Firefly Algorithm for Adaptive Emergency Evacuation Center Management
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 7
Abstract
Flood disaster is among the most devastating natural disasters in the world, claiming more lives and causing property damage. The pattern of floods across all continents has been changing, becoming more frequent, intense and unpredictable for local communities. Due to unforeseen scenarios, some evacuation centers that host the flood victims may also be drowned. Hence, prime decision making is required to relocate the victims and resources to a safer center. This study proposes a Firefly Algorithm (FA) to be employed in an emergency evacuation center management. Experimental analysis of a minimization problem was performed to compare the solutions produced by FA and the ones generated using Tabu Search. Results show that the proposed FA produced solutions with smaller utility value, hence indicating that it is better than the benchmark method.
Authors and Affiliations
Yuhanis Yusof, Nor Hashim, Noraziah ChePa, Azham Hussain
A Reversible Data Hiding Scheme for BTC-Compressed Images
This paper proposes a reversible data hiding scheme for BTC-compressed images. A block in the BTC-compressed image consists of a larger block-mean pixel and a smaller block-mean pixel. Two message bits are embedded into...
Semantic Web Improved with the Weighted IDF Feature
The development of search engines is taking at a very fast rate. A lot of algorithms have been tried and tested. But, still the people are not getting precise results. Social networking sites are developing at tremendous...
Development of a Mobile Phone Based e-Health Monitoring Application
The use of Electrocardiogram (ECG) system is important in primary diagnosis and survival analysis of the heart diseases. Growing portable mobile technologies have provided possibilities for medical monitoring for h...
Pedestrian Crossing Safety System at Traffic Lights based on Decision Tree Algorithm
Pedestrians are one of the street users who have the right to get priority on security. Highway users such as vehicle drivers sometimes violate the traffic lights that is endanger pedestrians and make pedestrians feel in...
Formal Verification of a Secure Model for Building E-Learning Systems
Internet is considered as common medium for E-learning to connect several parties with each other (instructors and students) as they are supposed to be far away from each other. Both wired and wireless networks are used...