This paper proposes Arctic Wolf optimization (AWO) algorithm to solve the optimal reactive power problem. Deeds of the Arctic wolf have been imitated to formulate the proposed algorithm. Arctic wolf also identified as the white wolf or polar wolf is a breed of gray wolf inhabitant from Melville Island to Ellesmere Island. It is average size, very smaller when compared to north western wolf, it possess whiter coloration, narrower braincase and big carnassials. Particle swarm optimization, Genetic algorithm has been used to improve the Exploration & Exploitation ability of the algorithm by utilizes flag vector & position, velocity update properties. Proposed Arctic Wolf optimization (AWO) algorithm has been tested in standard IEEE 30 bus test system and simulation results show the projected algorithms reduced the real power loss considerably.
In this work Tundra wolf algorithm (TWA) is proposed to solve the optimal reactive power problem. In the projected Tundra wolf algorithm (TWA) in order to avoid the searching agents from trapping into the local optimal the converging towards global optimal is divided based on two different conditions. In the proposed Tundra wolf algorithm (TWA) omega tundra wolf has been taken as searching agent as an alternative of indebted to pursue the first three most excellent candidates. Escalating the searching agents’ numbers will perk up the exploration capability of the Tundra wolf wolves in an extensive range. Proposed Tundra wolf algorithm (TWA) has been tested in standard IEEE 14, 30 bus test systems and simulation results show the proposed algorithm reduced the real power loss effectively.
Two bio-inspired algorithms for solving optimal reactive power problemIJAAS Team
In this work two ground-breaking algorithms called; Sperm Motility (SM) algorithm & Wolf Optimization (WO) algorithm is used for solving reactive power problem. In sperm motility approach spontaneous movement of the sperm is imitated & species chemo attractant, sperms are enthralled in the direction of the ovum. In wolf optimization algorithm the deeds of wolf is imitated in the formulation & it has a flag vector also length is equivalent to the whole sum of numbers in the dataset the optimization. Both the projected algorithms have been tested in standard IEEE 57,118, 300 bus test systems. Simulated outcomes reveal about the reduction of real power loss & with variables are in the standard limits. Almost both algorithms solved the problem efficiently, yet wolf optimization has slight edge over the sperm motility algorithm in reducing the real power loss.
In this paper Enhanced whale Optimization Algorithm (EWO) proposed to solve the optimal reactive power problem. Whale optimization algorithm is modeled by Bubble-net hunting tactic. In the projected optimization algorithm an inertia weight ω ∈ [1, 0] has been introduced to perk up the search ability. Whales are commonly moving 10-16 meters down then through the bubbles which are created artificially then they encircle the prey and move upward towards the surface of sea. Proposed Enhanced whale optimization algorithm (EWO) is tested in standard IEEE 57 bus systems and power loss reduced considerably.
Real power loss reduction by arctic char algorithmIJAAS Team
This work presents Arctic Char Algorithm (ACA) for solving optimal reactive power problem. In North America movement of Arctic char phenomenon is one among the twelve-monthly innate actions. Deeds of Arctic char have been imitated to design the algorithm. In stochastic mode solutions are initialized with one segment on every side of to the route ascendancy; particularly in between lower bound and upper bounds. Previous to the movement, Arctic char come to a decision about the passageway based on their perception. This implies stochastic mix up of control parameters to push the Arctic char groups (preliminary solution) in mutual pathway (evolutionary operators). Projected Arctic Char Algorithm (ACA) has been tested in standard IEEE 14,300 bus test system and simulation results show the projected algorithm reduced the real power loss extensively.
α Nearness ant colony system with adaptive strategies for the traveling sales...ijfcstjournal
On account of ant colony algorithm easy to fall into local optimum, this paper presents an improved ant
colony optimization called α-AACS and reports its performance. At first, we provide an concise description
of the original ant colony system(ACS) and introduce α-nearness based on the minimum 1-tree for ACS’s
disadvantage, which better reflects the chances of a given link being a member of an optimal tour. Then, we
improve α-nearness by computing a lower bound and propose other adaptations for ACS. Finally, we
conduct a fair competition between our algorithm and others. The results clearly show that α-AACS has a
better global searching ability in finding the best solutions, which indicates that α-AACS is an effective
approach for solving the traveling salesman problem.
Optimal Load Dispatch Using Ant Lion OptimizationIJERA Editor
This paper presents Ant lion optimization (ALO) technique to solve optimal load dispatch problem. Ant lion
optimization (ALO) is a novel nature inspired algorithm. The ALO algorithm mimics the hunting mechanism of
ant lions in nature. Five main steps of hunting prey such as the random walk of ants, building traps, entrapment of
ants in traps, catching preys, and re-building traps are implemented. Optimal load dispatch (OLD) is a method of
determining the most efficient, low-cost and reliable operation of a power system by dispatching available
electricity generation resources to supply load on the system. The primary objective of OLD is to minimize total
cost of generation while honoring operational constraints of available generation resources. The proposed
technique is implemented on 3, 6 & 20 unit test system for solving the OLD. Numerical results shows that the
proposed method has good convergence property and better in quality of solution than other algorithms reported
in recent literature.
Simulation of the movement behavior of Leopardus guigna using random walkersmathsjournal
Scarcity of information regarding the natural history of Leopardus guigna, an endangered felid native to Chile
and western Argentina, hampers the successful implementation of conservation strategies. Very little is known
about the movement behavior of L. guigna and home range estimates rest on less than a handful of radiotracking
studies. Due to the difficulties inherent in any study requiring the live capture of protected species, we suggest
a mathematical approach to the modeling of territories occupied by individual guignas. Our approach is based
on the hypothesis that L. guigna maintains a sedentary behavior in a specific area of a given territory, whereby
starting points can be derived from point observations. In this context, the present article shows a way to simulate
a distribution of points in a territory using random walkers to emulate field data as could be obtained by means of
telemetry. Our model allows for an estimation of mean distances covered by individual cats from a fixed starting
point and thus enables the prediction of interactions with known threats to the species, such as motor vehicles,
free-roaming dogs, and people. The knowledge gained in this process can be of much help when defining the
boundaries of protected areas and, more generally, in the planning of infrastructure, rural and urban development
This paper projects Gryllidae Optimization Algorithm (GOA) has been applied to solve optimal reactive power problem. Proposed GOA approach is based on the chirping characteristics of Gryllidae. In common, male Gryllidae chirp, on the other hand some female Gryllidae also do as well. Male Gryllidae draw the females by this sound which they produce. Moreover, they caution the other Gryllidae against dangers with this sound. The hearing organs of the Gryllidae are housed in an expansion of their forelegs. Through this, they bias to the produced fluttering sounds. Proposed Gryllidae Optimization Algorithm (GOA) has been tested in standard IEEE 14, 30 bus test systems and simulation results show that the projected algorithms reduced the real power loss considerably.
In this work Tundra wolf algorithm (TWA) is proposed to solve the optimal reactive power problem. In the projected Tundra wolf algorithm (TWA) in order to avoid the searching agents from trapping into the local optimal the converging towards global optimal is divided based on two different conditions. In the proposed Tundra wolf algorithm (TWA) omega tundra wolf has been taken as searching agent as an alternative of indebted to pursue the first three most excellent candidates. Escalating the searching agents’ numbers will perk up the exploration capability of the Tundra wolf wolves in an extensive range. Proposed Tundra wolf algorithm (TWA) has been tested in standard IEEE 14, 30 bus test systems and simulation results show the proposed algorithm reduced the real power loss effectively.
