A Cloud Privacy-Preserving Model Using Gaussian Mutation-Based Bacterial Foraging Optimization and Genetic Crossover Operation Article Swipe
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.21203/rs.3.rs-354988/v1
The necessity of security in the cloud system increases day by day in which the data controllers harvest the rising personal and sensitive data volume.The cloud has some unprotected private data as well as data that has been outsourced for public access, which is crucial for cloud security statements. An advanced legal data protection constraint is required due to the resultant of repeated data violations. While dealing with sensitive data, most of the existing techniques failed to handle optimal privacy and different studies were performed to take on cloud privacy preservation. Hence, the novel model of privacy preservation in the cloud and artificial intelligence (AI) techniques were used to tackle these challenges. These AI methods are insight-driven, strategic, and more efficient organizations in cloud computing. However, the cost savings, agility, higher flexibility businesses are offered with cloud computing by data hosting. Data cleansing and restoration are the two major steps involved in the proposed privacy replica. In this study, we proposed Chaotic chemotaxis and Gaussian mutation-based Bacterial Foraging Optimization with genetic crossover operation (CGBFO- GC) algorithm for optimal key generation. Deriving the multi-objective function parameters namely data preservation ratio, hiding ratio, and modification degree that accomplishes optimal key generation using CGBFO- GC algorithm. Ultimately, the proposed CGBFO- GC algorithm provides more efficient performance results in terms of cloud security than an existing method such as SAS-DPSO, CDNNCS, J-SSO, and GC.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- https://doi.org/10.21203/rs.3.rs-354988/v1
- https://www.researchsquare.com/article/rs-354988/latest.pdf
- OA Status
- green
- References
- 14
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W3159951989
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3159951989Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.21203/rs.3.rs-354988/v1Digital Object Identifier
- Title
-
A Cloud Privacy-Preserving Model Using Gaussian Mutation-Based Bacterial Foraging Optimization and Genetic Crossover OperationWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2021Year of publication
- Publication date
-
2021-04-16Full publication date if available
- Authors
-
Kartik Anand, A. Vijayaraj, M. AnandList of authors in order
- Landing page
-
https://doi.org/10.21203/rs.3.rs-354988/v1Publisher landing page
- PDF URL
-
https://www.researchsquare.com/article/rs-354988/latest.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://www.researchsquare.com/article/rs-354988/latest.pdfDirect OA link when available
- Concepts
-
Cloud computing, Computer science, Crossover, Key (lock), Flexibility (engineering), Information privacy, Genetic algorithm, Distributed computing, Outsourcing, Computer security, Artificial intelligence, Machine learning, Mathematics, Political science, Statistics, Operating system, LawTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
14Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3159951989 |
|---|---|
| doi | https://doi.org/10.21203/rs.3.rs-354988/v1 |
| ids.doi | https://doi.org/10.21203/rs.3.rs-354988/v1 |
| ids.mag | 3159951989 |
| ids.openalex | https://openalex.org/W3159951989 |
| fwci | 0.0 |
| type | preprint |
| title | A Cloud Privacy-Preserving Model Using Gaussian Mutation-Based Bacterial Foraging Optimization and Genetic Crossover Operation |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11614 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9968000054359436 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Cloud Data Security Solutions |
| topics[1].id | https://openalex.org/T10764 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9941999912261963 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Privacy-Preserving Technologies in Data |
| topics[2].id | https://openalex.org/T10273 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9876999855041504 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | IoT and Edge/Fog Computing |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C79974875 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8742926716804504 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[0].display_name | Cloud computing |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.7151851058006287 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C122507166 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6125656366348267 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q628906 |
