SlideShare a Scribd company logo
1 of 6
Download to read offline
David Batard et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.352-357

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Implementation of an NEP in Java
David Batard, Víctor Martínez
Abstract
TheNetworks of Evolutionary Processors (NEPs) are computing mechanisms directly inspired from the behavior
of cell populations more specifically the point mutations in DNA strands.These mechanisms are been used for
solving NP-complete problems by means of a parallel computation postulation.This paper describes an
implementation of the basic model of NEP and includes the possibility of designing some of the most common
variants of it by means of a graphic user interface which eases the configuration of a given problem. It is a
system designed to be used in a multicore processor in order to benefit from the multi thread use.
Keywords: NEP, Evolutionary processors, natural computing, Implementation.
In this paperwe describe the initial work of
implementation of a general NEP which can be
I.
Introduction
thought to represent the most common variations of
Networks of Evolutionary Processors (NEP)
the basic model, considering the concurrent way it
are a rather new computing mechanism directly
was conceived to perform and having a graphic user
inspired from the behavior of cell populations. Every
interface for an easier way of defining it and getting
cell is described by a set of words, evolving by
the outcomes.
mutations, which are represented by operations on
these words, resembling the manner carried out by
II.
Basic concepts
DNA strings [Păun, 1998]. At the end of the process,
A network of evolutionary processors of size
only the cells with correct strings will survive. The
n is a construct:
main potential in this model is the simultaneous way
,
it develops for which a basic architecture for parallel
where V is an alphabet of symbols and for each 1 ≤ i
and distributed computing is required consisting on
≤ n,
= (
,
,
,
,
) is the -th
several processors, each of them placed in a node of a
evolutionary node processor of the network. The
virtual complete graph, which are able to handle data
parameters of every processor are:
associated with the respective node. Each node
is a finite set of evolution rules of one of the
processor acts on the local data in accordance with
following forms only:
some predefined rules. Local data is then sent through
– a→ b a, b ∈V (substitution rules),
the network according to well-defined protocols. Only
data which is able to pass a filtering process can be
– a→ ε
a ∈V (deletion rules),
communicated. This filtering process may be required
– ε→ a
a ∈V (insertion rules),
to satisfy some conditions imposed by the sending
In this case for the hybrid NEP we are
processor, by the receiving processor, or by both of
considering each deletion node or insertion node
them. All the nodes simultaneously send their data
having its own working mode (performs the operation
and the receiving nodes also simultaneously handle
at any position, in the left-hand end, or in the rightall the arriving messages, according to specific
hand end of the word) and different nodes are allowed
strategies. In addition, the data in the nodes is
to use different ways of filtering. Thus, the same
organized in the form of large multiset of words
network may have nodes where the deletion operation
where each word could appear in an arbitrarily large
can be performed at arbitrary position and nodes
number of copies and all the copies are processed in
where the deletion can be done only at the right-hand
parallel so that every possible action takes place.
end of the word.
This basic model has evolved to others
is a finite set of strings over V. The set
which extend not only the definition but the
is the set of initial strings in the -th node. We
applications. In this case we consider the hybrid
consider that each string appearing in any node at any
networks of evolutionary processors (HNEP) where
step has an arbitrarily large number of copiesin that
the rules in every processor could be applied
node.
differently opposed to the basic model as described in
are the input permitting/forbidding
[Martín-Vide, 2003].Also other variants can be
contexts of the processor, while
are the
considered as they all share the same general
output permitting/forbidding contexts of the
characteristics.
processor. These filters can work in four different
way as described below:

www.ijera.com

352 | P a g e
David Batard et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.352-357
For two disjoint subsets P and F of an alphabet V and
a word over V, we define the predicates
and
as follows:

www.ijera.com

Formally, we say that the configuration
=
(
)directly changes into the configuration
=(
) by a communication step, written
as
if
∈
∈

∈
The construction of these predicates is based on
random-context conditions defined by the two sets P
(permitting contexts) and F (forbidding contexts). For
every language
and
∈
,
we define:
∈
.
Finally, G= ({
}, E) is an undirected
graph called the underlying graph of the network.The
edges of G, that is the elements of E, are given in the
form of sets of two nodes.
By a configuration (state) of a NEP as above
we mean an n-tupleC = (
), with
for all 1 ≤ i ≤ n. A configuration represents the
sets of strings which are present in any node at a
given moment. The initial configuration of the
network is
=(
). A configuration can
change either by an evolutionary step or by a
communicating step. When changing by an
evolutionary step, each component
of the
configuration is changed in accordance with the
evolutionary rules associated with the node i.
Formally, we say that the configuration =
(
), directly changesinto the configuration
=(
) by an evolutionary step, written
as
if is the set of strings obtained by
applying the rules of to the strings in as follows:
(i) If the same substitution or deletion rule may
replace different occurrences of the same symbol
within a string, all these occurrences must be replaced
within different copies of that string. The result is a
multiset in which every string that can be obtained
appears in an arbitrarily large number of copies.
(ii) An insertion rule is applied at any position in a
string. Again, the result is a multiset in which every
string, that can be obtained by application of an
insertion rule to an arbitrary position in an existing
string, appears in an arbitrarily large number of
copies.
(iii) If more than one rule, no matter its type, applies
to a string, all of them must be used for different
copies of that string.
When changing by a communication step,
each node processor sends all copies of the strings
it has which are able to pass its output filter to all the
node processors connected to
and receives all
copies of the strings sent by any node processor
connected with
providing that they can pass its
input filter.