Two bio-inspired algorithms for solving optimal reactive power problemIJAAS Team
In this work two ground-breaking algorithms called; Sperm Motility (SM) algorithm & Wolf Optimization (WO) algorithm is used for solving reactive power problem. In sperm motility approach spontaneous movement of the sperm is imitated & species chemo attractant, sperms are enthralled in the direction of the ovum. In wolf optimization algorithm the deeds of wolf is imitated in the formulation & it has a flag vector also length is equivalent to the whole sum of numbers in the dataset the optimization. Both the projected algorithms have been tested in standard IEEE 57,118, 300 bus test systems. Simulated outcomes reveal about the reduction of real power loss & with variables are in the standard limits. Almost both algorithms solved the problem efficiently, yet wolf optimization has slight edge over the sperm motility algorithm in reducing the real power loss.
In this paper Enhanced whale Optimization Algorithm (EWO) proposed to solve the optimal reactive power problem. Whale optimization algorithm is modeled by Bubble-net hunting tactic. In the projected optimization algorithm an inertia weight ω ∈ [1, 0] has been introduced to perk up the search ability. Whales are commonly moving 10-16 meters down then through the bubbles which are created artificially then they encircle the prey and move upward towards the surface of sea. Proposed Enhanced whale optimization algorithm (EWO) is tested in standard IEEE 57 bus systems and power loss reduced considerably.
Real power loss reduction by arctic char algorithmIJAAS Team
This work presents Arctic Char Algorithm (ACA) for solving optimal reactive power problem. In North America movement of Arctic char phenomenon is one among the twelve-monthly innate actions. Deeds of Arctic char have been imitated to design the algorithm. In stochastic mode solutions are initialized with one segment on every side of to the route ascendancy; particularly in between lower bound and upper bounds. Previous to the movement, Arctic char come to a decision about the passageway based on their perception. This implies stochastic mix up of control parameters to push the Arctic char groups (preliminary solution) in mutual pathway (evolutionary operators). Projected Arctic Char Algorithm (ACA) has been tested in standard IEEE 14,300 bus test system and simulation results show the projected algorithm reduced the real power loss extensively.
α Nearness ant colony system with adaptive strategies for the traveling sales...ijfcstjournal
On account of ant colony algorithm easy to fall into local optimum, this paper presents an improved ant
colony optimization called α-AACS and reports its performance. At first, we provide an concise description
of the original ant colony system(ACS) and introduce α-nearness based on the minimum 1-tree for ACS’s
disadvantage, which better reflects the chances of a given link being a member of an optimal tour. Then, we
improve α-nearness by computing a lower bound and propose other adaptations for ACS. Finally, we
conduct a fair competition between our algorithm and others. The results clearly show that α-AACS has a
better global searching ability in finding the best solutions, which indicates that α-AACS is an effective
approach for solving the traveling salesman problem.
Optimal Load Dispatch Using Ant Lion OptimizationIJERA Editor
This paper presents Ant lion optimization (ALO) technique to solve optimal load dispatch problem. Ant lion
optimization (ALO) is a novel nature inspired algorithm. The ALO algorithm mimics the hunting mechanism of
ant lions in nature. Five main steps of hunting prey such as the random walk of ants, building traps, entrapment of
ants in traps, catching preys, and re-building traps are implemented. Optimal load dispatch (OLD) is a method of
determining the most efficient, low-cost and reliable operation of a power system by dispatching available
electricity generation resources to supply load on the system. The primary objective of OLD is to minimize total
cost of generation while honoring operational constraints of available generation resources. The proposed
technique is implemented on 3, 6 & 20 unit test system for solving the OLD. Numerical results shows that the
proposed method has good convergence property and better in quality of solution than other algorithms reported
in recent literature.
Simulation of the movement behavior of Leopardus guigna using random walkersmathsjournal
Scarcity of information regarding the natural history of Leopardus guigna, an endangered felid native to Chile
and western Argentina, hampers the successful implementation of conservation strategies. Very little is known
about the movement behavior of L. guigna and home range estimates rest on less than a handful of radiotracking
studies. Due to the difficulties inherent in any study requiring the live capture of protected species, we suggest
a mathematical approach to the modeling of territories occupied by individual guignas. Our approach is based
on the hypothesis that L. guigna maintains a sedentary behavior in a specific area of a given territory, whereby
starting points can be derived from point observations. In this context, the present article shows a way to simulate
a distribution of points in a territory using random walkers to emulate field data as could be obtained by means of
telemetry. Our model allows for an estimation of mean distances covered by individual cats from a fixed starting
point and thus enables the prediction of interactions with known threats to the species, such as motor vehicles,
free-roaming dogs, and people. The knowledge gained in this process can be of much help when defining the
boundaries of protected areas and, more generally, in the planning of infrastructure, rural and urban development
This paper projects Gryllidae Optimization Algorithm (GOA) has been applied to solve optimal reactive power problem. Proposed GOA approach is based on the chirping characteristics of Gryllidae. In common, male Gryllidae chirp, on the other hand some female Gryllidae also do as well. Male Gryllidae draw the females by this sound which they produce. Moreover, they caution the other Gryllidae against dangers with this sound. The hearing organs of the Gryllidae are housed in an expansion of their forelegs. Through this, they bias to the produced fluttering sounds. Proposed Gryllidae Optimization Algorithm (GOA) has been tested in standard IEEE 14, 30 bus test systems and simulation results show that the projected algorithms reduced the real power loss considerably.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Improved Spider Algorithm for Solving Optimal Reactive Power Dispatch Problempaperpublications3
Abstract: In this paperimproved spider algorithm (ISA) is projected to solve the optimal reactive power dispatch (ORPD) Problem. Stimulated by the societal spiders, we suggest a new Improved Spider Algorithm (ISA) to solve ORPD problem. The structure is chiefly based on the foraging approach of social spiders, which make use of the vibrations spread over the spider web to decide the position of preys. The simulation results demonstrate high-quality performance of ISA in solving an optimal reactive power dispatch problem. The projected algorithm has been tested on IEEE 30 bus system and compared to other specified algorithms. Results show that ISA is more efficient than other algorithms to reduce the real power loss and to enhance the voltage profile index.
Keywords: spider algorithm, swarm intelligence, evolutionary computation, optimal reactive power, Transmission loss.
Improved Spider Algorithm for Solving Optimal Reactive Power Dispatch Problempaperpublications3
Abstract: In this paperimproved spider algorithm (ISA) is projected to solve the optimal reactive power dispatch (ORPD) Problem. Stimulated by the societal spiders, we suggest a new Improved Spider Algorithm (ISA) to solve ORPD problem. The structure is chiefly based on the foraging approach of social spiders, which make use of the vibrations spread over the spider web to decide the position of preys. The simulation results demonstrate high-quality performance of ISA in solving an optimal reactive power dispatch problem. The projected algorithm has been tested on IEEE 30 bus system and compared to other specified algorithms. Results show that ISA is more efficient than other algorithms to reduce the real power loss and to enhance the voltage profile index.
Cuckoo Search Algorithm: An IntroductionXin-She Yang
This presentation explains the fundamental ideas of the standard Cuckoo Search (CS) algorithm, which also contains the links to the free Matlab codes at Mathswork file exchanges and the animations of numerical simulations (video at Youtube). An example of multi-objective cuckoo search (MOCS) is also given with link to the Matlab code.