| concepts[2].display_name | Crossover |
| concepts[3].id | https://openalex.org/C26517878 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5422635078430176 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q228039 |
| concepts[3].display_name | Key (lock) |
| concepts[4].id | https://openalex.org/C2780598303 |
| concepts[4].level | 2 |
| concepts[4].score | 0.4671670198440552 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q65921492 |
| concepts[4].display_name | Flexibility (engineering) |
| concepts[5].id | https://openalex.org/C123201435 |
| concepts[5].level | 2 |
| concepts[5].score | 0.45964646339416504 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q456632 |
| concepts[5].display_name | Information privacy |
| concepts[6].id | https://openalex.org/C8880873 |
| concepts[6].level | 2 |
| concepts[6].score | 0.458077609539032 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q187787 |
| concepts[6].display_name | Genetic algorithm |
| concepts[7].id | https://openalex.org/C120314980 |
| concepts[7].level | 1 |
| concepts[7].score | 0.4226624071598053 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q180634 |
| concepts[7].display_name | Distributed computing |
| concepts[8].id | https://openalex.org/C46934059 |
| concepts[8].level | 2 |
| concepts[8].score | 0.4141952395439148 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q61515 |
| concepts[8].display_name | Outsourcing |
| concepts[9].id | https://openalex.org/C38652104 |
| concepts[9].level | 1 |
| concepts[9].score | 0.32146334648132324 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[9].display_name | Computer security |
| concepts[10].id | https://openalex.org/C154945302 |
| concepts[10].level | 1 |
| concepts[10].score | 0.19139987230300903 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[10].display_name | Artificial intelligence |
| concepts[11].id | https://openalex.org/C119857082 |
| concepts[11].level | 1 |
| concepts[11].score | 0.13641738891601562 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q2539 |
| concepts[11].display_name | Machine learning |
| concepts[12].id | https://openalex.org/C33923547 |
| concepts[12].level | 0 |
| concepts[12].score | 0.08403658866882324 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[12].display_name | Mathematics |
| concepts[13].id | https://openalex.org/C17744445 |
| concepts[13].level | 0 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q36442 |
| concepts[13].display_name | Political science |
| concepts[14].id | https://openalex.org/C105795698 |
| concepts[14].level | 1 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q12483 |
| concepts[14].display_name | Statistics |
| concepts[15].id | https://openalex.org/C111919701 |
| concepts[15].level | 1 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[15].display_name | Operating system |
| concepts[16].id | https://openalex.org/C199539241 |
| concepts[16].level | 1 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q7748 |
| concepts[16].display_name | Law |
| keywords[0].id | https://openalex.org/keywords/cloud-computing |
| keywords[0].score | 0.8742926716804504 |
| keywords[0].display_name | Cloud computing |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.7151851058006287 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/crossover |
| keywords[2].score | 0.6125656366348267 |
| keywords[2].display_name | Crossover |
| keywords[3].id | https://openalex.org/keywords/key |
| keywords[3].score | 0.5422635078430176 |
| keywords[3].display_name | Key (lock) |
| keywords[4].id | https://openalex.org/keywords/flexibility |
| keywords[4].score | 0.4671670198440552 |
| keywords[4].display_name | Flexibility (engineering) |
| keywords[5].id | https://openalex.org/keywords/information-privacy |
| keywords[5].score | 0.45964646339416504 |
| keywords[5].display_name | Information privacy |
| keywords[6].id | https://openalex.org/keywords/genetic-algorithm |
| keywords[6].score | 0.458077609539032 |
| keywords[6].display_name | Genetic algorithm |
| keywords[7].id | https://openalex.org/keywords/distributed-computing |
| keywords[7].score | 0.4226624071598053 |