www.ijera.com

for every 1 ≤ i ≤ n.
Let Γ = (V,
) be an NEP. By a
computation in Γwe mean a sequence of
configurations
. . ., where is the initial
configuration,
and
for all i
≥ 0.
If the sequence is finite, we have a finite
computation. The result of any finite or infinite
computation is a language which is collected in a
designated node called the output node of the
network. If one considers the output node of the
network as being the node k, and if , , . . . is a
computation, then all strings existing in the node k at
some step t - the -th component of - belong to the
language generated by the network. Let us denote this
language by
(Γ ). The time complexity of
computing a finite set of strings Z is the minimal
number of steps t in a computation , , . . . , . . .
such that Z is a subset of the k-th component of .

III.

Implementation

This NEP implementation is thought to be a
base for future additions and adaptations as the
discoveries in this field are moving forward, so the
class structure is considered to be lithe by means of
the use of interfaces along with abstract classes which
gather the common and required features of the
formal definition.
The relation and dependencies of classes for
simulating the NEP model are showed in Figure 1, in
a simplified way.

353 | P a g e
David Batard et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.352-357

www.ijera.com

Fig. 1. Class diagram of the main design
We can see in this diagram the relation
among all the involved classes. We thought the main
class NEP should be in charge of keeping reference to
the rest of the well-known components of a NEP such
as the alphabet in a form of a Stringin which every
character is standing for a symbol, the graph, the list
of nodes or processors and the stopping conditions.
This class it is also in charge of initiating and
controlling the evolutionary and communication
processes trough the method go()which is in charge of
doing this rotation of steps in accordance with the
established
model and controlling with the
anyStoppingCondition() the possibility of stopping
the processing due to the occurrence of any of the
required conditions for stopping the computation.
This class also interacts with others devoted to the
data management and NEP configuration procedure
as well as for retrieving the outcomes of a calculation.
For the Graph class we have an array list of
Connection which is a class describing a connection
between two nodes by keeping the names of the nodes
related in a form ofint values,which are also the
numbers of the positions of each node in the list of
nodes. The method neighbors(int node)of this class
was thought to be of use in communication stepsfor
retrieving the list of nodes connected to a given one
for next exchange of words among them.
As we mentioned, the NEP stops when at least one of
the stopping condition is met. In this case we have
considered covering the most common ones as in
jNEP in[Rosal, 2008].The Figure 1 shows how from
an interface it was conceived the general structure of
www.ijera.com

the stopping condition by means of the stop(NEP
nep)method allowing future variant to be considered
without extended variation since each of the four
already in the implementing classes(Stopping
Condition Consecutive Configuration, Stopping
Condition Words Disappear, Stopping Condition
Non Empty, Stopping Condition Step) of interface
IStopping Condition share the same method but
differing in theirs attributes. Explaining each one of
them we say that for the Stopping Condition
Consecutive Configurationto succeed stopping the
computation
if
two
consecutiveidentical
configurations are found once communication and
evolutionary steps were performed. For the Stopping
Condition Words Disappearto trigger the stop if
none of the words listed are in the NEP. The
Stopping Condition Non Emptyif one of the nodesis
non-empty and the Stopping Condition Step for
stopping after a given amount of steps.
The processors are other key components of
a NEP simulation, in this they are referred as nodes.
The Node class which has a MultiSetreference,
standing for the group of words of the processor
treated as an ArrayList<String>and implementing a
group of methods useful for the filtering and rules
application processes. In the nodes we have a list of
rules defined by theIRule interface and instantiated
buy a group of the classes: InsertionRule,
DeletionRule, SubstitutionRulethe ones are meant
to cover the basic model of NEP,implementing the
applyRule(String word)method of the interface and
inheriting from the Rule class, not considered in the
354 | P a g e
David Batard et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.352-357
class diagram for space reasons.The common
attributes come from Ruleas symbol, torepresent the
symbolto apply the rule to, coming as a Stringbut so
far considering the only character it carries and the
attribute how, also a String referring the way it has
to be done as in the position the rule has to be used,
having one of this values: left, right, any.This also
reworks the basic model which was conceived for
applying rules at the end of the word.
Nodes have two filters as attributes, the
inputfilter and the outputfilterwhich are instantiated
from one of the four filtering classes (Filter1, Filter2,
Filter3, Filter4) according to the level of strength in
the filtering processes described in [Martín-Vide,
2003], each one implementing the IFilterinterface
where the applyFilter()returns a list of words able to
pass the filter and the passFilter()for considering a
single word.
EvolutionaryStepis the class conceived to manage
the list of nodes for the purpose of performing an
configurations.

www.ijera.com

evolutionary step; for doing that and by means of
generating a new thread by each node in every step.
For that, it requires the ThreadNode class which uses
a node reference to access the node multiset and rules.
The run() method in every thread applies randomly
the rules to every word and every copy till no more
can be applied. Once the evolutionary step is finished
the
NEP
commands
to
the
method
apply(ArrayList<Node>nodes,Graph graph)of the
CommunicatingStepclass to proceed with the
exchange of words using the defined filters of each
node.
The need of a way for nicely defining and
storing the different designs of NEP is something
considered in this implementation. Some previous
application for this models do not present a solution
for this matter but for only for storing and reading
from a configuration file which the user has to learn
how to create. In the Figure 2 we show the class
diagram for the Input/Output of the different

Fig. 2. Class diagram for user interface.
Once the InitialView starts it is necessary to
upload the file containing the NEP description,
specified in a jsonsyntax, to the NEP instance
referenced by this view and by means of the
getSavedConfiguration(String path)method of the
PessistentConfiguration class, accessible through

the Load NEP button as showed in Figure 3 which
allows us to locate y select the desired configuration.

