optimization algorithm and its applications: state-of-the-art and research challenges

B Chen, L Cao, C Chen, Y Chen, Y Yue - Artificial Intelligence Review, 2024 - Springer
The application of optimization theory and the algorithms that are generated from it has
increased along with science and technology's continued advancement. Numerous issues …

Fuzzy random sensitivity analysis for the overall structure reliability of reinforced concrete freezing wellbores in deep alluvium based on hidden Markov model

Y Yao, Y Zhu, Y Li, W Wang, Z Zhang - Scientific Reports, 2024 - nature.com
To address the shortcomings of traditional reliability theory in characterizing the stability of
deep underground structures, the advanced first order second moment of reliability was …

MutaSwarmClus: enhancing data clustering efficiency with mutation-enhanced swarm algorithm

S Malik, SGK Patro, C Mahanty, A Lasisi, OJ Al-sareji - Cluster Computing, 2025 - Springer
Data clustering is a fundamental technique in data mining, pivotal for various applications
such as statistical analysis and data compression. Traditional clustering algorithms often …

Interval Sensitivity Analysis and Optimization of Magneto-Rheological Damper with Energy Harvesting Characteristics

X Zhang, L He, Z Wang, Z Qin, J Niu, X Gao - Journal of Vibration …, 2024 - Springer
Purpose In order to overcome the limitation of external power supply and complex
maintenance of Magneto-Rheological (MR) damper, the MR damper with energy harvesting …

A novel approach for geometric accuracy synthesis of three degrees of freedom parallel mechanism

M Wang, M Wang, L Li, Y Li… - Proceedings of the …, 2025 - journals.sagepub.com
Hybrid robots featuring a 1T2R parallel mechanism as their primary structure play a crucial
role in on-site machining of large components. The end accuracy of these robots is a pivotal …

A Comparative Work to Highlight the Superiority of Mouth Brooding Fish (MBF) over the Various ML Techniques in Password Security Classification.

Y Shi, Y Wang - … Journal of Advanced Computer Science & …, 2024 - search.ebscohost.com
Within the domain of password security classification, the pursuit of practical and
dependable methodologies has prompted the examination of both biological and …

Examining the Various Neural Network Algorithms Considering the Superiority of Mouth Brooding Fish in Data Classification.

L Liu, Y Zhu - … Journal of Advanced Computer Science & …, 2024 - search.ebscohost.com
Data classification, a crucial practice in information management, involves categorizing data
based on its sensitivity to determine appropriate access levels and protection measures …

Comparative Study: Mouth Brooding Fish (MBF) as a Novel Approach for Android Malware Detection.

K Zhou, P Wang, B He - International Journal of Advanced …, 2024 - search.ebscohost.com
Abstract Android Malware Detection has become increasingly prevalent, with the highest
market share among all other mobile operating systems due to its open-source nature and …