| keywords[7].display_name | Distributed computing |
| keywords[8].id | https://openalex.org/keywords/outsourcing |
| keywords[8].score | 0.4141952395439148 |
| keywords[8].display_name | Outsourcing |
| keywords[9].id | https://openalex.org/keywords/computer-security |
| keywords[9].score | 0.32146334648132324 |
| keywords[9].display_name | Computer security |
| keywords[10].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[10].score | 0.19139987230300903 |
| keywords[10].display_name | Artificial intelligence |
| keywords[11].id | https://openalex.org/keywords/machine-learning |
| keywords[11].score | 0.13641738891601562 |
| keywords[11].display_name | Machine learning |
| keywords[12].id | https://openalex.org/keywords/mathematics |
| keywords[12].score | 0.08403658866882324 |
| keywords[12].display_name | Mathematics |
| language | en |
| locations[0].id | doi:10.21203/rs.3.rs-354988/v1 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306402450 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Research Square (Research Square) |
| locations[0].source.host_organization | https://openalex.org/I4210096694 |
| locations[0].source.host_organization_name | Research Square (United States) |
| locations[0].source.host_organization_lineage | https://openalex.org/I4210096694 |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://www.researchsquare.com/article/rs-354988/latest.pdf |
| locations[0].version | acceptedVersion |
| locations[0].raw_type | posted-content |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | https://doi.org/10.21203/rs.3.rs-354988/v1 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5034876765 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-4480-1443 |
| authorships[0].author.display_name | Kartik Anand |
| authorships[0].affiliations[0].raw_affiliation_string | Chennai Institute of Technology |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | K Anand |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Chennai Institute of Technology |
| authorships[1].author.id | https://openalex.org/A5078402509 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | A. Vijayaraj |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I149313025 |
| authorships[1].affiliations[0].raw_affiliation_string | Vignan's Foundation for Science Technology and Research |
| authorships[1].institutions[0].id | https://openalex.org/I149313025 |
| authorships[1].institutions[0].ror | https://ror.org/03bzf1g85 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I149313025 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Vignan's Foundation for Science, Technology & Research |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | A. Vijayaraj |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Vignan's Foundation for Science Technology and Research |
| authorships[2].author.id | https://openalex.org/A5059473875 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | M. Anand |
| authorships[2].countries | IN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I85461943 |
| authorships[2].affiliations[0].raw_affiliation_string | Saveetha University Saveetha Engineering College |
| authorships[2].institutions[0].id | https://openalex.org/I85461943 |
| authorships[2].institutions[0].ror | https://ror.org/0034me914 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I85461943 |
| authorships[2].institutions[0].country_code | IN |
| authorships[2].institutions[0].display_name | Saveetha University |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | M. Vijay Anand |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Saveetha University Saveetha Engineering College |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://www.researchsquare.com/article/rs-354988/latest.pdf |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | A Cloud Privacy-Preserving Model Using Gaussian Mutation-Based Bacterial Foraging Optimization and Genetic Crossover Operation |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11614 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9968000054359436 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Cloud Data Security Solutions |
| related_works | https://openalex.org/W2358200898, https://openalex.org/W4231184955, https://openalex.org/W2325765407, https://openalex.org/W2788012436, https://openalex.org/W618293728, https://openalex.org/W2291845669, https://openalex.org/W2014162767, https://openalex.org/W2115729582, https://openalex.org/W2046083801, https://openalex.org/W2367260997 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.21203/rs.3.rs-354988/v1 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306402450 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Research Square (Research Square) |