Fig. 3. Initial View of NEP system.
The ConfigurationViewresponsible for the
main interaction with the user permitting the creation
and modification, of a current NEP. The use of the
UserNep class it is given as a translation mechanism
www.ijera.com

between the form of writing in the visual components
and the NEP object oriented structure. For example in
Figure 4 for defining the graph, a structure in the way
of tuples of nodes numbersassociated with a comma
355 | P a g e
David Batard et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.352-357
and delimited through brackets as follows: (0,1)(1,2)
(0,2). For that purpose the readGraphString(String
sgraph) is in charge of the translation of a string
representation of the graph to a Graph class form, in
the opposite direction the writeGraph(NEP
nep)method is responsible of putting in a string form
the Graph content required for visualizing it in the
ConfigurationView.
In this view the comma is used for
separating the individual elements as words in the
multiset, also the symbolization -> for describing
the rules having consequent, not for the deletion or

www.ijera.com

insertion ruleswhich only requires the one different
from the empty symbol.
The Node panel also in Figure 4 allows us to move
through the different
nodes using the
<<<<<Previous Node<<<<<,
and
>>>>>Next
Node >>>>> buttons as well as going directly to the
desired one if the configuration is too long.

Fig. 4.ConfigurationView

IV.

Conclusion

In this paper we have described the design
and implementation of an abstract computer devise
called NEP, aiming to achieve a solution for fitting
the most common variants. The use of a graphic user
interface is also one of the first attempts of this type
of simulations allowing a fast and pleasant
configuration of the NEP.
This work plays to be a starting tool for
future analysis of the different variants the NEP
family as it will be submitted to forthcoming
developments in order complete a better and more
complete solution.

[2]

[3]

[4]

Bibliography
[1]

[Bel-Enguix, 2008] Bel-Enguix G., Jiménez
M.: A BioInspired Model for Parsing of
Natural Languages.Studies in Computational
Intelligence, Springer Verlag, Berlin, 2008,
Vol. 129/2008, 369-378.

www.ijera.com

[5]

[Bottoni, 2011] Bottoni, P., Labella, A.,
Manea, F., Mitrana, V., Petre, I., Sempere,
J.:
Complexity-preserving
simulations
among three variants of accepting networks
of evolutionary processors, Springer
Science+Business Media B.V. 2011.
[Castellanos, 2001] Castellanos, J., MartinVide, C., Mitrana, V., Sempere, J.: Solving
NP-complete problems with networks of
evolutionary processors. Proceedings of
IWANN 2001, LNCS 2084, SpringerVerlag, 2001, 621–628.
[Castellanos, 2003] Castellanos, J., C.
Martin-Vide, V. Mitrana& J.M. Sempere,
Networks of Evolutionary processors,
ActaInformatica. 39 (2003): 517-529.
[Manea, 2004] Manea, F., Martin-Vide, V.,
&Mitrana, V., Solving 3CNF-SAT and HPP
in linear time using WWW, Proc. of MCU
2004, LNCS, in press.
356 | P a g e
David Batard et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.352-357
[6]

[7]

[8]

[9]

www.ijera.com

[Manea, 2006] Manea F., Martín-Vide
C., Mitrana V.: A Universal Accepting
Hybrid Network of Evolutionary Processors,
Electronic Notes in Theoretical Computer
Science,2006, Vol. 135, 15-23.
[Martín-Vide, 2003] Martin-Vide, C.,
Mitrana, V., Perez-Jimenez, M., & SanchoCaparrini, F., Hybrid networks of
evolutionary processors. In: Proc. of
GECCO 2003, LNCS 2723, Springer Verlag,
Berlin, 2003.
[Păun,1998] Păun, Gh.,Rozenberg, G.,
&Salomaa, A., DNA Computing. New
ComputingParadigms,
Berlin,
Springer,1998.
[Rosal, 2008] Rosal, E., Nuñez, R.,
Casteñeda, C., Ortega, A. Simulating NEPs
in a cluster with jNEP.Proceedings of
ICCCC, 2008.

Authors' Information

David Batard – University of Informatics
Sciences, Assistant professor in Department of
Research Management, La Habana-, Cuba;
Major Fields of Scientific Research: Natural
computing, Science Measurements, Intelligent
systems.

