Laith Abualigah

Laith Abualigah
Al al-Bayt University · Department of Computer Science

PhD in Computer Science. Aligah.2020@gmail.com

About

593
Publications
275,159
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
21,859
Citations
Introduction
Laith Abualigah is an Associate Professor at the Computer Science Department, Al al-Bayt University, Jordan. He received the Ph.D. degree from the School of Computer Science in Universiti Sains Malaysia (USM), Malaysia in 2018. His main research interests focus on Bio-inspired Computing, Artificial Intelligence, Metaheuristic Modeling, and Optimization Algorithms, Evolutionary Computations, Information Retrieval, Feature Selection, Combinatorial Problems, Optimization, NLP

Publications

Publications (593)
Article
Full-text available
The global health crisis of COVID-19 has ushered in an era of unprecedented data generation, encompassing the virus’s transmission patterns, societal consequences, and governmental responses. Data mining has emerged as a pivotal tool for extracting invaluable insights from this voluminous dataset, offering critical support for informed decision-mak...
Article
Full-text available
Diabetic macular edema (DME) poses a significant threat to vision. It is characterized by the enlargement of the macula due to the accumulation of plasma in the extracellular space of the retina. Detection of DME, crucial for timely intervention, traditionally relies on manual inspection of images, which is time-consuming and prone to human error....
Article
Alzheimer’s disease (AD) is a progressive and incurable neurologi-cal disorder with a rising mortality rate, worsened by error-prone, time-intensive, and expensive clinical diagnosis methods. Automatic AD detection methods using hand-crafted Electroencephalogram (EEG) signal features lack accuracy and reliability. A lightweight convolution neural n...
Article
Full-text available
The ability to interpret and create code is known as cryptography and has been used to exchange information between peer parties securely. An encryption algorithm is a type of network security model that consists of designing and putting into practice cryptographic algorithms and the supporting framework to help secure data. This cryptosystem is in...
Article
Full-text available
This paper is a thorough examination of the modeling of sleep disorders based on machine learning that is applied to the sleep-health-and-lifestyle data. The use of the Dipper Throated Optimization Algorithm for feature selection and Logistic Regression for classification is the basis of the study that explores the effectiveness of predictive model...
Article
Full-text available
In this paper, a gradient-based optimizer (GBO) algorithm is presented to optimize the parameters of a proportional integral derivative (PID) controller in DC motor control. The GBO algorithm which mathematically models and mimics is inspired by the gradient-based Newton method. It was developed to address various optimization issues. To determine...
Article
Full-text available
This paper introduces a novel metaheuristic technique, the Greater Cane Rat Algorithm (GCRA), for solving optimization problems. GCRA's optimization process is inspired by the intelligent foraging behaviours of greater cane rats during and outside the mating season. These nocturnal animals leave trails as they forage through reeds and grass, which...
Article
Full-text available
Myocardial Infarction (MI) commonly referred to as a heart attack, results from the abrupt obstruction of blood supply to a section of the heart muscle, leading to the deterioration or death of the affected tissue due to a lack of oxygen. MI, poses a significant public health concern worldwide, particularly affecting the citizens of the Chittagong...
Article
Full-text available
An innovative approach to controlling aircraft pitch is shown in this research. This approach is accomplished by adopting a proportional-integral-derivative with filter (PID-F) mechanism. A novel metaheuristic approach that we propose is called the sinh cosh optimizer (SCHO), and it is intended to further optimize the settings of the PID-F controll...
Article
Full-text available
The study presents a segmented dataset comprising dental periapical X-ray images from both healthy and diseased patients. The ability to differentiate between normal and abnormal dental periapical X-rays is pivotal for accurate diagnosis of dental pathology. These X-rays contain crucial information, offering in- sights into the physiological and pa...
Article
Full-text available
Energy consumption in buildings is gradually increasing and accounts for around forty percent of the total energy consumption. Forecasting the heating and cooling loads of a building during the initial phase of the design process in order to identify optimal solutions among various designs is of utmost importance. This is also true during the opera...
Article
Full-text available
Environmental disasters such as earthquakes, tsunamis, floods, and landslides disrupt natural resources, human casualties, and so on. Early warning and alert of such events will help for preparedness to avoid human and economic causalities. Managing a disaster or emergency scenario is a difficult endeavor. These episodes of mass devastation, whethe...
Article
Full-text available
The Marine Predators Algorithm (MPA) is among the recently proposed metaheuristic algorithms (MAs), and it got its inspiration from the ocean predators’ foraging behaviour based on Brownian and Levy motions. Good exploration, convergence accuracy, ease of implementation, easy parameter settings, fewer parameters, etc., are some of its strengths. Ne...
Article
Distributed data mining (DDM) has emerged as a useful method for analyzing data that is spread across multiple sources. Nevertheless, DDM has other challenges that restrict its effectiveness, such as autonomy, privacy, efficiency, and implementation. DDM's rigidity and lack of adaptability may render it unsuitable for numerous applications due to i...
Article
Full-text available
Decalcification is crucial in histological processing, particularly for studying mineralized tissues like bone. The choice of decalcification method can significantly impact the quality of histological sections and the preservation of tissue morphology. This study aims to establish a standardized protocol for decalcifying rat calvarial bone using a...
Article
Full-text available
In the field of multi-objective optimization algorithms (MOAs), a primary challenge is identifying an optimal solution that effectively converges to the true Pareto Front while maintaining a high level of diversity, especially in the initial phases of evolution. To tackle this challenge, this study introduces a novel algorithm named Many-Objective...
Article
Full-text available
Crayfish Optimization Algorithm (COA) is innovative and easy to implement, but the crayfish search efficiency decreases in the later stage of the algorithm, and the algorithm is easy to fall into local optimum. To solve these problems, this paper proposes an modified crayfish optimization algorithm (MCOA). Based on the survival habits of crayfish,...
Article
Full-text available
Efficient production is paramount for all types of institutions, hinging upon the attainment of predefined employee targets and their subsequent outcomes. In contemporary times, a pervasive issue plaguing institutions is declining production, primarily stemming from employee absenteeism due to various reasons, ultimately eroding profitability. In o...
Article
Full-text available
Driver drowsiness detection is a critical field of research within automotive safety, aimed at identifying signs of fatigue in drivers to prevent accidents. Drowsiness impairs a driver’s reaction time, decision-making ability, and overall alertness, significantly increasing the risk of collisions. Nowadays, the challenge is to detect drowsiness usi...
Article
Full-text available
This study addresses the challenges in accurately estimating photovoltaic (PV) parameters for solar energy applications by enhancing parameter extraction processes to improve the efficiency of PV models. An information gap in PV solar cell and module parameters provided by vendors obstructs accurate simulation. Traditional numerical techniques face...
Article
Full-text available
Wheat (Triticum aestivum) yield predictions can be improved by using multispectral remote sensing to identify different genotypes and crop growth stages. We propose an innovative machine learning technique aimed at classifying diverse wheat crop genotypes and providing accurate estimations of plant age. Multispectral reflectance data was obtained f...
Article
Full-text available
In recent times, the landscape of power systems has undergone significant evolution, particularly with the integration of diverse renewable energy sources (RESs). This advancement presents an invaluable opportunity to enhance energy efficiency in the modern power grid, primarily by bolstering the role of stochastic RESs. The challenge lies in the o...
Article
In the rapidly evolving realm of remote sensing technology, the classification of Hyperspectral Images (HSIs) is a pivotal yet formidable task. Hindered by inherent limitations in hyperspectral imaging, enhancing the accuracy and efficiency of HSI classification remains a critical and much-debated issue. This review study focuses on a key applicati...
Article
Full-text available
Privacy and security present significant challenges in wireless sensor networks (WSNs). In order to enhance security, the sensor network is equipped with high throughput. While the importance of both source node (SN) and base station (BS) location privacy and security is acknowledged, recent research has predominantly focused on location privacy. A...
Article
Full-text available
Agriculture plays a pivotal role in the economic development of a nation, but, growth of agriculture is affected badly by the many factors one such is plant diseases. Early stage prediction of these disease is crucial role for global health and even for game changers the farmer’s life. Recently, adoption of modern technologies, such as the Internet...
Article
Full-text available
Cross-Site Scripting (XSS) attacks continue to pose a significant threat to web applications, compromising the security and integrity of user data. XSS is a web application vulnerability where malicious scripts are injected into websites, allowing attackers to execute arbitrary code in the victim’s browser. The consequences of XSS attacks can be se...