| best_oa_location.source.host_organization | https://openalex.org/I4210096694 |
| best_oa_location.source.host_organization_name | Research Square (United States) |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I4210096694 |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://www.researchsquare.com/article/rs-354988/latest.pdf |
| best_oa_location.version | acceptedVersion |
| best_oa_location.raw_type | posted-content |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://doi.org/10.21203/rs.3.rs-354988/v1 |
| primary_location.id | doi:10.21203/rs.3.rs-354988/v1 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306402450 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Research Square (Research Square) |
| primary_location.source.host_organization | https://openalex.org/I4210096694 |
| primary_location.source.host_organization_name | Research Square (United States) |
| primary_location.source.host_organization_lineage | https://openalex.org/I4210096694 |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://www.researchsquare.com/article/rs-354988/latest.pdf |
| primary_location.version | acceptedVersion |
| primary_location.raw_type | posted-content |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | https://doi.org/10.21203/rs.3.rs-354988/v1 |
| publication_date | 2021-04-16 |
| publication_year | 2021 |
| referenced_works | https://openalex.org/W2970766268, https://openalex.org/W2025614009, https://openalex.org/W2040731319, https://openalex.org/W3006183319, https://openalex.org/W2765379781, https://openalex.org/W3094212585, https://openalex.org/W3014777329, https://openalex.org/W3021054637, https://openalex.org/W2415363243, https://openalex.org/W3092340928, https://openalex.org/W2001672163, https://openalex.org/W3034680867, https://openalex.org/W3158000792, https://openalex.org/W3094430435 |
| referenced_works_count | 14 |
| abstract_inverted_index.AI | 114 |
| abstract_inverted_index.An | 50 |
| abstract_inverted_index.GC | 202, 208 |
| abstract_inverted_index.In | 157 |
| abstract_inverted_index.an | 221 |
| abstract_inverted_index.as | 32, 34, 225 |
| abstract_inverted_index.by | 11, 139 |
| abstract_inverted_index.in | 5, 13, 99, 123, 152, 215 |
| abstract_inverted_index.is | 44, 56 |
| abstract_inverted_index.of | 3, 62, 72, 96, 217 |
| abstract_inverted_index.on | 88 |
| abstract_inverted_index.to | 59, 77, 86, 109 |
| abstract_inverted_index.we | 160 |
| abstract_inverted_index.GC) | 175 |
| abstract_inverted_index.GC. | 230 |
| abstract_inverted_index.The | 1 |
| abstract_inverted_index.and | 22, 81, 102, 119, 144, 164, 192, 229 |
| abstract_inverted_index.are | 116, 134, 146 |
| abstract_inverted_index.day | 10, 12 |
| abstract_inverted_index.due | 58 |
| abstract_inverted_index.for | 40, 46, 177 |
| abstract_inverted_index.has | 27, 37 |
| abstract_inverted_index.key | 179, 198 |
| abstract_inverted_index.the | 6, 15, 19, 60, 73, 93, 100, 127, 147, 153, 182, 205 |
| abstract_inverted_index.two | 148 |
| abstract_inverted_index.(AI) | 105 |
| abstract_inverted_index.Data | 142 |
| abstract_inverted_index.been | 38 |
| abstract_inverted_index.cost | 128 |
| abstract_inverted_index.data | 16, 24, 31, 35, 53, 64, 140, 187 |
| abstract_inverted_index.more | 120, 211 |
| abstract_inverted_index.most | 71 |
| abstract_inverted_index.some | 28 |
| abstract_inverted_index.such | 224 |
| abstract_inverted_index.take | 87 |
| abstract_inverted_index.than | 220 |
| abstract_inverted_index.that | 36, 195 |
| abstract_inverted_index.this | 158 |
| abstract_inverted_index.used | 108 |
| abstract_inverted_index.well | 33 |
| abstract_inverted_index.were | 84, 107 |
| abstract_inverted_index.with | 68, 136, 170 |
| abstract_inverted_index.These | 113 |
| abstract_inverted_index.While | 66 |
| abstract_inverted_index.cloud | 7, 26, 47, 89, 101, 124, 137, 218 |
| abstract_inverted_index.data, | 70 |
| abstract_inverted_index.legal | 52 |
| abstract_inverted_index.major | 149 |
| abstract_inverted_index.model | 95 |
| abstract_inverted_index.novel | 94 |
| abstract_inverted_index.steps | 150 |
| abstract_inverted_index.terms | 216 |
| abstract_inverted_index.these | 111 |
| abstract_inverted_index.using | 200 |