Embellished Particle Swarm Optimization Algorithm for Solving Reactive Power ...ijeei-iaes
This paper proposes Embellished Particle Swarm Optimization (EPSO) algorithm for solving reactive power problem .The main concept of Embellished Particle Swarm Optimization is to extend the single population PSO to the interacting multi-swarm model. Through this multi-swarm cooperative approach, diversity in the whole swarm community can be upheld. Concurrently, the swarm-to-swarm mechanism drastically speeds up the swarm community to converge to the global near optimum. In order to evaluate the performance of the proposed algorithm, it has been tested in standard IEEE 57,118 bus systems and results show that Embellished Particle Swarm Optimization (EPSO) is more efficient in reducing the Real power losses when compared to other standard reported algorithms.
Chaotic based Pteropus algorithm for solving optimal reactive power problemIJAAS Team
In this work, a Chaotic based Pteropus algorithm (CPA) has been proposed for solving optimal reactive power problem. Pteropus algorithm imitates deeds of the Pteropus. Normally Pteropus while flying it avoid obstacles by using sonar echoes, particularly utilize time delay. To the original Pteropus algorithm chaotic disturbance has been applied and the optimal capability of the algorithm has been improved in search of global solution. In order to augment the population diversity and prevent early convergence, adaptively chaotic disturbance is added at the time of stagnation. Furthermore, exploration and exploitation capability of the proposed algorithm has been improved. Proposed CPA technique has been tested in standard IEEE 14,300 bus systems & real power loss has been considerably reduced.
In this paper, Mine Blast Algorithm (MBA) has been intermingled with Harmony Search (HS) algorithm for solving optimal reactive power dispatch problem. MBA is based on explosion of landmines and HS is based on Creativeness progression of musicians-both are hybridized to solve the problem. In MBA Initial distance of shrapnel pieces are reduced gradually to allow the mine bombs search the probable global minimum location in order to amplify the global explore capability. Harmony search (HS) imitates the music creativity process where the musicians supervise their instruments’ pitch by searching for a best state of harmony. Hybridization of Mine Blast Algorithm with Harmony Search algorithm (MH) improves the search effectively in the solution space. Mine blast algorithm improves the exploration and harmony search algorithm augments the exploitation. At first the proposed algorithm starts with exploration & gradually it moves to the phase of exploitation. Proposed Hybridized Mine Blast Algorithm with Harmony Search algorithm (MH) has been tested on standard IEEE 14, 300 bus test systems. Real power loss has been reduced considerably by the proposed algorithm. Then Hybridized Mine Blast Algorithm with Harmony Search algorithm (MH) tested in IEEE 30, bus system (with considering voltage stability index)- real power loss minimization, voltage deviation minimization, and voltage stability index enhancement has been attained.
Passerine swarm optimization algorithm for solving optimal reactive power dis...IJAAS Team
This paper presents Passerine Swarm Optimization Algorithm (PSOA) for solving optimal reactive power dispatch problem. This algorithm is based on behaviour of social communications of Passerine bird. Basically, Passerine bird has three common behaviours: search behaviour, adherence behaviour and expedition behaviour. Through the shared communications Passerine bird will search for the food and also run away from hunters. By using the Passerine bird communications and behaviour, five basic rules have been created in the PSOA approach to solve the optimal reactive power dispatch problem. Key aspect is to reduce the real power loss and also to keep the variables within the limits. Proposed Passerine Swarm Optimization Algorithm (PSOA) has been tested in standard IEEE 30 bus test system and simulations results reveal about the better performance of the proposed algorithm in reducing the real power loss and enhancing the static voltage stability margin.
This report exposed the computational process of ltering a noisy three-dimensional ultra-sound using Fourier Transform to locate an object. The resolution of this localisation problemwas done in three steps. The rst one was nding the object position in the frequency do-main.The second step was to lter the data or precisely centered the data frequencies aroundthe object frequency. Finally, the last step was to translate the ltered frequencies into thespatial domain and locate the object.
This research paper demonstrates the invention of the kinetic bands, based on Romanian mathematician and statistician Octav Onicescu’s kinetic energy, also known as “informational energy”, where we use historical data of foreign exchange currencies or indexes to predict the trend displayed by a stock or an index and whether it will go up or down in the future. Here, we explore the imperfections of the Bollinger Bands to determine a more sophisticated triplet of indicators that predict the future movement of prices in the Stock Market. An Extreme Gradient Boosting Modelling was conducted in Python using historical data set from Kaggle, the historical data set spanning all current 500 companies listed. An invariable importance feature was plotted. The results displayed that Kinetic Bands, derived from (KE) are very influential as features or technical indicators of stock market trends. Furthermore, experiments done through this invention provide tangible evidence of the empirical aspects of it. The machine learning code has low chances of error if all the proper procedures and coding are in play. The experiment samples are attached to this study for future references or scrutiny.
In our homes or offices, security has been a vital issue. Control of home security system remotely always offers huge advantages like the arming or disarming of the alarms, video monitoring, and energy management control apart from safeguarding the home free up intruders. Considering the oldest simple methods of security that is the mechanical lock system that has a key as the authentication element, then an upgrade to a universal type, and now unique codes for the lock. The recent advancement in the communication system has brought the tremendous application of communication gadgets into our various areas of life. This work is a real-time smart doorbell notification system for home Security as opposes of the traditional security methods, it is composed of the doorbell interfaced with GSM Module, a GSM module would be triggered to send an SMS to the house owner by pressing the doorbell, the owner will respond to the guest by pressing a button to open the door, otherwise, a message would be displayed to the guest for appropriate action. Then, the keypad is provided for an authorized person for the provision of password for door unlocking, if multiple wrong password attempts were made to unlock, a message of burglary attempt would be sent to the house owner for prompt action. The main benefit of this system is the uniqueness of the incorporation of the password and messaging systems which denies access to any unauthorized personality and owner's awareness method.
Augmented reality, the new age technology, has widespread applications in every field imaginable. This technology has proven to be an inflection point in numerous verticals, improving lives and improving performance. In this paper, we explore the various possible applications of Augmented Reality (AR) in the field of Medicine. The objective of using AR in medicine or generally in any field is the fact that, AR helps in motivating the user, making sessions interactive and assist in faster learning. In this paper, we discuss about the applicability of AR in the field of medical diagnosis. Augmented reality technology reinforces remote collaboration, allowing doctors to diagnose patients from a different locality. Additionally, we believe that a much more pronounced effect can be achieved by bringing together the cutting edge technology of AR and the lifesaving field of Medical sciences. AR is a mechanism that could be applied in the learning process too. Similarly, virtual reality could be used in the field where more of practical experience is needed such as driving, sports, neonatal care training.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Improved Spider Algorithm for Solving Optimal Reactive Power Dispatch Problempaperpublications3
Abstract: In this paperimproved spider algorithm (ISA) is projected to solve the optimal reactive power dispatch (ORPD) Problem. Stimulated by the societal spiders, we suggest a new Improved Spider Algorithm (ISA) to solve ORPD problem. The structure is chiefly based on the foraging approach of social spiders, which make use of the vibrations spread over the spider web to decide the position of preys. The simulation results demonstrate high-quality performance of ISA in solving an optimal reactive power dispatch problem. The projected algorithm has been tested on IEEE 30 bus system and compared to other specified algorithms. Results show that ISA is more efficient than other algorithms to reduce the real power loss and to enhance the voltage profile index.
Keywords: spider algorithm, swarm intelligence, evolutionary computation, optimal reactive power, Transmission loss.
Improved Spider Algorithm for Solving Optimal Reactive Power Dispatch Problempaperpublications3
Abstract: In this paperimproved spider algorithm (ISA) is projected to solve the optimal reactive power dispatch (ORPD) Problem. Stimulated by the societal spiders, we suggest a new Improved Spider Algorithm (ISA) to solve ORPD problem. The structure is chiefly based on the foraging approach of social spiders, which make use of the vibrations spread over the spider web to decide the position of preys. The simulation results demonstrate high-quality performance of ISA in solving an optimal reactive power dispatch problem. The projected algorithm has been tested on IEEE 30 bus system and compared to other specified algorithms. Results show that ISA is more efficient than other algorithms to reduce the real power loss and to enhance the voltage profile index.