Víctor Martínez – Natural Computing
Group of Universidad Politécnica de Madrid. - Dpto.
Arquitectura y Tecnología de Computadores de la
Escuela Universitaria de Informática, Ctra. de
Valencia, km. 7, 28031 Madrid (Spain);

www.ijera.com

357 | P a g e

More Related Content

What's hot

Shuffle exchange networks
Shuffle exchange networksShuffle exchange networks
Shuffle exchange networksLahiru Danushka
 
Analysis and design of a half hypercube interconnection network topology
Analysis and design of a half hypercube interconnection network topologyAnalysis and design of a half hypercube interconnection network topology
Analysis and design of a half hypercube interconnection network topologyAmir Masoud Sefidian
 
DL for sentence classification project Write-up
DL for sentence classification project Write-upDL for sentence classification project Write-up
DL for sentence classification project Write-upHoàng Triều Trịnh
 
Counterpropagation NETWORK
Counterpropagation NETWORKCounterpropagation NETWORK
Counterpropagation NETWORKESCOM
 
Parallel programming Comparisions
Parallel programming ComparisionsParallel programming Comparisions
Parallel programming ComparisionsMuhammad Bilal Khan
 
Network Coding for Distributed Storage Systems(Group Meeting Talk)
Network Coding for Distributed Storage Systems(Group Meeting Talk)Network Coding for Distributed Storage Systems(Group Meeting Talk)
Network Coding for Distributed Storage Systems(Group Meeting Talk)Jayant Apte, PhD
 
DL for setence classification project presentation
DL for setence classification project presentationDL for setence classification project presentation
DL for setence classification project presentationHoàng Triều Trịnh
 
An Artificial Neuron Implemented on an Actual Quantum Processor
An Artificial Neuron Implemented on an Actual Quantum ProcessorAn Artificial Neuron Implemented on an Actual Quantum Processor
An Artificial Neuron Implemented on an Actual Quantum ProcessorWilly Marroquin (WillyDevNET)
 
Simple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud StorageSimple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud StorageKevin Tong
 
Reliability Improvement in Logic Circuit Stochastic Computation
Reliability Improvement in Logic Circuit Stochastic ComputationReliability Improvement in Logic Circuit Stochastic Computation
Reliability Improvement in Logic Circuit Stochastic ComputationWaqas Tariq
 
Lecture 7: Recurrent Neural Networks
Lecture 7: Recurrent Neural NetworksLecture 7: Recurrent Neural Networks
Lecture 7: Recurrent Neural NetworksSang Jun Lee
 
Electricity price forecasting with Recurrent Neural Networks
Electricity price forecasting with Recurrent Neural NetworksElectricity price forecasting with Recurrent Neural Networks
Electricity price forecasting with Recurrent Neural NetworksTaegyun Jeon
 
Introduction For seq2seq(sequence to sequence) and RNN
Introduction For seq2seq(sequence to sequence) and RNNIntroduction For seq2seq(sequence to sequence) and RNN
Introduction For seq2seq(sequence to sequence) and RNNHye-min Ahn
 
interfacing matlab with embedded systems
interfacing matlab with embedded systemsinterfacing matlab with embedded systems
interfacing matlab with embedded systemsRaghav Shetty
 
Network coding
Network codingNetwork coding
Network codingLishi He
 
Design and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGADesign and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGAVLSICS Design
 
Recurrent Neural Networks. Part 1: Theory
Recurrent Neural Networks. Part 1: TheoryRecurrent Neural Networks. Part 1: Theory
Recurrent Neural Networks. Part 1: TheoryAndrii Gakhov
 

What's hot (20)

Parallel computation
Parallel computationParallel computation
Parallel computation
 
Transformer Zoo
Transformer ZooTransformer Zoo
Transformer Zoo
 
Shuffle exchange networks
Shuffle exchange networksShuffle exchange networks
Shuffle exchange networks
 
Analysis and design of a half hypercube interconnection network topology
Analysis and design of a half hypercube interconnection network topologyAnalysis and design of a half hypercube interconnection network topology
Analysis and design of a half hypercube interconnection network topology
 
DL for sentence classification project Write-up
DL for sentence classification project Write-upDL for sentence classification project Write-up
DL for sentence classification project Write-up
 
Counterpropagation NETWORK
Counterpropagation NETWORKCounterpropagation NETWORK
Counterpropagation NETWORK
 
Parallel programming Comparisions
Parallel programming ComparisionsParallel programming Comparisions
Parallel programming Comparisions
 
Network Coding for Distributed Storage Systems(Group Meeting Talk)
Network Coding for Distributed Storage Systems(Group Meeting Talk)Network Coding for Distributed Storage Systems(Group Meeting Talk)
Network Coding for Distributed Storage Systems(Group Meeting Talk)
 
DL for setence classification project presentation
DL for setence classification project presentationDL for setence classification project presentation
DL for setence classification project presentation
 
An Artificial Neuron Implemented on an Actual Quantum Processor
An Artificial Neuron Implemented on an Actual Quantum ProcessorAn Artificial Neuron Implemented on an Actual Quantum Processor
An Artificial Neuron Implemented on an Actual Quantum Processor
 
Simple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud StorageSimple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud Storage
 
Reliability Improvement in Logic Circuit Stochastic Computation
Reliability Improvement in Logic Circuit Stochastic ComputationReliability Improvement in Logic Circuit Stochastic Computation
Reliability Improvement in Logic Circuit Stochastic Computation
 
Lecture 7: Recurrent Neural Networks
Lecture 7: Recurrent Neural NetworksLecture 7: Recurrent Neural Networks
Lecture 7: Recurrent Neural Networks
 
Electricity price forecasting with Recurrent Neural Networks
Electricity price forecasting with Recurrent Neural NetworksElectricity price forecasting with Recurrent Neural Networks
Electricity price forecasting with Recurrent Neural Networks
 
Introduction For seq2seq(sequence to sequence) and RNN
Introduction For seq2seq(sequence to sequence) and RNNIntroduction For seq2seq(sequence to sequence) and RNN
Introduction For seq2seq(sequence to sequence) and RNN
 