Article
Full-text available
This research introduces a novel multi-objective adaptation of the Geometric Mean Optimizer (GMO), termed the Multi-Objective Geometric Mean Optimizer (MOGMO). MOGMO melds the traditional GMO with an elite non-dominated sorting approach, allowing it to pinpoint Pareto optimal solutions through offspring creation and selection. A Crowding Distance (...
Article
The use of mesenchymal stem cells (MSCs) in cartilage regeneration has gained significant attention in regenerative medicine. This paper reviews the molecular mechanisms underlying MSC-based cartilage regeneration and explores various therapeutic strategies to enhance the efficacy of MSCs in this context. MSCs exhibit multipotent capabilities and c...
Article
Full-text available
This article presents a modified method of mountain gazelle optimizer (MMGO) as a direct current (DC) motor control. Mountain gazelle optimizer (MGO) is an algorithm inspired by the life of the mountain gazelle animal in nature. This animal concept has five essential steps that are duplicated in mathematical modeling. This article uses two tests to...
Article
Full-text available
Identifying counterfeit banknotes is crucial in financial transactions, as the process of identification cannot be handled by ATMs or vending machines. The recent developments in technology, particularly the smart systems that are integrated with cameras and artificial intelligence (AI) tools, allow for the distinction of currency and the detection...
Article
Full-text available
This study proposes a new prairie dog optimization algorithm version called EPDO. This new version aims to address the issues of premature convergence and slow convergence that were observed in the original PDO algorithm. To improve performance, several modifications are introduced in EPDO. First, a dynamic opposite learning strategy is employed to...
Article
Full-text available
The efficacy of automatic voltage regulator (AVR) systems is contingent on crucial parameters like voltage regulation, response time, stability, and efficiency. Integration of controllers with AVR systems facilitates centralized monitoring and regulation, enhancing voltage output efficiency. This study employs a modified sinh cosh optimizer (m-SCHO...
Article
Full-text available
The precise control of aircraft pitch angles is critical in aviation for maintaining specific attitudes during flight, including straight and level flight, ascents, and descents. Traditional control strategies face challenges due to the non-linear and uncertain dynamics of flight. To address these issues, this study introduces a novel approach empl...
Article
Full-text available
In an era where Intelligent Decision Support Systems (IDSS) are integral to managing the vast data from Internet of Everything (IoE) systems, this study introduces IDSDeep-CCD, a novel IDSS approach for detecting concrete cracks, a critical issue in civil infrastructure maintenance. Traditional visual inspection methods for crack detection are time...
Article
Full-text available
Malware detection plays a crucial role in ensuring robust cybersecurity amidst the ever-evolving cyber threats. This research paper delves into the realm of machine learning (ML) algorithms for malware detection, with a specific emphasis on the K-Nearest Neighbors (KNN) algorithm, utilizing tailored parameter settings and the Firefly Optimization A...
Article
Full-text available
Users of computer networks may benefit from cloud computing, which is a fairly new abstraction that offers features like processing as well as the sharing and storing of data. As a result of the services it provides, cloud computing is drawing significant investments from across the world. Despite this, Cloud Computing Security continues to be one...
Article
Full-text available
This paper presents a novel hybrid optimization method to solve the resource allocation problem for multi-target multi-sensor tracking of drones. This hybrid approach, the Improved Prairie Dog Optimization Algorithm (IPDOA) with the Genetic Algorithm (GA), utilizes the strengths of both algorithms to improve the overall optimization performance. Th...
Article
This study aimed to synthesize novel compounds as more effective carbonic anhydrase II inhibitors. For this purpose, 2-(3-methoxy-4-(prop-2-yn-1-yloxy)phenyl)-4,5-diphenyl-1H-imidazole (3) was reacted with 3-methoxy-4-(prop-2-yn-1-yloxy)benzaldehyde through the glyoxal reaction to produce a series of imidazole-based 1,2,3-triazoles 5a-f. The synthe...
Article
Full-text available
The optimization of the vaccination campaign and medication distribution in rural regions of Morocco conducted by the Ministry of Health can be significantly improved by employing metaheuristic algorithms in conjunction with a tour planning system. This research proposes the utilization of six metaheuristic algorithms: genetic algorithm, rat swarm...
Article
Full-text available
Artificial Intelligence techniques, such as optimization algorithms, have become essential for success in many fields. Therefore, most researchers, especially in computer and engineering sciences, focused their efforts and abilities on adapting the optimization algorithms for solving various problems. This review introduces one of the recent nature...