Cuckoo Search Algorithm: An IntroductionXin-She Yang
This presentation explains the fundamental ideas of the standard Cuckoo Search (CS) algorithm, which also contains the links to the free Matlab codes at Mathswork file exchanges and the animations of numerical simulations (video at Youtube). An example of multi-objective cuckoo search (MOCS) is also given with link to the Matlab code.
Embellished Particle Swarm Optimization Algorithm for Solving Reactive Power ...ijeei-iaes
This paper proposes Embellished Particle Swarm Optimization (EPSO) algorithm for solving reactive power problem .The main concept of Embellished Particle Swarm Optimization is to extend the single population PSO to the interacting multi-swarm model. Through this multi-swarm cooperative approach, diversity in the whole swarm community can be upheld. Concurrently, the swarm-to-swarm mechanism drastically speeds up the swarm community to converge to the global near optimum. In order to evaluate the performance of the proposed algorithm, it has been tested in standard IEEE 57,118 bus systems and results show that Embellished Particle Swarm Optimization (EPSO) is more efficient in reducing the Real power losses when compared to other standard reported algorithms.
Chaotic based Pteropus algorithm for solving optimal reactive power problemIJAAS Team
In this work, a Chaotic based Pteropus algorithm (CPA) has been proposed for solving optimal reactive power problem. Pteropus algorithm imitates deeds of the Pteropus. Normally Pteropus while flying it avoid obstacles by using sonar echoes, particularly utilize time delay. To the original Pteropus algorithm chaotic disturbance has been applied and the optimal capability of the algorithm has been improved in search of global solution. In order to augment the population diversity and prevent early convergence, adaptively chaotic disturbance is added at the time of stagnation. Furthermore, exploration and exploitation capability of the proposed algorithm has been improved. Proposed CPA technique has been tested in standard IEEE 14,300 bus systems & real power loss has been considerably reduced.
In this paper, Mine Blast Algorithm (MBA) has been intermingled with Harmony Search (HS) algorithm for solving optimal reactive power dispatch problem. MBA is based on explosion of landmines and HS is based on Creativeness progression of musicians-both are hybridized to solve the problem. In MBA Initial distance of shrapnel pieces are reduced gradually to allow the mine bombs search the probable global minimum location in order to amplify the global explore capability. Harmony search (HS) imitates the music creativity process where the musicians supervise their instruments’ pitch by searching for a best state of harmony. Hybridization of Mine Blast Algorithm with Harmony Search algorithm (MH) improves the search effectively in the solution space. Mine blast algorithm improves the exploration and harmony search algorithm augments the exploitation. At first the proposed algorithm starts with exploration & gradually it moves to the phase of exploitation. Proposed Hybridized Mine Blast Algorithm with Harmony Search algorithm (MH) has been tested on standard IEEE 14, 300 bus test systems. Real power loss has been reduced considerably by the proposed algorithm. Then Hybridized Mine Blast Algorithm with Harmony Search algorithm (MH) tested in IEEE 30, bus system (with considering voltage stability index)- real power loss minimization, voltage deviation minimization, and voltage stability index enhancement has been attained.
Passerine swarm optimization algorithm for solving optimal reactive power dis...IJAAS Team
This paper presents Passerine Swarm Optimization Algorithm (PSOA) for solving optimal reactive power dispatch problem. This algorithm is based on behaviour of social communications of Passerine bird. Basically, Passerine bird has three common behaviours: search behaviour, adherence behaviour and expedition behaviour. Through the shared communications Passerine bird will search for the food and also run away from hunters. By using the Passerine bird communications and behaviour, five basic rules have been created in the PSOA approach to solve the optimal reactive power dispatch problem. Key aspect is to reduce the real power loss and also to keep the variables within the limits. Proposed Passerine Swarm Optimization Algorithm (PSOA) has been tested in standard IEEE 30 bus test system and simulations results reveal about the better performance of the proposed algorithm in reducing the real power loss and enhancing the static voltage stability margin.
This report exposed the computational process of ltering a noisy three-dimensional ultra-sound using Fourier Transform to locate an object. The resolution of this localisation problemwas done in three steps. The rst one was nding the object position in the frequency do-main.The second step was to lter the data or precisely centered the data frequencies aroundthe object frequency. Finally, the last step was to translate the ltered frequencies into thespatial domain and locate the object.
This research paper demonstrates the invention of the kinetic bands, based on Romanian mathematician and statistician Octav Onicescu’s kinetic energy, also known as “informational energy”, where we use historical data of foreign exchange currencies or indexes to predict the trend displayed by a stock or an index and whether it will go up or down in the future. Here, we explore the imperfections of the Bollinger Bands to determine a more sophisticated triplet of indicators that predict the future movement of prices in the Stock Market. An Extreme Gradient Boosting Modelling was conducted in Python using historical data set from Kaggle, the historical data set spanning all current 500 companies listed. An invariable importance feature was plotted. The results displayed that Kinetic Bands, derived from (KE) are very influential as features or technical indicators of stock market trends. Furthermore, experiments done through this invention provide tangible evidence of the empirical aspects of it. The machine learning code has low chances of error if all the proper procedures and coding are in play. The experiment samples are attached to this study for future references or scrutiny.
In our homes or offices, security has been a vital issue. Control of home security system remotely always offers huge advantages like the arming or disarming of the alarms, video monitoring, and energy management control apart from safeguarding the home free up intruders. Considering the oldest simple methods of security that is the mechanical lock system that has a key as the authentication element, then an upgrade to a universal type, and now unique codes for the lock. The recent advancement in the communication system has brought the tremendous application of communication gadgets into our various areas of life. This work is a real-time smart doorbell notification system for home Security as opposes of the traditional security methods, it is composed of the doorbell interfaced with GSM Module, a GSM module would be triggered to send an SMS to the house owner by pressing the doorbell, the owner will respond to the guest by pressing a button to open the door, otherwise, a message would be displayed to the guest for appropriate action. Then, the keypad is provided for an authorized person for the provision of password for door unlocking, if multiple wrong password attempts were made to unlock, a message of burglary attempt would be sent to the house owner for prompt action. The main benefit of this system is the uniqueness of the incorporation of the password and messaging systems which denies access to any unauthorized personality and owner's awareness method.
Augmented reality, the new age technology, has widespread applications in every field imaginable. This technology has proven to be an inflection point in numerous verticals, improving lives and improving performance. In this paper, we explore the various possible applications of Augmented Reality (AR) in the field of Medicine. The objective of using AR in medicine or generally in any field is the fact that, AR helps in motivating the user, making sessions interactive and assist in faster learning. In this paper, we discuss about the applicability of AR in the field of medical diagnosis. Augmented reality technology reinforces remote collaboration, allowing doctors to diagnose patients from a different locality. Additionally, we believe that a much more pronounced effect can be achieved by bringing together the cutting edge technology of AR and the lifesaving field of Medical sciences. AR is a mechanism that could be applied in the learning process too. Similarly, virtual reality could be used in the field where more of practical experience is needed such as driving, sports, neonatal care training.