Rnn & Lstm
Rnn & LstmRnn & Lstm
Rnn & Lstm
 
interfacing matlab with embedded systems
interfacing matlab with embedded systemsinterfacing matlab with embedded systems
interfacing matlab with embedded systems
 
Network coding
Network codingNetwork coding
Network coding
 
Design and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGADesign and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGA
 
Recurrent Neural Networks. Part 1: Theory
Recurrent Neural Networks. Part 1: TheoryRecurrent Neural Networks. Part 1: Theory
Recurrent Neural Networks. Part 1: Theory
 

Viewers also liked (20)

Bm36382385
Bm36382385Bm36382385
Bm36382385
 
Ls3520052009
Ls3520052009Ls3520052009
Ls3520052009
 
Dc36624629
Dc36624629Dc36624629
Dc36624629
 
Bl36378381
Bl36378381Bl36378381
Bl36378381
 
Bt36430432
Bt36430432Bt36430432
Bt36430432
 
Cf36490495
Cf36490495Cf36490495
Cf36490495
 
Cp36547553
Cp36547553Cp36547553
Cp36547553
 
Ck36515520
Ck36515520Ck36515520
Ck36515520
 
By36454458
By36454458By36454458
By36454458
 
Bk36372377
Bk36372377Bk36372377
Bk36372377
 
Ci36507510
Ci36507510Ci36507510
Ci36507510
 
Bw36444448
Bw36444448Bw36444448
Bw36444448
 
Cq36554559
Cq36554559Cq36554559
Cq36554559
 
Bp36398403
Bp36398403Bp36398403
Bp36398403
 
Bz36459463
Bz36459463Bz36459463
Bz36459463
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Bu36433437
Bu36433437Bu36433437
Bu36433437
 
Bi36358362
Bi36358362Bi36358362
Bi36358362
 
Bf36342346
Bf36342346Bf36342346
Bf36342346
 
Bo36390397
Bo36390397Bo36390397
Bo36390397
 

Similar to Bh36352357

cis97007
cis97007cis97007
cis97007perfj
 
Applying Deep Learning Machine Translation to Language Services
Applying Deep Learning Machine Translation to Language ServicesApplying Deep Learning Machine Translation to Language Services
Applying Deep Learning Machine Translation to Language ServicesYannis Flet-Berliac
 
Feed forward neural network for sine
Feed forward neural network for sineFeed forward neural network for sine
Feed forward neural network for sineijcsa
 
A Parallel Algorithm Template for Updating Single-Source Shortest Paths in La...
A Parallel Algorithm Template for Updating Single-Source Shortest Paths in La...A Parallel Algorithm Template for Updating Single-Source Shortest Paths in La...
A Parallel Algorithm Template for Updating Single-Source Shortest Paths in La...Subhajit Sahu
 
Simulation of Scale-Free Networks
Simulation of Scale-Free NetworksSimulation of Scale-Free Networks
Simulation of Scale-Free NetworksGabriele D'Angelo
 
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...Editor IJCATR
 
cis97003
cis97003cis97003
cis97003perfj
 
Problems in Task Scheduling in Multiprocessor System
Problems in Task Scheduling in Multiprocessor SystemProblems in Task Scheduling in Multiprocessor System
Problems in Task Scheduling in Multiprocessor Systemijtsrd
 
ARTIFICIAL NEURAL NETWORK APPROACH TO MODELING OF POLYPROPYLENE REACTOR
ARTIFICIAL NEURAL NETWORK APPROACH TO MODELING OF POLYPROPYLENE REACTORARTIFICIAL NEURAL NETWORK APPROACH TO MODELING OF POLYPROPYLENE REACTOR
ARTIFICIAL NEURAL NETWORK APPROACH TO MODELING OF POLYPROPYLENE REACTORijac123
 
Concepts of Temporal CNN, Recurrent Neural Network, Attention
Concepts of Temporal CNN, Recurrent Neural Network, AttentionConcepts of Temporal CNN, Recurrent Neural Network, Attention
Concepts of Temporal CNN, Recurrent Neural Network, AttentionSaumyaMundra3
 
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONSCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONijdms
 
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONSCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONijdms
 
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONSCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONijdms
 
Distributed Coordination
Distributed CoordinationDistributed Coordination
Distributed CoordinationLuis Galárraga
 
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...IJECEIAES
 
Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...
Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...
Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...IJERA Editor
 

Similar to Bh36352357 (20)

cis97007
cis97007cis97007
cis97007
 
Solution(1)
Solution(1)Solution(1)
Solution(1)
 
User biglm
User biglmUser biglm
User biglm
 
Applying Deep Learning Machine Translation to Language Services
Applying Deep Learning Machine Translation to Language ServicesApplying Deep Learning Machine Translation to Language Services
Applying Deep Learning Machine Translation to Language Services
 
Feed forward neural network for sine
Feed forward neural network for sineFeed forward neural network for sine
Feed forward neural network for sine
 
A Parallel Algorithm Template for Updating Single-Source Shortest Paths in La...
A Parallel Algorithm Template for Updating Single-Source Shortest Paths in La...A Parallel Algorithm Template for Updating Single-Source Shortest Paths in La...
A Parallel Algorithm Template for Updating Single-Source Shortest Paths in La...
 