Article
Computer vision has extensive applications in various sports domains, and cricket, a complex game with different event types, is no exception. Recognizing umpire signals during cricket matches is essential for fair and accurate decision-making in gameplay. This paper presents the Cricket Umpire Action Video dataset (CUAVd), a novel dataset designed...
Article
Full-text available
This research paper presents a novel optimization method called the Synergistic Swarm Optimization Algorithm (SSOA). The SSOA combines the principles of swarm intelligence and synergistic cooperation to search for optimal solutions efficiently. A synergistic cooperation mechanism is employed, where particles exchange information and learn from each...
Chapter
The objective function used in global optimization issues as often as possible features a big computing complexity, conditionality, and a nonclear scene. Such jobs are immensely useful, and a variety of methodologies have been proposed as a foundation for solving them. In this study, we will discuss the krill herd (KH), an ecologically inspired app...
Chapter
This chapter provides an introduction to the crow search algorithm (CSA) as well as a discussion to keep scholars engaged in swarm intelligence techniques and optimization problem-solving. CSA is a newly created swarm intelligence program that mimics crow behavior in the storage and retrieval of surplus food. There is a solution that can be found b...
Chapter
To solve new real-world problems, many metaheuristic optimization methods have been invented. One of these methods is called Henry gas solubility optimization (HGSO); it is a physics-based algorithm which simulates the manners managed by Henry’s law to resolve contesting optimization issues. This survey shows the procedure of Henry’s law and the re...
Article
Full-text available
This study presents the K-means clustering-based grey wolf optimizer, a new algorithm intended to improve the optimization capabilities of the conventional grey wolf optimizer in order to address the problem of data clustering. The process that groups similar items within a dataset into non-overlapping groups. Grey wolf hunting behaviour served as...
Article
Full-text available
Internet-of-Things technology is being increasingly important in our daily lives. As IoT technology evolved, IoT devices face a data protection hazard, particularly smart home IoT gateway devices, which became evident. The demand for a low-cost, secure smart home gateway device or router among smart home users. The problem is that as the internet o...
Article
Full-text available
This study aimed to assess and manage bacterial contamination in multiple batches of mesenchymal stem cell (MSC) cultures derived from rabbit bone marrow. Routine visual inspection and microscopic examination were employed for the detection of the contaminated cultures. The contaminated cultures were cultured on Nutrient agar and multiple isolated...
Article
Full-text available
Gait recognition stands as a pivotal biometric technology in individual identification, yet its real-world implementation faces challenges stemming from intra-subject disparities. The task of extracting consistent features to distinguish among various subjects becomes onerous due to factors such as image noise and magnitude divergence, significantl...
Article
Full-text available
Deep Convolutional Neural Networks (DCNNs) have shown remarkable success in image classification tasks, but optimizing their hyperparameters can be challenging due to their complex structure. This paper develops the Adaptive Habitat Biogeography-Based Optimizer (AHBBO) for tuning the hyperparameters of DCNNs in image classification tasks. In compli...
Article
Sonar sound datasets are of significant importance in the domains of underwater surveillance and marine research as they enable experts to discern intricate patterns within the depths of the water. Nevertheless, the task of classifying sonar sound datasets continues to pose significant challenges. In this study, we present a novel approach aimed at...
Article
Full-text available
Deep learning and metaheuristic algorithms have recently increased in various sciences, including financial accounting information systems (FAISs). However, the existence of large datasets has dramatically increased the complexity of these hybrid networks, so to address this shortcoming, this paper aims to develop a quantum‐behaved chimp optimizati...
Article
Full-text available
Digital image processing has witnessed a significant transformation, owing to the adoption of deep learning (DL) algorithms, which have proven to be vastly superior to conventional methods for crop detection. These DL algorithms have recently found successful applications across various domains, translating input data, such as images of afflicted p...
Article
Full-text available
The increase in road accidents underscores the urgent need for effective methodologies to evaluate and prioritize road safety improvements. Traditional decision-making processes in road safety management often confront challenges due to the lack of a comprehensive approach, particularly in handling multiple evaluation criteria. This study introduce...
Chapter
Modern power distribution networks are incredibly complex due to the growing incorporation of distributed generators in the past few years. The coordination of Directional Overcurrent Relays (DORs) in interconnected systems with many relays is significantly hindered by this complexity. In a nonlinear and constrained optimization problem, optimal DO...
