Firefly Algorithm for Adaptive Emergency Evacuation Center Management
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 7
Abstract
Flood disaster is among the most devastating natural disasters in the world, claiming more lives and causing property damage. The pattern of floods across all continents has been changing, becoming more frequent, intense and unpredictable for local communities. Due to unforeseen scenarios, some evacuation centers that host the flood victims may also be drowned. Hence, prime decision making is required to relocate the victims and resources to a safer center. This study proposes a Firefly Algorithm (FA) to be employed in an emergency evacuation center management. Experimental analysis of a minimization problem was performed to compare the solutions produced by FA and the ones generated using Tabu Search. Results show that the proposed FA produced solutions with smaller utility value, hence indicating that it is better than the benchmark method.
Authors and Affiliations
Yuhanis Yusof, Nor Hashim, Noraziah ChePa, Azham Hussain
A Novel Image Encryption Approach for Cloud Computing Applications
In this paper, a novel image encryption approach is proposed in the context of cloud computing applications. A fast special transform based on non-equispaced grid technique is introduced and applied as the first time in...
Modeling and Forecasting the Number of Pilgrims Coming from Outside the Kingdom of Saudi Arabia Using Bayesian and Box-Jenkins Approaches
Pilgrimage has received a great attention by the government of Saudi Arabia. Of special interest is the yearly series of the Number of Pilgrims coming from Outside the kingdom (NPO) since it is one of the most important...
Role of Explicit Knowledge Management and Reuse in Higher Educational Environment
Role of knowledge management and knowledge reuse has been investigated analytically in higher educational environment using Nonaka & Takeuchi and Harsh models. It has been observed that in three dimensional environment k...
Image Encryption Technique based on the Entropy Value of a Random Block
The use of digital images in most fields of information technology systems makes these images usually contain confidential information. When these images transmitted via the Internet especially in the Cloud, it becomes n...
Method for Psychological Status Estimation by Gaze Location Monitoring Using Eye-Based Human- Computer Interaction
Method for psychological status estimation by gaze location monitoring using Eye-Based Human-Computer Interaction: EBHCI is proposed. Through the experiment with English book reading of e-learning content, relation betwe...