Simulation of Scale-Free Networks
Simulation of Scale-Free NetworksSimulation of Scale-Free Networks
Simulation of Scale-Free Networks
 
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
 
cis97003
cis97003cis97003
cis97003
 
Gk3611601162
Gk3611601162Gk3611601162
Gk3611601162
 
A046020112
A046020112A046020112
A046020112
 
Problems in Task Scheduling in Multiprocessor System
Problems in Task Scheduling in Multiprocessor SystemProblems in Task Scheduling in Multiprocessor System
Problems in Task Scheduling in Multiprocessor System
 
ARTIFICIAL NEURAL NETWORK APPROACH TO MODELING OF POLYPROPYLENE REACTOR
ARTIFICIAL NEURAL NETWORK APPROACH TO MODELING OF POLYPROPYLENE REACTORARTIFICIAL NEURAL NETWORK APPROACH TO MODELING OF POLYPROPYLENE REACTOR
ARTIFICIAL NEURAL NETWORK APPROACH TO MODELING OF POLYPROPYLENE REACTOR
 
Concepts of Temporal CNN, Recurrent Neural Network, Attention
Concepts of Temporal CNN, Recurrent Neural Network, AttentionConcepts of Temporal CNN, Recurrent Neural Network, Attention
Concepts of Temporal CNN, Recurrent Neural Network, Attention
 
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONSCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
 
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONSCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
 
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONSCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
 
Distributed Coordination
Distributed CoordinationDistributed Coordination
Distributed Coordination
 
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
 
Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...
Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...
Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...
 

Recently uploaded

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 

Recently uploaded (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

Bh36352357

  • 1. David Batard et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.352-357 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Implementation of an NEP in Java David Batard, Víctor Martínez Abstract TheNetworks of Evolutionary Processors (NEPs) are computing mechanisms directly inspired from the behavior of cell populations more specifically the point mutations in DNA strands.These mechanisms are been used for solving NP-complete problems by means of a parallel computation postulation.This paper describes an implementation of the basic model of NEP and includes the possibility of designing some of the most common variants of it by means of a graphic user interface which eases the configuration of a given problem. It is a system designed to be used in a multicore processor in order to benefit from the multi thread use. Keywords: NEP, Evolutionary processors, natural computing, Implementation. In this paperwe describe the initial work of implementation of a general NEP which can be I. Introduction thought to represent the most common variations of Networks of Evolutionary Processors (NEP) the basic model, considering the concurrent way it are a rather new computing mechanism directly was conceived to perform and having a graphic user inspired from the behavior of cell populations. Every interface for an easier way of defining it and getting cell is described by a set of words, evolving by the outcomes. mutations, which are represented by operations on these words, resembling the manner carried out by II. Basic concepts DNA strings [Păun, 1998]. At the end of the process, A network of evolutionary processors of size only the cells with correct strings will survive. The n is a construct: main potential in this model is the simultaneous way , it develops for which a basic architecture for parallel where V is an alphabet of symbols and for each 1 ≤ i and distributed computing is required consisting on ≤ n, = ( , , , , ) is the -th several processors, each of them placed in a node of a evolutionary node processor of the network. The virtual complete graph, which are able to handle data parameters of every processor are: associated with the respective node. Each node is a finite set of evolution rules of one of the processor acts on the local data in accordance with following forms only: some predefined rules. Local data is then sent through – a→ b a, b ∈V (substitution rules), the network according to well-defined protocols. Only data which is able to pass a filtering process can be – a→ ε a ∈V (deletion rules), communicated. This filtering process may be required – ε→ a a ∈V (insertion rules), to satisfy some conditions imposed by the sending In this case for the hybrid NEP we are processor, by the receiving processor, or by both of considering each deletion node or insertion node them. All the nodes simultaneously send their data having its own working mode (performs the operation and the receiving nodes also simultaneously handle at any position, in the left-hand end, or in the rightall the arriving messages, according to specific hand end of the word) and different nodes are allowed strategies. In addition, the data in the nodes is to use different ways of filtering. Thus, the same organized in the form of large multiset of words network may have nodes where the deletion operation where each word could appear in an arbitrarily large can be performed at arbitrary position and nodes number of copies and all the copies are processed in where the deletion can be done only at the right-hand parallel so that every possible action takes place. end of the word. This basic model has evolved to others is a finite set of strings over V. The set which extend not only the definition but the is the set of initial strings in the -th node. We applications. In this case we consider the hybrid consider that each string appearing in any node at any networks of evolutionary processors (HNEP) where step has an arbitrarily large number of copiesin that the rules in every processor could be applied node. differently opposed to the basic model as described in are the input permitting/forbidding [Martín-Vide, 2003].Also other variants can be contexts of the processor, while are the considered as they all share the same general output permitting/forbidding contexts of the characteristics. processor. These filters can work in four different way as described below: www.ijera.com 352 | P a g e
  • 2. David Batard et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.352-357 For two disjoint subsets P and F of an alphabet V and a word over V, we define the predicates and as follows: www.ijera.com Formally, we say that the configuration = ( )directly changes into the configuration =( ) by a communication step, written as if ∈ ∈ ∈ The construction of these predicates is based on random-context conditions defined by the two sets P (permitting contexts) and F (forbidding contexts). For every language and ∈ , we define: ∈ . Finally, G= ({ }, E) is an undirected graph called the underlying graph of the network.The edges of G, that is the elements of E, are given in the form of sets of two nodes. By a configuration (state) of a NEP as above we mean an n-tupleC = ( ), with for all 1 ≤ i ≤ n. A configuration represents the sets of strings which are present in any node at a given moment. The initial configuration of the network is =( ). A configuration can change either by an evolutionary step or by a communicating step. When changing by an evolutionary step, each component of the configuration is changed in accordance with the evolutionary rules associated with the node i. Formally, we say that the configuration = ( ), directly changesinto the configuration =( ) by an evolutionary step, written as if is the set of strings obtained by applying the rules of to the strings in as follows: (i) If the same substitution or deletion rule may replace different occurrences of the same symbol within a string, all these occurrences must be replaced within different copies of that string. The result is a multiset in which every string that can be obtained appears in an arbitrarily large number of copies. (ii) An insertion rule is applied at any position in a string. Again, the result is a multiset in which every string, that can be obtained by application of an insertion rule to an arbitrary position in an existing string, appears in an arbitrarily large number of copies. (iii) If more than one rule, no matter its type, applies to a string, all of them must be used for different copies of that string. When changing by a communication step, each node processor sends all copies of the strings it has which are able to pass its output filter to all the node processors connected to and receives all copies of the strings sent by any node processor connected with providing that they can pass its input filter. www.ijera.com for every 1 ≤ i ≤ n. Let Γ = (V, ) be an NEP. By a computation in Γwe mean a sequence of configurations . . ., where is the initial configuration, and for all i ≥ 0. If the sequence is finite, we have a finite computation. The result of any finite or infinite computation is a language which is collected in a designated node called the output node of the network. If one considers the output node of the network as being the node k, and if , , . . . is a computation, then all strings existing in the node k at some step t - the -th component of - belong to the language generated by the network. Let us denote this language by (Γ ). The time complexity of computing a finite set of strings Z is the minimal number of steps t in a computation , , . . . , . . . such that Z is a subset of the k-th component of . III. Implementation This NEP implementation is thought to be a base for future additions and adaptations as the discoveries in this field are moving forward, so the class structure is considered to be lithe by means of the use of interfaces along with abstract classes which gather the common and required features of the formal definition. The relation and dependencies of classes for simulating the NEP model are showed in Figure 1, in a simplified way. 353 | P a g e
  • 3. David Batard et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.352-357 www.ijera.com Fig. 1. Class diagram of the main design We can see in this diagram the relation among all the involved classes. We thought the main class NEP should be in charge of keeping reference to the rest of the well-known components of a NEP such as the alphabet in a form of a Stringin which every character is standing for a symbol, the graph, the list of nodes or processors and the stopping conditions. This class it is also in charge of initiating and controlling the evolutionary and communication processes trough the method go()which is in charge of doing this rotation of steps in accordance with the established model and controlling with the anyStoppingCondition() the possibility of stopping the processing due to the occurrence of any of the required conditions for stopping the computation. This class also interacts with others devoted to the data management and NEP configuration procedure as well as for retrieving the outcomes of a calculation. For the Graph class we have an array list of Connection which is a class describing a connection between two nodes by keeping the names of the nodes related in a form ofint values,which are also the numbers of the positions of each node in the list of nodes. The method neighbors(int node)of this class was thought to be of use in communication stepsfor retrieving the list of nodes connected to a given one for next exchange of words among them. As we mentioned, the NEP stops when at least one of the stopping condition is met. In this case we have considered covering the most common ones as in jNEP in[Rosal, 2008].The Figure 1 shows how from an interface it was conceived the general structure of www.ijera.com the stopping condition by means of the stop(NEP nep)method allowing future variant to be considered without extended variation since each of the four already in the implementing classes(Stopping Condition Consecutive Configuration, Stopping Condition Words Disappear, Stopping Condition Non Empty, Stopping Condition Step) of interface IStopping Condition share the same method but differing in theirs attributes. Explaining each one of them we say that for the Stopping Condition Consecutive Configurationto succeed stopping the computation if two consecutiveidentical configurations are found once communication and evolutionary steps were performed. For the Stopping Condition Words Disappearto trigger the stop if none of the words listed are in the NEP. The Stopping Condition Non Emptyif one of the nodesis non-empty and the Stopping Condition Step for stopping after a given amount of steps. The processors are other key components of a NEP simulation, in this they are referred as nodes. The Node class which has a MultiSetreference, standing for the group of words of the processor treated as an ArrayList<String>and implementing a group of methods useful for the filtering and rules application processes. In the nodes we have a list of rules defined by theIRule interface and instantiated buy a group of the classes: InsertionRule, DeletionRule, SubstitutionRulethe ones are meant to cover the basic model of NEP,implementing the applyRule(String word)method of the interface and inheriting from the Rule class, not considered in the 354 | P a g e
  • 4. David Batard et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.352-357 class diagram for space reasons.The common attributes come from Ruleas symbol, torepresent the symbolto apply the rule to, coming as a Stringbut so far considering the only character it carries and the attribute how, also a String referring the way it has to be done as in the position the rule has to be used, having one of this values: left, right, any.This also reworks the basic model which was conceived for applying rules at the end of the word. Nodes have two filters as attributes, the inputfilter and the outputfilterwhich are instantiated from one of the four filtering classes (Filter1, Filter2, Filter3, Filter4) according to the level of strength in the filtering processes described in [Martín-Vide, 2003], each one implementing the IFilterinterface where the applyFilter()returns a list of words able to pass the filter and the passFilter()for considering a single word. EvolutionaryStepis the class conceived to manage the list of nodes for the purpose of performing an configurations. www.ijera.com evolutionary step; for doing that and by means of generating a new thread by each node in every step. For that, it requires the ThreadNode class which uses a node reference to access the node multiset and rules. The run() method in every thread applies randomly the rules to every word and every copy till no more can be applied. Once the evolutionary step is finished the NEP commands to the method apply(ArrayList<Node>nodes,Graph graph)of the CommunicatingStepclass to proceed with the exchange of words using the defined filters of each node. The need of a way for nicely defining and storing the different designs of NEP is something considered in this implementation. Some previous application for this models do not present a solution for this matter but for only for storing and reading from a configuration file which the user has to learn how to create. In the Figure 2 we show the class diagram for the Input/Output of the different Fig. 2. Class diagram for user interface. Once the InitialView starts it is necessary to upload the file containing the NEP description, specified in a jsonsyntax, to the NEP instance referenced by this view and by means of the getSavedConfiguration(String path)method of the PessistentConfiguration class, accessible through the Load NEP button as showed in Figure 3 which allows us to locate y select the desired configuration. Fig. 3. Initial View of NEP system. The ConfigurationViewresponsible for the main interaction with the user permitting the creation and modification, of a current NEP. The use of the UserNep class it is given as a translation mechanism www.ijera.com between the form of writing in the visual components and the NEP object oriented structure. For example in Figure 4 for defining the graph, a structure in the way of tuples of nodes numbersassociated with a comma 355 | P a g e
  • 5. David Batard et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.352-357 and delimited through brackets as follows: (0,1)(1,2) (0,2). For that purpose the readGraphString(String sgraph) is in charge of the translation of a string representation of the graph to a Graph class form, in the opposite direction the writeGraph(NEP nep)method is responsible of putting in a string form the Graph content required for visualizing it in the ConfigurationView. In this view the comma is used for separating the individual elements as words in the multiset, also the symbolization -> for describing the rules having consequent, not for the deletion or www.ijera.com insertion ruleswhich only requires the one different from the empty symbol. The Node panel also in Figure 4 allows us to move through the different nodes using the <<<<<Previous Node<<<<<, and >>>>>Next Node >>>>> buttons as well as going directly to the desired one if the configuration is too long. Fig. 4.ConfigurationView IV. Conclusion In this paper we have described the design and implementation of an abstract computer devise called NEP, aiming to achieve a solution for fitting the most common variants. The use of a graphic user interface is also one of the first attempts of this type of simulations allowing a fast and pleasant configuration of the NEP. This work plays to be a starting tool for future analysis of the different variants the NEP family as it will be submitted to forthcoming developments in order complete a better and more complete solution. [2] [3] [4] Bibliography [1] [Bel-Enguix, 2008] Bel-Enguix G., Jiménez M.: A BioInspired Model for Parsing of Natural Languages.Studies in Computational Intelligence, Springer Verlag, Berlin, 2008, Vol. 129/2008, 369-378. www.ijera.com [5] [Bottoni, 2011] Bottoni, P., Labella, A., Manea, F., Mitrana, V., Petre, I., Sempere, J.: Complexity-preserving simulations among three variants of accepting networks of evolutionary processors, Springer Science+Business Media B.V. 2011. [Castellanos, 2001] Castellanos, J., MartinVide, C., Mitrana, V., Sempere, J.: Solving NP-complete problems with networks of evolutionary processors. Proceedings of IWANN 2001, LNCS 2084, SpringerVerlag, 2001, 621–628. [Castellanos, 2003] Castellanos, J., C. Martin-Vide, V. Mitrana& J.M. Sempere, Networks of Evolutionary processors, ActaInformatica. 39 (2003): 517-529. [Manea, 2004] Manea, F., Martin-Vide, V., &Mitrana, V., Solving 3CNF-SAT and HPP in linear time using WWW, Proc. of MCU 2004, LNCS, in press. 356 | P a g e
  • 6. David Batard et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.352-357 [6] [7] [8] [9] www.ijera.com [Manea, 2006] Manea F., Martín-Vide C., Mitrana V.: A Universal Accepting Hybrid Network of Evolutionary Processors, Electronic Notes in Theoretical Computer Science,2006, Vol. 135, 15-23. [Martín-Vide, 2003] Martin-Vide, C., Mitrana, V., Perez-Jimenez, M., & SanchoCaparrini, F., Hybrid networks of evolutionary processors. In: Proc. of GECCO 2003, LNCS 2723, Springer Verlag, Berlin, 2003. [Păun,1998] Păun, Gh.,Rozenberg, G., &Salomaa, A., DNA Computing. New ComputingParadigms, Berlin, Springer,1998. [Rosal, 2008] Rosal, E., Nuñez, R., Casteñeda, C., Ortega, A. Simulating NEPs in a cluster with jNEP.Proceedings of ICCCC, 2008. Authors' Information David Batard – University of Informatics Sciences, Assistant professor in Department of Research Management, La Habana-, Cuba; Major Fields of Scientific Research: Natural computing, Science Measurements, Intelligent systems. Víctor Martínez – Natural Computing Group of Universidad Politécnica de Madrid. - Dpto. Arquitectura y Tecnología de Computadores de la Escuela Universitaria de Informática, Ctra. de Valencia, km. 7, 28031 Madrid (Spain); www.ijera.com 357 | P a g e