Article
Full-text available
The traditional threshold methods used for image segmentation are effective for bi-level thresholds. In the case of complex images that contain many objects or color images, the computational complexity is significantly elevated. Multi-level threshold methods for the segmentation of color images can be seen as a complicated optimization problem. In...
Article
Full-text available
This study delves into the exploration of a novel Multi-objective Snow Ablation Optimizer (MOSAO) algorithm, tailored for addressing expansive Optimal Power Flow (OPF) challenges inherent in intricate power systems. These systems are often complemented with the integration of renewable energy modalities and the state-of-the-art Flexible AC Transmis...
Article
Full-text available
Multi-objective truss optimization has garnered relatively less research attention compared to single-objective scenarios. This paper presents a prescriptive and predictive analysis of nine recent multi-objective algorithms based on the Non-dominated Sorting Genetic Algorithm-2 (NSGA-2) framework. The algorithms under consideration are NSGA-2, Dyna...
Article
Full-text available
In the world of technology, the electronic and technical development of the fields of communication and the internet has increased, which has caused a renaissance in the virtual world. This development has greatly impacted virtual communities for the ease and speed of communication and information transfer through social media platforms, making the...
Preprint
Full-text available
Images from chest X-rays (CXR) are thought to help observe and research various kinds of pulmonary illnesses. Several works were suggested in the literature for recognizing unique lung diseases, and only a few studies were focused on developing a model to identify joint classes of lung diseases. A patient with a negative diagnosis for one condition...
Preprint
Full-text available
In this paper, the method of flight and movement of Martial Eagle (Polemaetus Bellicosus) for hunting prey is used to design and Meta-Heuristic (MH) algorithm called Martial Eagle Optimizer (MEO). Martial Eagle is a large hunting bird of the falcon category, which lives in southern Africa. Its prey is very diverse and varies according to its habita...
Article
Full-text available
Efficient speed controllers for dynamic driving tasks in autonomous vehicles are crucial for ensuring safety and reliability. This study proposes a novel approach for designing a fractional order proportional-integral-derivative (FOPID) controller that utilizes a modified elite opposition-based artificial hummingbird algorithm (m-AHA) for optimal p...
Article
Full-text available
The stability of voltage in a power system is a critical factor that impacts the system’s performance. Automatic voltage regulator system plays a vital role in maintaining stable voltage levels, ensuring efficient and reliable electricity delivery. However, this system may face challenges, such as oscillating transient response, steady-state errors...
Article
Full-text available
In this study, we tackle the challenge of optimizing the design of a Brushless Direct Current (BLDC) motor. Utilizing an established analytical model, we introduced the Multi-Objective Generalized Normal Distribution Optimization (MOGNDO) method, a biomimetic approach based on Pareto optimality, dominance, and external archiving. We initially teste...
Article
Full-text available
This study delves into the application of hybrid extreme machine-based techniques for solar radiation prediction in Adrar, Algeria. The models under evaluation include the Extreme Learning Machine (ELM), Weighted Extreme Learning Machine (WELM), and Self-Adaptive Extreme Learning Machine (SA-ELM), with a comparative analysis based on various perfor...
Article
Full-text available
Sentiment analysis, a branch of natural language processing (NLP), has gained significant attention for its applications in various domains. This study focuses on utilizing machine learning and deep learning algorithms for sentiment analysis in the context of analyzing Monkeypox using Arabic sentiment text. The objective is to develop an accurate a...
Article
Full-text available
This paper introduces a module which is used to transport goods or people from one place to another without any driver assistant. It is mainly used in big industries to save the time and energy. This module is built around an RFID sensor. RFID technology uses fields of electromagnetic waves to track and monitor tags attached to objects. When trigge...
Article
Full-text available
Big data is a massive amount of information, measurements, and observations, where it has the power to provide a solution to the impossibilities. Recently, it has become the most trending topic in the field of data analysis because of its amazing potentials in extracting the hidden facts. Which attracted various sectors all over the world to collec...
Article
Full-text available
Deaf-and-dumb humans make up about 5% of the world's population, and they need special care by providing them alternative methods that help them to communicate with the outside world, whereas the sense of hearing is the main element of human communications, which is indispensable. From the standpoint of introducing helpful applications that help de...
Article
Full-text available
The exponential distribution optimizer (EDO) represents a heuristic approach, capitalizing on exponential distribution theory to identify global solutions for complex optimization challenges. This study extends the EDO's applicability by introducing its multi-objective version, the multi-objective EDO (MOEDO), enhanced with elite non-dominated sort...
Article
Full-text available
Optimization techniques, particularly meta-heuristic algorithms, are highly effective in optimizing and enhancing efficiency across diverse models and systems, renowned for their ability to attain optimal or near-optimal solutions within a reasonable timeframe. In this work, the Puma Optimizer (PO) is proposed as a new optimization algorithm inspir...
Article
Full-text available
Healthcare and technology have a long history of interaction but eHealth adoption has been delayed due to a lack of infrastructure, capacity, and political will. It is called a health information technology system (HITS) or smart health system (SHS) when healthcare adopts health technology. Customers should expect improved service in terms of effic...
Article
Full-text available
Nowadays, the speed of solving optimization problems by increasing various issues and the number of variables is critical. The Harris Hawk optimization method is a brand-new, intelligent system that resolves optimization issues by mathematically simulating the natural behavior of hawks. In this study, the Harris Hawks optimization method and the La...
Article
Full-text available
Plant image analysis is a significant tool for plant phenotyping. Image analysis has been used to assess plant trails, forecast plant growth, and offer geographical information about images. The area segmentation and counting of the leaf is a major component of plant phenotyping, which can be used to measure the growth of the plant. Therefore, this...
Article
In this study, an improved version of Aquila Optimizer (AO) known as EHAOMPA has been developed by using the Marine Predators Algorithm (MPA). MPA is a recent and well-behaved optimizer with a unique memory saving and FADs mechanism. At the same time, it suffers from various defects such as inadequate global search, sluggish convergence, and stagna...
Article
Full-text available
In the realm of ChatGPT's language capabilities, exploring Arabic Sentiment Analysis emerges as a crucial research focus. This study centers on ChatGPT, a popular machine learning model engaging in dialogues with users, garnering attention for its exceptional performance and widespread impact, particularly in the Arab world. The objective is to ass...
Article
Full-text available
This paper aims to address the detection of COVID-19 by developing an accurate and efficient diagnostic system using chest X-ray images. The research utilizes open-source Kaggle data comprising four categories: COVID-19, Lung-Opacity, Normal, and Viral Pneumonia. The proposed system employs convolutional neural networks (CNNs), including VGG19, RNN...
Article
Full-text available
Wound healing and skin regeneration involve intricate interactions between various cellular, molecular, and biochemical factors. This narrative review aims to provide an in-depth analysis of the present status of therapeutic strategies for wound healing and skin regeneration. The literature review was performed using the Google Scholar search engin...
Article
Full-text available
p>Call centers handle thousands of incoming calls daily, encompassing a diverse array of categories including product inquiries, complaints, and more. Within these conversations, customers articulate their opinions and interests in the products and services offered. Effectively categorizing and analyzing these calls holds immense importance for org...
Article
Full-text available
p>In large-scale data applications, handling unbalanced data is a major issue. In order to gather the uneven data at the fastest pace feasible, the imbalanced data categorization system was created. Numerous neural methods have been developed to accurately categorize unbalanced data. However, because of the intricacy of the data, the classification...
Article
Full-text available
The most widely used method for detecting Coronavirus Disease 2019 (COVID-19) is real-time polymerase chain reaction. However, this method has several drawbacks, including high cost, lengthy turnaround time for results, and the potential for false-negative results due to limited sensitivity. To address these issues, additional technologies such as...
Article
Full-text available
With the ever-expanding ubiquity of the Internet, wireless networks have permeated every facet of modern life, escalating concerns surrounding network security for users. Consequently, the demand for a robust Intrusion Detection System (IDS) has surged. The IDS serves as a critical bastion within the security framework, a significance further magni...
Article
Full-text available
The Henry Gas Solubility Optimization (HGSO) is a physics-based metaheuristic inspired by Henry’s law, which describes the solubility of the gas in a liquid under specific pressure conditions. Since its introduction by Hashim et al. in 2019, HGSO has gained significant attention for its unique features, including minimal adaptive parameters and a b...

Questions

Questions (6)
Question
Can we cooperate ?
Question
Please, I need the time complexity analysis for the attached pseudo-code?
Note, this pseudo-code is used for dimension reduction
#Complexity
#Algorithms

Network

Cited By