Image fusion is a sub field of image processing in which more than one images are fused to create an image where all the objects are in focus. The process of image fusion is performed for multi-sensor and multi-focus images of the same scene. Multi-sensor images of the same scene are captured by different sensors whereas multi-focus images are captured by the same sensor. In multi-focus images, the objects in the scene which are closer to the camera are in focus and the farther objects get blurred. Contrary to it, when the farther objects are focused then closer objects get blurred in the image. To achieve an image where all the objects are in focus, the process of images fusion is performed either in spatial domain or in transformed domain. In recent times, the applications of image processing have grown immensely. Usually due to limited depth of field of optical lenses especially with greater focal length, it becomes impossible to obtain an image where all the objects are in focus. Thus, it plays an important role to perform other tasks of image processing such as image segmentation, edge detection, stereo matching and image enhancement. Hence, a novel feature-level multi-focus image fusion technique has been proposed which fuses multi-focus images. Thus, the results of extensive experimentation performed to highlight the efficiency and utility of the proposed technique is presented. The proposed work further explores comparison between fuzzy based image fusion and neuro fuzzy fusion technique along with quality evaluation indices.
Graphs have become the dominant life-form of many tasks as they advance a
structure to represent many tasks and the corresponding relations. A powerful
role of networks/graphs is to bridge local feats that exist in vertices as they
blossom into patterns that help explain how nodal relations and their edges
impacts a complex effect that ripple via a graph. User cluster are formed as a
result of interactions between entities. Many users can hardly categorize their
contact into groups today such as “family”, “friends”, “colleagues” etc. Thus,
the need to analyze such user social graph via implicit clusters, enables the
dynamism in contact management. Study seeks to implement this dynamism
via a comparative study of deep neural network and friend suggest algorithm.
We analyze a user’s implicit social graph and seek to automatically create
custom contact groups using metrics that classify such contacts based on a
user’s affinity to contacts. Experimental results demonstrate the importance
of both the implicit group relationships and the interaction-based affinity in
suggesting friends.
In the wake of the sudden replacement of wood and kerosene by gas cookers for several purposes in Nigeria, gas leakage has caused several damages in our homes, Laboratories among others. installation of a gas leakage detection device was globally inspired to eliminate accidents related to gas leakage. We present an alternative approach to developing a device that can automatically detect and control gas leakages and also monitor temperature. The system detects the leakage of the LPG (Liquefied Petroleum Gas) using a gas sensor, then triggred the control system response which employs ventilator system, Mobile phone alert and alarm when the LPG concentration in the air exceeds a certain level. The performance of two gas sensors (MQ5 and MQ6) were tested for a guided decision. Also, when the temperature of the environment poses a danger, LED (indicator), buzzer and LCD (16x2) display was used to indicate temperature and gas leakage status in degree Celsius and PPM respectively. Attension was given to the response time of the control system, which was ascertained that this system significantly increases the chances and efficiency of eliminating gas leakage related accident.
Feature selection problem is one of the main important problems in the text and data mining domain. This paper presents a comparative study of feature selection methods for Arabic text classification. Five of the feature selection methods were selected: ICHI square, CHI square, Information Gain, Mutual Information and Wrapper. It was tested with five classification algorithms: Bayes Net, Naive Bayes, Random Forest, Decision Tree and Artificial Neural Networks. In addition, Data Collection was used in Arabic consisting of 9055 documents, which were compared by four criteria: Precision, Recall, F-measure and Time to build model. The results showed that the improved ICHI feature selection got almost all the best results in comparison with other methods.
In this paper Gentoo Penguin Algorithm (GPA) is proposed to solve optimal reactive power problem. Gentoo Penguins preliminary population possesses heat radiation and magnetizes each other by absorption coefficient. Gentoo Penguins will move towards further penguins which possesses low cost (elevated heat concentration) of absorption. Cost is defined by the heat concentration, distance. Gentoo Penguins penguin attraction value is calculated by the amount of heat prevailed between two Gentoo penguins. Gentoo Penguins heat radiation is measured as linear. Less heat is received in longer distance, in little distance, huge heat is received. Gentoo Penguin Algorithm has been tested in standard IEEE 57 bus test system and simulation results show the projected algorithm reduced the real power loss considerably.
08 20272 academic insight on applicationIAESIJEECS
This research has thrown up many questions in need of further investigation.There was an expressive quantitative-qualitative research, which a common investigation form was used in.The dialogue item was also applied to discover if the contributors asserted the media-based attitude supplements their learning of academic English writing classes or not.Data recounted academic” insights toward using Skype as a sustaining implement for lessons releasing based on chosen variables: their occupation, year of education, and knowledge with Skype discovered that there were no important statistical differences in the use of Skype units because of medical academics major knowledge. There are statistically important differences in using Skype units. The findings also, disclosed that there are statistically significant differences in using Skype units due to the practice with Skype variable, in favors of academics with no Skype use practice. Skype instrument as an instructive media is a positive medium to be employed to supply academic medical writing data and assist education. Academics who do not have enough time to contribute in classes believe comfortable using the Skype-based attitude in scientific writing. They who took part in the course claimed that their approval of this media is due to learning academic innovative medical writing.
Cloud computing has sweeping impact on the human productivity. Today it’s used for Computing, Storage, Predictions and Intelligent Decision Making, among others. Intelligent Decision-Making using Machine Learning has pushed for the Cloud Services to be even more fast, robust and accurate. Security remains one of the major concerns which affect the cloud computing growth however there exist various research challenges in cloud computing adoption such as lack of well managed service level agreement (SLA), frequent disconnections, resource scarcity, interoperability, privacy, and reliability. Tremendous amount of work still needs to be done to explore the security challenges arising due to widespread usage of cloud deployment using Containers. We also discuss Impact of Cloud Computing and Cloud Standards. Hence in this research paper, a detailed survey of cloud computing, concepts, architectural principles, key services, and implementation, design and deployment challenges of cloud computing are discussed in detail and important future research directions in the era of Machine Learning and Data Science have been identified.
Notary is an official authorized to make an authentic deed regarding all deeds, agreements and stipulations required by a general rule. Activities carried out at the notary office such as recording client data and file data still use traditional systems that tend to be manual. The problem that occurs is the inefficiency in data processing and providing information to clients. Clients have difficulty getting information related to the progress of documents that are being taken care of at the notary's office. The client must take the time to arrive to the notary's office repeatedly to check the progress of the work of the document file. The purpose of this study is to facilitate clients in obtaining information about the progress of the work in progress, and make it easier for employees to process incoming documents by implementing an administrative system. This system was developed with the waterfall system development method and uses the Multi-Channel Access Technology integrated in the website to simplify the process of delivering information and requesting information from clients and to clients with Telegram and SMS Gateway. Clients will come to the office only when there is a notification from the system via Telegram or SMS notifying that the client must come directly to the notary's office, thus leading to an efficient time and avoiding excessive transportation costs. The overall functional system can function properly based on the results of alpha testing. The results of beta testing conducted by distributing the system feasibility test questionnaire to end users, get a percentage of 96% of users agree the system is feasible to be implemented.
In this work Predestination of Particles Wavering Search (PPS) algorithm has been applied to solve optimal reactive power problem. PPS algorithm has been modeled based on the motion of the particles in the exploration space. Normally the movement of the particle is based on gradient and swarming motion. Particles are permitted to progress in steady velocity in gradient-based progress, but when the outcome is poor when compared to previous upshot, immediately particle rapidity will be upturned with semi of the magnitude and it will help to reach local optimal solution and it is expressed as wavering movement. In standard IEEE 14, 30, 57,118,300 bus systems Proposed Predestination of Particles Wavering Search (PPS) algorithm is evaluated and simulation results show the PPS reduced the power loss efficiently.
Artificial Neural Networks have proved their efficiency in a large number of research domains. In this paper, we have applied Artificial Neural Networks on Arabic text to prove correct language modeling, text generation, and missing text prediction. In one hand, we have adapted Recurrent Neural Networks architectures to model Arabic language in order to generate correct Arabic sequences. In the other hand, Convolutional Neural Networks have been parameterized, basing on some specific features of Arabic, to predict missing text in Arabic documents. We have demonstrated the power of our adapted models in generating and predicting correct Arabic text comparing to the standard model. The model had been trained and tested on known free Arabic datasets. Results have been promising with sufficient accuracy.
In the present-day communications speech signals get contaminated due to
various sorts of noises that degrade the speech quality and adversely impacts
speech recognition performance. To overcome these issues, a novel approach
for speech enhancement using Modified Wiener filtering is developed and
power spectrum computation is applied for degraded signal to obtain the
noise characteristics from a noisy spectrum. In next phase, MMSE technique
is applied where Gaussian distribution of each signal i.e. original and noisy
signal is analyzed. The Gaussian distribution provides spectrum estimation
and spectral coefficient parameters which can be used for probabilistic model
formulation. Moreover, a-priori-SNR computation is also incorporated for
coefficient updation and noise presence estimation which operates similar to
the conventional VAD. However, conventional VAD scheme is based on the
hard threshold which is not capable to derive satisfactory performance and a
soft-decision based threshold is developed for improving the performance of
speech enhancement. An extensive simulation study is carried out using
MATLAB simulation tool on NOIZEUS speech database and a comparative
study is presented where proposed approach is proved better in comparison
with existing technique.
Previous research work has highlighted that neuro-signals of Alzheimer’s disease patients are least complex and have low synchronization as compared to that of healthy and normal subjects. The changes in EEG signals of Alzheimer’s subjects start at early stage but are not clinically observed and detected. To detect these abnormalities, three synchrony measures and wavelet-based features have been computed and studied on experimental database. After computing these synchrony measures and wavelet features, it is observed that Phase Synchrony and Coherence based features are able to distinguish between Alzheimer’s disease patients and healthy subjects. Support Vector Machine classifier is used for classification giving 94% accuracy on experimental database used. Combining, these synchrony features and other such relevant features can yield a reliable system for diagnosing the Alzheimer’s disease.
Attenuation correction designed for PET/MR hybrid imaging frameworks along with portion making arrangements used for MR-based radiation treatment remain testing because of lacking high-energy photon weakening data. We present a new method so as to uses the learned nonlinear neighborhood descriptors also highlight coordinating toward foresee pseudo-CT pictures starting T1w along with T2w MRI information. The nonlinear neighborhood descriptors are acquired through anticipating the direct descriptors interested in the nonlinear high-dimensional space utilizing an unequivocal constituent guide also low-position guess through regulated complex regularization. The nearby neighbors of every near descriptor inside the data MR pictures are looked during an obliged spatial extent of the MR pictures among the training dataset. By that point, the pseudo-CT patches are evaluated through k-closest neighbor relapse. The planned procedure designed for pseudo-CT forecast is quantitatively broke downward on top of a dataset comprising of coordinated mind MRI along with CT pictures on or after 13 subjects.
The cognitive radio prototype performance is to alleviate the scarcity of spectral resources for wireless communication through intelligent sensing and quick resource allocation techniques. Secondary users (SU’s) actively obtain the spectrum access opportunity by supporting primary users (PU’s) in cognitive radio networks (CRNs). In present generation, spectrum access is endowed through cooperative communication-based link-level frame-based cooperative (LLC) principle. In this SUs independently act as conveyors for PUs to achieve spectrum access opportunities. Unfortunately, this LLC approach cannot fully exploit spectrum access opportunities to enhance the throughput of CRNs and fails to motivate PUs to join the spectrum sharing processes. Therefore, to overcome this con, network level cooperative (NLC) principle was used, where SUs are integrated mutually to collaborate with PUs session by session, instead of frame based cooperation for spectrum access opportunities. NLC approach has justified the challenges facing in LLC approach. In this paper we make a survey of some models that have been proposed to tackle the problem of LLC. We show the relevant aspects of each model, in order to characterize the parameters that we should take in account to achieve a spectrum access opportunity.
In this paper, the author provides insights and lessons that can be learned from colleagues at American universities about their online education experiences. The literature review and previous studies of online educations gains are explored and summarized in this research. Emerging trends in online education are discussed in detail, and strategies to implement these trends are explained. The author provides several tools and strategies that enable universities to ensure the quality of online education. At the end of this research paper, the researcher provides examples from Arab universities who have successfully implemented online education and expanded their impact on the society. This research provides a strategy and a model that can be used by universities in the Middle East as a roadmap to implement online education in their regions.
In this paper, a low pass filter based on T-Shaped resonator is presented. The T-Shaped resonator consists of meandered lines and rectangular patches. Also, the LC model and transfer function of the proposed resonator is presented. For suppression of spurious harmonics, a bandstop structure consists of hexangular patches and open stubs has been utilized. Finally, the wide stopband microstrip lowpass filter with cutoff frequency 2.72 GHz has been simulated, fabricated and measured. The LPF has good characteristics such as wide stopband and insertion loss lower than 0.18 dB in the passband region. The rejection level is less than -20 dB from 2.98 up to 21.3 GHz. The filter size is 10.5 mm×12.7 mm, or 0.131 λg× 0.158 λg, where λg is the guided wavelength. The measured and simulated results of the filter is in good agreement with each other, which show the merits of low insertion loss and wide stopband.
In this paper Enhanced Wormhole Optimizer (EWO) algorithm is used to solve optimal reactive power problem. Proposed algorithm based on the Wormholes which exploits the exploration space. Between different universes objects are exchanged through white or black hole tunnels. Regardless of the inflation rate, through wormholes objects in all universes which possess high probability will shift to the most excellent universe. In the projected Enhanced Wormhole Optimizer (EWO) algorithm in order to avoid the solution to be get trapped into the local optimal solution Levy flight has been applied. Projected Enhanced Wormhole Optimizer (EWO) algorithm has been tested in standard IEEE 14, 30, 57,118,300 bus test systems and simulation results show that the EWO algorithm reduced the real power loss efficiently.
Today’s popularity of the short messages services (SMS) has created a propitious environment for spamming to thrive. Spams are unsolicited advertising, adult-themed or inappropriate content, premium fraud, smishing and malware. They are a constant reminder of the need for an effective spam filter. However, SMS limitations of 160-charcaters and 140-bytes size as well as its being rippled with slangs, emoticons and abbreviations further inhibits effective training of models to aid accurate classification. The study proposes Genetic Algorithm Trained Bayesian Network solution that seeks to normalize noisy feats, expand text via use of lexicographic and semantic dictionaries that uses word sense disambiguation technique to train the underlying learning heuristics. And in turn, effectively help to classify SMS in spam and legitimate classes. Hybrid model comprises of text preprocessing, feature selection as well as training and classification section. Study uses a hybrid Genetic Algorithm trained Bayesian model for which the GA is used for feature selection; while, the Bayesian algorithm is used as classifier.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
2. ISSN: 2252-8776
Int J Inf & Commun Technol, Vol. 8, No. 3, Dec 2019: 111 – 116
112
voltage deviation given as follows:
F = PL + ωv × Voltage Deviation (2)
voltage deviation given by:
Voltage Deviation = ∑ |Vi − 1|
Npq
i=1 (3)
constraint (Equality)
PG = PD + PL (4)
constraints (Inequality)
Pgslack
min
≤ Pgslack ≤ Pgslack
max
(5)
Qgi
min
≤ Qgi ≤ Qgi
max
, i ∈ Ng (6)
Vi
min
≤ Vi ≤ Vi
max
, i ∈ N (7)
Ti
min
≤ Ti ≤ Ti
max
, i ∈ NT (8)
Qc
min
≤ Qc ≤ QC
max
, i ∈ NC (9)
3. ARCTIC WOLF OPTIMIZATION
Arctic Wolf optimization (AWO) mimics the deeds of Arctic Wolf in nature. The deeds of the arctic
wolf have been imitated to formulate the algorithm. During wintertime when there is absolute darkness Arctic
wolf will make the movement at temperature was as low as -53 °C (-63 °F) and mainly they prey mainly on
the muskoxen. Muskoxen are certainly their most important prey because Arctic wolf presence and
reproduction seem to be superior when muskoxen are more available than normal availability. Hunting
procedure of the arctic wolf is designed to formulate the algorithm. There are three fittest candidate solutions
(Arctic Wolf) embedded as 𝛼,𝛽 and 𝛾 to lead the population toward capable regions of the exploration space
in each iteration of Arctic Wolf optimization. 𝜑 is named for the rest of Arctic Wolf and it will assist 𝛼,𝛽 and
𝛾 to encircle, hunt, and attack prey; to find improved solutions. In order to technically imitate the encircling
deeds of Arctic wolves, the following equations are projected:
𝐻⃗⃗ = |𝐼. 𝐽 𝑃
⃗⃗⃗ (𝑡) − 𝐽(𝑡)|, (10)
𝐽(𝑡 + 1) = 𝐽 𝑃
⃗⃗⃗ (𝑡) − 𝐽. 𝐻⃗⃗ (11)
in order to scientifically imitate the hunting deeds of Arctic wolf, the following equations are projected,
𝐻 𝛼
⃗⃗⃗⃗⃗ = |𝐼1
⃗⃗ , 𝐽 𝛼
⃗⃗⃗ − 𝐽|
𝐻𝛽
⃗⃗⃗⃗⃗ = |𝐼2
⃗⃗⃗ , 𝐽 𝛽
⃗⃗⃗ − 𝐽| (12)
𝐻 𝛾
⃗⃗⃗⃗ = |𝐼3
⃗⃗⃗ , 𝐽𝛾
⃗⃗⃗ − 𝐽|
𝐽1
⃗⃗ = 𝐽 𝛼
⃗⃗⃗ − 𝐺1
⃗⃗⃗⃗ . 𝐻 𝛼
⃗⃗⃗⃗⃗
𝐽2
⃗⃗⃗ = 𝐽 𝛽
⃗⃗⃗ − 𝐽2
⃗⃗⃗ . 𝐻𝛽
⃗⃗⃗⃗⃗ (13)
𝐽3
⃗⃗⃗ = 𝐽𝛾
⃗⃗⃗ − 𝐺3
⃗⃗⃗⃗ . 𝐻 𝛾
⃗⃗⃗⃗
𝑗(𝑡 + 1) =
𝑗1⃗⃗⃗⃗ +𝐽2⃗⃗⃗⃗ +𝐽3⃗⃗⃗⃗
3
(14)
The position of an Arctic wolf is modernized and then the following equation is used to discrete the
position of the wolf;
3. Int J Inf & Commun Technol ISSN: 2252-8776
Power loss reduction by arctic wolf optimization algorithm (Kanagasabai Lenin)
113
𝑓𝑙𝑎𝑔𝑖,𝑗 = {
1 𝐽𝑖,𝑗 > 0.475
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
(15)
where i, indicates the jth position of the ith Arctic wolf, 𝑓𝑙𝑎𝑔𝑖,𝑗 is features of the Arctic wolf. The interactions
of the Arctic wolf among them is increased by,
𝜔𝑖
𝑑
= 𝑗𝑖
𝑑
+ 𝜑𝑖𝑑(𝑗 𝛼
𝑑
− 𝑧𝑖
𝑑
) + 𝜑𝑖𝑑(𝑗𝑗
𝑑
− 𝑗 𝑘
𝑑
) (16)
The confined density of the Arctic wolf is denoted by,
𝜌𝑖 = ∑ 𝑒
−(
𝑑 𝑖𝑗
𝑑𝑐
)
2
𝑗∈𝑇/{𝑖} (17)
Arctic wolf is less than “dc” when the the Arctic wolf’s distance from the ji, the greater than the
confined density of the Arctic wolf. dij symbolize the Euclidean distance between the ji , jj of Arctic wolf, φid
is a arbitrary number in [0, 1], φidis a arbitrary number in [-1,1]
“2 m” Arctic Wolf with the leading confined thickness is chosen & well-organized by density [17]
from big to little in set “R”. Afterwards, “2 m” Arctic Wolf’s, are selected to adjust to the most awful Arctic
Wolf’s and it has been placed in set “Y” with reference to the fitness values from very small to large. “X” and
“Y” intersection of sets is symbolized by “E”:
𝐸 = 𝑋 ∩ 𝑌 (18)
𝐸 = {𝑒; 𝑒𝑖 ∈ 𝑆, 𝑒𝑖 ∈ 𝑋, 𝑖 = 1,2, . . , 𝑖} (19)
Two major abolition methods are implemented. Let “V” be the store to stockpile the abolished individuals,
𝑉 = { 𝑉1, 𝑟𝑎𝑛𝑑𝑜𝑚 > 𝑒
(
𝑡
𝑡 𝑚𝑎𝑥𝑖𝑚𝑢𝑚
)
2
𝑆[1; 𝐸], 𝑜𝑡ℎ𝑒𝑟
(20)
Arbitrary numbers are engendered by the random function in the interval [0, 1]. The probability of the
establishment of 𝑟𝑎𝑛𝑑𝑜𝑚 > 𝑒
(
𝑡
𝑡 𝑚𝑎𝑥𝑖𝑚𝑢𝑚
)
2
in the primary stage is big. With the increase in iteration steps, the
probability will be reducing to lesser. The algorithm to be inclined to explore globally, and afterwards, the
algorithm is apt to explore local mode.
Positions and velocities are modernized to improve the performance of the exploration & exploitation
in the projected algorithm.
vt+1
i
= ωt. vt
i
+ cg1. Rm1 . (mt
i
− yt
i
) + cg2. Rm2. (mt
g
− yt
i
) (21)
yt+1
i
= yt
i
+ vt+1
i
(22)
The present position of particle is yt
i
& search velocity is vt
i
. Global best-found position is. mt
g
. In
uniformly distributed interval (0, 1) Rm1 & Rm2 are arbitrary numbers. Where cg1 and cg2 are scaling
parameters. ωt is the particle inertia. The variable ωt is modernized as:
ωt = (ωmax − ωmin).
(tmax−t)
tmax
+ ωmin (23)
Maximum and minimum of ωt is represented by ωmax and ωmin ; maximum number of
iterations is given by tmax.
Genetic algorithm (GA) as an adaptive optimization exploration method is based on natural selection
and genetics. In GA, a population is composed of a set of candidate solutions called chromosomes and it
includes numerous genes with binary values 0 and 1.The major steps are of GA are. (i) Initialization;
Chromosomes are arbitrarily generated. (ii) Selection; to choose parent chromosomes a roulette choosing
method is used. (iii) Crossover; to generate offspring chromosome a single point crossover method is used. (iv)
Mutation; unvarying mutation is implemented (v) Decode; Decode the mutated chromosomes as the
preliminary positions of population.
4. ISSN: 2252-8776
Int J Inf & Commun Technol, Vol. 8, No. 3, Dec 2019: 111 – 116
114
Fitness function will be calculated by,
𝐹𝑖𝑡𝑛𝑒𝑠𝑠 = 𝛼𝑇 + 𝛽
𝑀−𝐺
𝑀
(24)
Where T define the accurateness, G is the length of chosen element division, M is the sum of all
features, and 𝛼 and 𝛽 are the weight of classification and picking quality, 𝛼 ∈ [0,1] 𝑎𝑛𝑑 𝛽 = 1 − 𝛼
Initialization of the parameters
i = 1: population size; j = 1: n
When (i, j) > 0.475; (i) = 1; Else (j) = 0;
End if
End for
Calculation of the fitness functions by; 𝐹𝑖𝑡𝑛𝑒𝑠𝑠 = 𝛼𝑇 + 𝛽
𝑀−𝐺
𝑀
Primary, secondary, third maximum fitness of the Arctic wolf is designated as “𝛼”, “𝛽”, “𝛾”
While k < maximum number of iteration
For i = 1: population size
Modernize the existing position of Arctic wolf by 𝐽(𝑡 + 1) =
𝐽1⃗⃗⃗⃗ +𝐽2⃗⃗⃗⃗ +𝐽3⃗⃗⃗⃗
3
Existing wolf Arctic location has been revised periodically
End for
For i = 1: population size; For i=1:n
If (i, j) > 0.475; (j) = 1; Else; (j) = 0;
End if
End for
At irregular intervals renew the parameter values
Fitness function will be calculated by; 𝐹𝑖𝑡𝑛𝑒𝑠𝑠 = 𝛼𝑇 + 𝛽
𝑀−𝐺
𝑀
The assessment of Arctic Wolf "𝛼","𝛽" and " 𝛾" has to be revised
t=t+1;
End while
Return the best solution” 𝛼 “
End
4. SIMULATION STUDY
Proposed Arctic Wolf optimization (AWO) algorithm has been tested, in IEEE 57 Bus system [18].
Table 1 shows the constraints of control variables, Table 2 shows the limits of reactive power generators and
comparison results are presented in Table 3. Figure 1 gives the Comparison of real power loss and Figure 2
gives the Reduction of real power loss (%) with reference to base case value.
Table 1. Constraints of control variables
System Variables Minimum (PU) Maximum (PU)
IEEE
57 Bus
Generator Voltage 0.95 1.1
Transformer Tap 0.9 1.1
VAR Source 0 0.20
Table 2. Constrains of reactive power generators
System Variables Q Minimum (PU) Q Maximum (PU)
IEEE 57 Bus 1 -140 200
2 -17 50
3 -10 60
6 -8 25
8 -140 200
9 -3 9
12 -150 155
6. ISSN: 2252-8776
Int J Inf & Commun Technol, Vol. 8, No. 3, Dec 2019: 111 – 116
116
5. CONCLUSION
In this paper Arctic Wolf optimization (AWO) algorithm successfully solved the optimal reactive
power problem. (Arctic Wolf) embedded as 𝛼,𝛽 and 𝛾 to lead the population toward capable regions of the
exploration space in each iteration of Arctic Wolf optimization. 𝜑 is named for the rest of Arctic Wolf and it
will assist 𝛼,𝛽 and 𝛾 to encircle, hunt, and attack prey. .Proposed Arctic Wolf optimization (AWO) algorithm
has been tested in standard IEEE 57 bus test system and simulation results show the projected algorithms
reduced the real power loss efficiently.
REFERENCES
[1] K. Y. Lee, "Fuel-cost minimisation for both real and reactive-power dispatches," Proceedings Generation,
Transmission and Distribution Conference, vol. 131(3), pp. 85-93, 1984.
[2] N. I. Deeb, "An efficient technique for reactive power dispatch using a revised linear programming approach," Electric
Power System Research, vol. 15(2), pp. 121-134, 1998.
[3] M. R. Bjelogrlic, M. S. Calovic, B. S. Babic, "Application of newton’s optimal power flow in voltage/reactive power
control," IEEE Trans Power System, vol. 5(4), pp. 1447-1454, 1990.
[4] S. Granville, "Optimal reactive dispatch through interior point methods," IEEE Transactions on Power System,
vol. 9(1), pp. 136-146, 1994.
[5] N. Grudinin, "Reactive power optimization using successive quadratic programming method," IEEE Transactions on
Power System, vol. 13(4), pp. 1219-1225, 1998.
[6] Ng Shin Mei R., Sulaiman M.H., Mustaffa Z., Daniyal H., "Optimal reactive power dispatch solution by loss
minimization using moth-flame optimization technique," Appl. Soft Comput., vol. 59, pp. 210-222, 2017.
[7] Chen G., Liu L., Zhang Z., Huang S., "Optimal reactive power dispatch by improved GSA-based algorithm with the
novel strategies to handle constraints," Appl. Soft Comput., vol. 50, pp. 58-70, 2017.
[8] Naderi E., Narimani H., Fathi M., Narimani M. R., "A novel fuzzy adaptive configuration of particle swarm
optimization to solve large-scale optimal reactive power dispatch," Appl. Soft Comput., vol. 53, pp. 441-456, 2017.
[9] Heidari A. A., Ali Abbaspour R., Rezaee Jordehi A., "A gaussian bare-bones water cycle algorithm for optimal
reactive power dispatch in electrical power systems," Appl. Soft Comput., vol. 57, pp. 657-671, 2017.
[10] Mahaletchumi Morgan, Nor Rul Hasma Abdullah, Mohd Herwan Sulaiman, Mahfuzah Mustafa, Rosdiyana Samad,
"Benchmark studies on optimal reactive power dispatch (ORPD) based multi-objective evolutionary programming
(MOEP) using mutation based on adaptive mutation adapter (AMO) and polynomial mutation operator (PMO),"
Journal of Electrical Systems, vol. 12(1), 2016.
[11] Rebecca Ng Shin Mei, Mohd Herwan Sulaiman, Zuriani Mustaffa,"Ant lion optimizer for optimal reactive power
dispatch solution," Journal of Electrical Systems, pp. 68-74, 2016.
[12] P. Anbarasan, T. Jayabarathi, "Optimal reactive power dispatch problem solved by symbiotic organism search
algorithm," Innovations in Power and Advanced Computing Technologies, 2017.
[13] Gagliano A., Nocera F., "Analysis of the performances of electric energy storage in residential applications,"
International Journal of Heat and Technology , vol. 35(1), pp. S41-S48, 2017.
[14] Caldera M., Ungaro P., Cammarata G., Puglisi G., "Survey-based analysis of the electrical energy demand in Italian
households," Mathematical Modelling of Engineering Problems, vol. 5(3), pp. 217-224, 2018.
[15] M. Basu, "Quasi-oppositional differential evolution for optimal reactive power dispatch," Electrical Power and
Energy Systems, vol. 78, pp. 29-40, 2016.
[16] X. S. Yang, "Bat algorithm for multi-objective optimization," International Journal of Bio-Inspired Computation,
vol. 3(5), pp. 267-274, 2011.
[17] Y. W. Yamany, E. Emary and A. E. Hassanien, "Wolf search algorithm for attribute reduction in classification,"
Computational Intelligence and Data Mining (CIDM), 2014 IEEE Symposium, IEEE, pp. 351-358, 2014.
[18] IEEE, "The IEEE-test systems," 1993. http://www.ee.washington.edu/trsearch/pstca/
[19] Ali Nasser Hussain, Ali Abdulabbas Abdullah and Omar Muhammed Neda, "Modified particle swarm optimization
for solution of reactive power dispatch," Research Journal of Applied Sciences, Engineering and Technology,
vol. 15(8), pp. 316-327, 2018.