| abstract_inverted_index.which | 14, 43 |
| abstract_inverted_index.CGBFO- | 201, 207 |
| abstract_inverted_index.Hence, | 92 |
| abstract_inverted_index.J-SSO, | 228 |
| abstract_inverted_index.degree | 194 |
| abstract_inverted_index.failed | 76 |
| abstract_inverted_index.handle | 78 |
| abstract_inverted_index.hiding | 190 |
| abstract_inverted_index.higher | 131 |
| abstract_inverted_index.method | 223 |
| abstract_inverted_index.namely | 186 |
| abstract_inverted_index.public | 41 |
| abstract_inverted_index.ratio, | 189, 191 |
| abstract_inverted_index.rising | 20 |
| abstract_inverted_index.study, | 159 |
| abstract_inverted_index.system | 8 |
| abstract_inverted_index.tackle | 110 |
| abstract_inverted_index.(CGBFO- | 174 |
| abstract_inverted_index.CDNNCS, | 227 |
| abstract_inverted_index.Chaotic | 162 |
| abstract_inverted_index.access, | 42 |
| abstract_inverted_index.crucial | 45 |
| abstract_inverted_index.dealing | 67 |
| abstract_inverted_index.genetic | 171 |
| abstract_inverted_index.harvest | 18 |
| abstract_inverted_index.methods | 115 |
| abstract_inverted_index.offered | 135 |
| abstract_inverted_index.optimal | 79, 178, 197 |
| abstract_inverted_index.privacy | 80, 90, 97, 155 |
| abstract_inverted_index.private | 30 |
| abstract_inverted_index.results | 214 |
| abstract_inverted_index.studies | 83 |
| abstract_inverted_index.Abstract | 0 |
| abstract_inverted_index.Deriving | 181 |
| abstract_inverted_index.Foraging | 168 |
| abstract_inverted_index.Gaussian | 165 |
| abstract_inverted_index.However, | 126 |
| abstract_inverted_index.advanced | 51 |
| abstract_inverted_index.agility, | 130 |
| abstract_inverted_index.existing | 74, 222 |
| abstract_inverted_index.function | 184 |
| abstract_inverted_index.hosting. | 141 |
| abstract_inverted_index.involved | 151 |
| abstract_inverted_index.personal | 21 |
| abstract_inverted_index.proposed | 154, 161, 206 |
| abstract_inverted_index.provides | 210 |
| abstract_inverted_index.repeated | 63 |
| abstract_inverted_index.replica. | 156 |
| abstract_inverted_index.required | 57 |
| abstract_inverted_index.savings, | 129 |
| abstract_inverted_index.security | 4, 48, 219 |
| abstract_inverted_index.Bacterial | 167 |
| abstract_inverted_index.SAS-DPSO, | 226 |
| abstract_inverted_index.algorithm | 176, 209 |
| abstract_inverted_index.cleansing | 143 |
| abstract_inverted_index.computing | 138 |
| abstract_inverted_index.crossover | 172 |
| abstract_inverted_index.different | 82 |
| abstract_inverted_index.efficient | 121, 212 |
| abstract_inverted_index.increases | 9 |
| abstract_inverted_index.necessity | 2 |
| abstract_inverted_index.operation | 173 |
| abstract_inverted_index.performed | 85 |
| abstract_inverted_index.resultant | 61 |
| abstract_inverted_index.sensitive | 23, 69 |
| abstract_inverted_index.algorithm. | 203 |
| abstract_inverted_index.artificial | 103 |
| abstract_inverted_index.businesses | 133 |
| abstract_inverted_index.chemotaxis | 163 |
| abstract_inverted_index.computing. | 125 |
| abstract_inverted_index.constraint | 55 |
| abstract_inverted_index.generation | 199 |
| abstract_inverted_index.outsourced | 39 |
| abstract_inverted_index.parameters | 185 |
| abstract_inverted_index.protection | 54 |
| abstract_inverted_index.strategic, | 118 |
| abstract_inverted_index.techniques | 75, 106 |
| abstract_inverted_index.volume.The | 25 |
| abstract_inverted_index.Ultimately, | 204 |
| abstract_inverted_index.challenges. | 112 |
| abstract_inverted_index.controllers | 17 |
| abstract_inverted_index.flexibility | 132 |
| abstract_inverted_index.generation. | 180 |
| abstract_inverted_index.performance | 213 |
| abstract_inverted_index.restoration | 145 |
| abstract_inverted_index.statements. | 49 |
| abstract_inverted_index.unprotected | 29 |
| abstract_inverted_index.violations. | 65 |
| abstract_inverted_index.Optimization | 169 |
| abstract_inverted_index.accomplishes | 196 |
| abstract_inverted_index.intelligence | 104 |
| abstract_inverted_index.modification | 193 |
| abstract_inverted_index.preservation | 98, 188 |
| abstract_inverted_index.organizations | 122 |
| abstract_inverted_index.preservation. | 91 |
| abstract_inverted_index.mutation-based | 166 |
| abstract_inverted_index.insight-driven, | 117 |
| abstract_inverted_index.multi-objective | 183 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 3 |
| citation_normalized_percentile.value | 0.07030318 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |