SlideShare a Scribd company logo
1 of 10
Download to read offline
Arid Zone Journal of Engineering, Technology and Environment. August, 2010; Vol.7, 24 -33
Copyright© Faculty of Engineering, University of Maiduguri, Nigeria.
Print ISSN: 1596-2490, Electronic ISSN: 2545-5818
www.azojete.com.ng
K-NODE SET RELIABILITY OPTIMIZATION OF A DISTRIBUTED
COMPUTING SYSTEM USING PARTICLE SWARM ALGORITHM
Bakare, G.A.,1
Chiroma, I.N. 2
and Ibrahim, A.A.3
Abstract
A discrete Particle Swarm algorithm is proposed to solve a typical combinatorial optimization problem: K-Node
Set Reliability (KNR) optimization of a distributed computing system (DCS) which is a well-known NP-hard
problem is presented in this paper. The reliability of a subset of network nodes of a DCS is determined such that
the reliability is maximized and specified capacity constraint is satisfied. The proposed algorithm is
demonstrated on an 8 node 11 link DCS topology. The test results show that the proposed algorithm can achieve
good solution quality and convergence characteristics.
1. Introduction
Advances in computer networks and low cost computing elements have led to increasing
interest in Distributed Computing System (DCS). Among the numerous merits of using a DCS
include more effective resource sharing, better fault tolerance, and higher reliability. In
designing such systems, reliability must be considered, which largely relies on the topological
layout of the communication links (Jan et al., 1993; Lin, 1994). Almost all of the optimization
problems relevant to distributed computing system design are NP-complete. That is, for most
problems, there is no known algorithm that could guarantee finding the global optimum in a
polynomial amount of time. Several DCS reliability measures have been developed and one of
these distributed system reliability measures, K-Node reliability (KNR), is adopted in Chen et
al. (1994). Reliability optimization is the design of distributed computing systems, where
KNR is viewed as the probability that all k (a subset of the processing elements) nodes in the
DCS can be run successfully. They presented a heuristic algorithm for maximizing reliability
by the node select problem to obtain an optimal design DCS. Their work did not consider an
exhaustive method because it is too time consuming. Instead, they applied the exact
algorithm, which examine k-node set reliability optimization with a capacity constraint to find
an optimal solution of k-node reliability. The heuristic algorithm work well for large DCS
problems as it largely avoids unnecessary generation of spanning trees. They regarded the
DCS as a weighted graph, in which the weight of each node represents its capacity and
generate k-node disjoint terms using a k-tree disjoint reduction method to obtain the KNR.
This reduces the disjoint terms and hence reduces the computation time.
In Chen (1993), K-node set reliability optimization with capacity constraint for a DCS was
examined using exact method. This method can obtain an optimal solution but cannot
effectively reduce the problem space. Moreover, exact method spends more execution time
1
Department of Electrical Engineering Programme, Abubakar Tafawa Balewa University, Bauchi. Nigeria.
e-mail: bakare_03@yahoo.com
2
University Computer Centre, Abubakar Tafawa Balewa University, Bauchi. Nigeria.
e-mail: inchiroma@yahoo.com
3
Department of Electrical & Electronics Engineering, University of Maiduguri, Maiduguri. Nigeria.
e-mail:ibrahim_ali@yahoo.com
K-node set reliability optimization of a distributed computing system using particle swarm algorithm
25
with a large DCS. In fact, most distributed system problems are large and an increase in the
number of nodes causes the exact method execution time to grow exponentially.
Occasionally, therefore an application requiring an efficient algorithm with an approximate
solution is highly attractive. In many cases, complex heuristics have to be developed to
achieve satisfying results. Previous approaches have either been enumerative-based, which
are applicable only for small DCS sizes (Aggarwal et al., 1982), or heuristic-based, which can
only be applied to larger networks, but do not guarantee optimality. Therefore other heuristic
approaches are required. There exist a number of researches, which deal with such approaches
as discussed in Pierre et al. (1998). Genetic algorithm (GA) is one of such heuristics that have
been found to be a very good computational tool for problem of this nature. They can be
applied to search large, multimodal, complex problem spaces (Holland, 1975; Bakare, 2001).
In Davis et al. (1987), a genetic algorithm to determine the link capacities of a network,
initially generated by the software called DESIGNET was proposed. Chiroma (2005) applied
GA to the optimization of K-node set reliability of a distributed computing system. Good
results in terms of solution quality and convergence characteristics were obtained. Cheng
(1998) employed GA approach in the backbone network design under the constraint: minimal
total link cost and 1-FT (fault-tolerant to 1 link-failure).
Kennedy and Eberhart proposed a new evolutionary computation technique called particle
swarm optimization (PSO) in 1995. This method was developed through the simulation of a
simplified social system and has been found to be robust in solving continuous non-linear
optimization problems (Gudise et al. 2003; Abido 2002; Kennedy et al., 1997; Zhang, 2004).
Particle swarm algorithms differ from other evolutionary algorithms most importantly in both
metaphorical explanations and how they work. The individuals (particles) persist over time,
influencing one another’s search of the problem space, unlike genetic algorithm where the
weakest chromosomes are immediately discarded. The particles in PSO (similar to
chromosomes in GA) are known to have fast convergence to local / global optimum position
(s) over a small number of iterations.
In this paper, an innovative particle swarm algorithm, called discrete PSO for K-node set
reliability optimization of a distributed computing system is presented. The feasibility of the
proposed algorithm is demonstrated on a typical DCS topology obtained from Cheng (1998).
Simulation shows that the proposed algorithm can achieve good results in terms of solution
quality and convergence characteristics.
2. Problem formulation
The KNR problem is characterized as follows:
Given the topology of an undirected DCS, the reliability of each communication link, the
capacity of each node and a possible set of data files, and assume that each node is perfectly
reliable and each link is either in the working state or failed state. The problem can be
mathematically stated thus:
Maximize R (Gk) (1)
Subject to: ∑c (vi) ≥ C constraint (2)
AZOJETE Vol. 7 2010
26
Where Gk is the graph G with set k of nodes specified,
k ≥ 2, R(Gk) is the reliability of the k-node set, vi is an ith node which represents the
ith processing element, c(vi) is the capacity of the ith node and Cconstraint is the total
capacity constraint in the DCS .
3. Applied software techniques
3.1 Overview of Particle Swarm Optimization Technique
Particle swarm optimization (PSO ) is an evolutionary computation technique that was
originally developed in 1995 by Kennedy and Eberhart. It has been developed through
simulation of simplified social models and has been found to be robust for solving non-linear,
non-differentiability multiple optimal and multi-objective problems. The features of the
technique are as follows:
 It is based on a simple concept and has high quality solution with stable convergence.
 The method is based on the researches about swarms such as fish schooling and bird
flocking.
 It was originally developed for non-linear optimization with continuous variables;
however it is easily expanded to treat problems with discrete variables. Therefore it is
applicable to K-node reliability optimization of a distributing computing system.
PSO is an evolutionary technique that does not implement survival of the fittest. Unlike other
evolutionary algorithms where an evolutionary operator is manipulated, each individual in the
swarm flies in the search space with a velocity which is dynamically adjusted according to its
own flying experience and its companions flying experience. The system initially has a
population of random solutions. Each potential solution, called a particle, is given a random
velocity and is flown through the problem space. The particles have memory and each particle
keeps track of its previous best position, called the pbest and its corresponding fitness. There
exist a number of pbest for the respective particles in the swarm and the particle with greatest
fitness is called the global best (gbest ) of the swarm. The basic concept of the PSO method
lies in accelerating each particle towards its pbest and gbest locations, with random weight
acceleration at each time step. The modified velocity of each particle can be computed using
the current velocity and the distance from pbest and gbest as given by:
   2211
1 k
idid
k
idid
k
id
k
id xgbestrandcxpbestrandcVWV 
(3)
In the discrete version of the PSO, the trajectories are changed in the probability that a
coordinate will take on a binary value (0 or 1). Therefore, the positions are computed using:
0else
1enth))((
1
11




k
id
k
id
k
id
x
xVSrandif
(4)
Where:
S(V) is a sigmoid limiting transformation function given by:
 V
eVS 
 11)( (5)
rand , rand1 and rand2 : random numbers between 0 and 1
Vk
id : current velocity of individual i at iteration k
K-node set reliability optimization of a distributed computing system using particle swarm algorithm
27
Vmin
id ≤Vk
id ≤ Vmax
id
Vk+1
id : modified velocity of individual i
xk
id : current position of individual i at iteration k
pbestid : pbest of individual i
gbestid : gbest of the group
c1 and c2: the weighting of the stochastic acceleration that pulls each particle towards
pbest and gbest .
W : inertia weight factor that controls the exploitation and exploration of the search
space by dynamically adjusting the velocity. It is computed using:
max
minmax
max
iter
gen
WW
WW 

 (6)
genmax
: maximum generation
iter : current iteration number.
3.2 Overview of Genetic Algorithms Based Technique
Genetic Algorithms (GAs), first proposed by John Holland in the 1960’s, are numerical
optimization algorithms based on principles inspired from the genetic and evolution
mechanisms observed in natural systems and populations of living beings (Bakare, 2001). The
robust behaviour, which is the distinguishing feature of GAs with respect to other
optimization methods, implies that GAs must differ in the following fundamental ways:
 It searches from a population of candidates and do not process only one single
solution; thus, they are resistant to being trapped in local optima.
 GAs use probabilistic transition rules and not deterministic rules.
 GAs exploit only the payoff information of the objective function to guide their search
towards the global optimum. They do not depend on any additional information like
the existence of derivatives.
One of the disadvantages of GA search is the large number of function evaluations, with the
resulting undesirably long execution time. Binary encoding GAs deals with binary strings,
where the number of bits of each string simulates the genes of an individual chromosome, and
the number of individuals constitutes a population. Each parameter set is encoded into a series
of a fixed length of string symbols, usually from the binary bits, which are then concatenated
into a complete string called chromosome. Sub-strings of specified length are extracted
successively from the concatenated string and are then decoded and mapped into the value in
the corresponding search space. Generally, GAs implementation comprises three different
phases: initial population generation, fitness evaluation and genetic operations (Bakare, 2001).
AZOJETE Vol. 7 2010
28
4. Implementation of the proposed technique
Particle swarm K-node reliability optimization is developed as follows:
4.1 Representation of Individual String
Before using the binary PSO algorithm to solve the KNR combinatorial optimization problem,
the representation of a particle must be defined. A particle is also called an individual. The
problem involves a capacity constraint. The network topology is fixed. The size of every node
is also fixed. Binary coding scheme is therefore employed. The length of a chromosome is
equal to the number of network nodes of the form:
xn, xn-1,.. xi-1,… x2, x1 (7)
Each bit indicates whether the node is selected for the k-node set,
where xi = 1 if vi is selected; otherwise xi = 0.
4.2 Initialization
The DCS parameter such as the number of nodes (n), the number of links (e), each link’s
reliability (aij) and unreliability (bij), each node’s capacity, c(vi), capacity constraint
(Cconstraint), etc are entered into the FORTRAN program. The PSO parameters such as particle
size (ps), minimum and maximum inertia weights, Wmin
and Wmax
, the limit of velocity change
Vmin
and Vmax
, maximum generation (genmax
), acceleration constants c1 and c2, etc are also
entered.
For each node vi, if the degree of vi is d(vi) and if the links ei,k1, ei,k2, ei,k3, …, ei,kd(vi) are
adjacent to vi, then its weight can be computed as in Yeh (2001) using:
  (8)))..)(..((*((* )(32211 ,,,,,, ivdkikikikikikii bababavw 
Where i, k1, k2, …, kd(vi) ϵ {1, n}. The heaviest node is then determined.
Initial population of chromosome Xi =[xn, .., x1] ϵ X are randomly generated with the
heaviest node included. The node capacity that includes this chromosome is computed. If the
sum of the capacity of this chromosome satisfies the capacity constraint, then it is appended to
the population, otherwise it is discarded.
4.3 Evaluation function
The objective function of chromosome is then computed using Yeh et al. (2001):
  2/deg  kratioratioprdlf kk (9)
Where
)1(, 








  kkaratioprdl
kjki Gv
ji
Gv
k

K-node set reliability optimization of a distributed computing system using particle swarm algorithm
29
 knvdratio
ki Gv
ik 1)(deg 







 
nk 2
The fitness values that determine which chromosomes are to be carried onto the next
generation are computed from the objective function equation.
4.3 Implementation of the PSO for KNR
The main steps involved in the searching procedures of the proposed PSO method are given
by the following:
Step 1: Read the DCS data and the PSO parameters. Compute the weight of each node
using Equation (8) and select the heaviest node.
Step 2: Generate randomly initial population of particles with random positions and
velocities and the heaviest node included. The node capacity that includes this
chromosome is computed. If the sum of the capacity of this chromosome satisfies the
capacity constraint, then it is appended to the population, otherwise it is discarded.
Step 3: Compute the fitness value of the initial particles in the swarm using the
objective function (Equation 9). Set the initial pbest to current position of each particle
and the initial best evaluated values among the swarm is set to gbest .
Step 4: Update the generation count.
Step 5: Update the velocities and the positions according to Equations (3) and (4)
respectively.
Step 6: Compute the fitness value of the new particles in the swarm using Equation
(9). Update the pbest with new positions if the particle’s present fitness is better than
the previous one. Also update the gbest with the best in the population swarm.
Step 7: Repeat steps 4 to 6 until the preset convergence criterion: maximum number of
generations is fulfilled.
Step 8: Compute the reliability R (GK) of the optimal K-node set result in the
chromosome of the population using Monte Carlo technique (Lin et al. 1994) and
output the K-node set corresponding to the R (GK).
AZOJETE Vol. 7 2010
30
5. Results and discussion
The procedure described above was implemented using the FORTRAN language and the
developed software program was executed on a 450 MHz Pentium III PC. To illustrate the
effectiveness of the proposed method, a distributed computing system topology obtained from
Chen et al. (1993) was considered.
The topology of the distributed computing system with eight (8) nodes, and eleven (11) links,
was considered as a case study where c (vi) represents the capacity of nodes vi, and aij
represents the reliability of the link eij.
v2 v4v3
e67
v5
v7 v6
e18
e17
e68
e56
e46
e48
e45
e34
e12
e18
v8v1
e23
Figure 1: A DCS with 8 nodes and 11 links
Benchmark input data for DCS are:
c (v1) = 39, c(v2) = 45, c(v3) = 38, c(v4) = 53, c(v5) = 47, c (v6) = 49, c(v7) = 51, c(v8) = 41.
a12= 0.89, a17= 0.81, a18= 0.93, a23= 0.85, a34= 0.91, a45= 0.82, a46= 0.83, a48= 0.96, a56=
0.87, a67= 0.84, a68= 0.88. Cconstraint ≥ 100.
The proposed approach was then applied to this problem and the optimum parameter setting
for the PSO is shown in Table I.
Table I: Optimum parameter setting for PSO
C1 2
C2 2
Vmax
2
Vmin
-2
genmax
50
Particle size (PS) 20
Wmax
0.9
Wmin
0.4
K-node set reliability optimization of a distributed computing system using particle swarm algorithm
31
The maximum fitness value of 0.701 was achieved and the chromosomes are 0001010 (from
left to right). The k-node set in the population chromosome is {v4, v6}, i.e. nodes 4 and 6.
The algorithm then computes the reliability and output the k-node set, which is the highest
reliability k-node set, and R ({v4, v6}) = 0.9974. It can therefore be seen that the same
solution quality was achieved by the PSO when compared with GA approach (Chiroma, 2005)
and the exact method (Chen et al., 1993). The convergence characteristic of PSO is as shown
in Figure 2. The convergence characteristics of both GA and PSO methods are comparatively
shown in Figure 3. As can be seen from this figure, both the PSO and GA have rapid
convergence characteristics. GA achieved the maximum fitness earlier than the PSO: second
and third generations respectively.
0.2
0.3
0.4
0.5
0.6
0.7
0.8
1 8 15 22 29 36 43 50
Generation number
Fitnessvalue
Average fitness
Maximum fitness
Figure 2: Convergence characteristics of PSO
0.4
0.45
0.5
0.55
0.6
0.65
0.7
0.75
1 7 13 19 25 31 37 43 49
Generation number
Fitnessvalue
GA maximum fitness
PSO maximum fitness
Figure 3: Comparison of convergence characteristics of PSO & GA
This shows that PSO has good convergence characteristics and is less prone to being trapped
into local optimal. Finally, PSO has less parameter settings when compared to GA.
AZOJETE Vol. 7 2010
32
Comparing the complexity of the proposed method with that of exact method, the complexity
of the exact method is O (2e x 2n), where e denotes the number of edges (links) and n
represents the number of nodes (Chen et al., 1994). With our proposed algorithm, however, in
the worst case, the complexity of evaluating the weight of each node is O(e), that of selecting
the heaviest node is O(n), and that of computing the reliability of the k- node set is O(m2),
where m represents the number of paths of the selected k-node set (Aziz, 1982). Therefore, the
complexity of the proposed algorithm is O (n*ps*ng+m2), where ps is the population size,
and ng is the total number of generation. Although the conventional techniques can yield an
optimal solution, they cannot effectively reduce the number of reliability computations. Some
applications, especially NP-complete problems, often require an efficient algorithm for
computing the reliability. Under this circumstance deriving the optimal reliability may not be
feasible. So an efficient algorithm, even when it yields only approximate reliability, is
preferred.
4. Conclusions
In this paper, comparison is made between the particle swarm optimization and genetic
algorithm based K-node set reliability optimization. The efficiency and accuracy of the
proposed algorithm has been verified by implementing the procedure using FORTRAN
language program on a Pentium III microcomputer. Verification on a typical DCS topology
revealed that PSO achieved the same good solution quality as compared with GA and exact
method. PSO exhibits good convergence characteristics and is less prone to being caught at
the local optimal. The proposed algorithm can efficiently obtain the optimal k-node set
reliability with a capacity constraint.
References
Abido M. A. (2002). Optimal design of power system stabilizers using PSO. IEEE
Transactions on Energy and Conversion. Vol 17, No. 3, pp. 406-413.
Aggarwal, K.K., Chopra, Y.C. and Bajwa J.S. (1982). Topological layout of links for
optimizing the overall reliability in a computer communication system.
Microelectronics and Reliability 22, pp.347-351
Aziz M. A., (1982). Path set enumeration of directed graphs by the set theoretic method.
Microelectronics and Reliability, Vol. 5, No. 37, pp. 809-814.
Bakare, G. A. (2001). Removal of Overloads and Voltage Problem in Electric Power Systems
using Genetic Algorithm/Expert Systems Approaches. Ph.D. Dissertation published by
Shaker Verlag, Germany.
Chen R. S., Chen, D. J. and Yel, Y. S. (1994). Reliability optimization in the design of
distributed computing systems. Proceedings of Int. Conference on Computing and
Information Institute of Computer Science and Engineering of National Chiao Tung
University, Hsinchu, Taiwan. R.O.C., pp.422-439.
K-node set reliability optimization of a distributed computing system using particle swarm algorithm
33
Chen R. S., Chen, D. J. and Yel, Y. S. (1993). Reliability optimization of distributed
computing systems subject to capacity constraint. International journal of Computers
& Mathematics with Applications. 29(3), pp. 93-99.
Cheng S. T. (1998) Topological optimization of a reliable communications network. IEEE
Trans. on Reliability. Vol.47, No.3, pp. 225-233.
Chiroma I. N. (2005) A genetic algorithm- based efficient optimization of K-node set
reliability for distributed computing system. MSc. Thesis (Computer Science),
Abubakar Tafawa Balewa University, Bauchi, Nigeria.
Davis, L. and Coombs, S. (1987). Optimizing network link sizes with genetic algorithms in
modelling and simulation methodology. Knowledge System’s Paradegins.
Amsterdam, The Netherlands, Elsevier, pp.22-28.
Gudise V. G. and Venayamooorthy G. K. (2003) Comparison of PSO and back propagation of
training algorithms for neural networks”, IEEE Swarm Intelligence Symposium.
Holland, J. H (1975). Adaptation in natural and artificial systems. University of Michigan
Press.
Jan, R.H., Hwang, F.J. and Cheng, S.T. (1993). Topological optimization of a communication
network subject to a reliability constraint. IEEE Trans on Reliability. Vol. 42, N0.1,
pp.63-70.
Kennedy J. and Eberhart R. (1997). A discrete binary version of the particle swarm
optimization”. Proceedings of IEEE International Conference on Neural Networks,
Perth, Australia,Vol. 4, pp. 4104-4108.
Lin, M. S. (1994). The reliability analysis on distributed computing systems. PhD
Dissertation, Institute of Computer Science and Information Engineering, National
Chiao Tung University, Hsinchu, Taiwan, R.O.C., pp.64-75.
Pierre, S. and Legault, G. (1988). A genetic algorithm for designing distributed computer
network topologies. IEEE Transactions on Systems, Man and Cybernetics. Part B:
Cybernetics, Vol.28, No.2.
Yeh Y. S., Chiu C. C. and Chen R. S. (2001). A genetic algorithm for K-node set optimization
with capacity constraint of a distributed system. Proceedings National Science Council
ROC (A), Vol. 25, No. 1, pp. 27-34.
Yeh M. S., Lin J. S. and Yeh W. C. (1994). A new Monte Carlo method for estimating
network reliability. Proceedings of the 16th International Conference on Computers
and Industrial Engineering, pp. 723-726.
Zhang W. and Liu Y. (2004). Reactive power optimization based on PSO in a practical power
system”. IEEE, PES Meeting.

More Related Content

What's hot

Novel algorithms for Knowledge discovery from neural networks in Classificat...
Novel algorithms for  Knowledge discovery from neural networks in Classificat...Novel algorithms for  Knowledge discovery from neural networks in Classificat...
Novel algorithms for Knowledge discovery from neural networks in Classificat...Dr.(Mrs).Gethsiyal Augasta
 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
 
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...
Using Neighbor’s State Cross-correlation to Accelerate Adaptation  in Docitiv...Using Neighbor’s State Cross-correlation to Accelerate Adaptation  in Docitiv...
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...paperpublications3
 
Study and Performance Analysis of MOS Technology and Nanocomputing QCA
Study and Performance Analysis of MOS Technology and Nanocomputing QCAStudy and Performance Analysis of MOS Technology and Nanocomputing QCA
Study and Performance Analysis of MOS Technology and Nanocomputing QCAVIT-AP University
 
Neural Networks: Model Building Through Linear Regression
Neural Networks: Model Building Through Linear RegressionNeural Networks: Model Building Through Linear Regression
Neural Networks: Model Building Through Linear RegressionMostafa G. M. Mostafa
 
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...paperpublications3
 
A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...eSAT Publishing House
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...IRJET Journal
 
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...ijcseit
 
A survey on weighted clustering techniques in manets
A survey on weighted clustering techniques in manetsA survey on weighted clustering techniques in manets
A survey on weighted clustering techniques in manetsIAEME Publication
 
STUDY OF TASK SCHEDULING STRATEGY BASED ON TRUSTWORTHINESS
STUDY OF TASK SCHEDULING STRATEGY BASED ON TRUSTWORTHINESS STUDY OF TASK SCHEDULING STRATEGY BASED ON TRUSTWORTHINESS
STUDY OF TASK SCHEDULING STRATEGY BASED ON TRUSTWORTHINESS ijdpsjournal
 
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...IJCSEIT Journal
 
The improved k means with particle swarm optimization
The improved k means with particle swarm optimizationThe improved k means with particle swarm optimization
The improved k means with particle swarm optimizationAlexander Decker
 

What's hot (18)

Novel algorithms for Knowledge discovery from neural networks in Classificat...
Novel algorithms for  Knowledge discovery from neural networks in Classificat...Novel algorithms for  Knowledge discovery from neural networks in Classificat...
Novel algorithms for Knowledge discovery from neural networks in Classificat...
 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...
 
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...
Using Neighbor’s State Cross-correlation to Accelerate Adaptation  in Docitiv...Using Neighbor’s State Cross-correlation to Accelerate Adaptation  in Docitiv...
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...
 
Study and Performance Analysis of MOS Technology and Nanocomputing QCA
Study and Performance Analysis of MOS Technology and Nanocomputing QCAStudy and Performance Analysis of MOS Technology and Nanocomputing QCA
Study and Performance Analysis of MOS Technology and Nanocomputing QCA
 
Neural Networks: Model Building Through Linear Regression
Neural Networks: Model Building Through Linear RegressionNeural Networks: Model Building Through Linear Regression
Neural Networks: Model Building Through Linear Regression
 
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
 
6119ijcsitce01
6119ijcsitce016119ijcsitce01
6119ijcsitce01
 
A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
 
A survey on weighted clustering techniques in manets
A survey on weighted clustering techniques in manetsA survey on weighted clustering techniques in manets
A survey on weighted clustering techniques in manets
 
STUDY OF TASK SCHEDULING STRATEGY BASED ON TRUSTWORTHINESS
STUDY OF TASK SCHEDULING STRATEGY BASED ON TRUSTWORTHINESS STUDY OF TASK SCHEDULING STRATEGY BASED ON TRUSTWORTHINESS
STUDY OF TASK SCHEDULING STRATEGY BASED ON TRUSTWORTHINESS
 
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
 
The improved k means with particle swarm optimization
The improved k means with particle swarm optimizationThe improved k means with particle swarm optimization
The improved k means with particle swarm optimization
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
Karas and atila
Karas and atilaKaras and atila
Karas and atila
 

Similar to 3 article azojete vol 7 24 33

Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Alexander Decker
 
Energy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LCEnergy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LCpaperpublications3
 
OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...
OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...
OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...ijngnjournal
 
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction NetworkEDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction Networkgerogepatton
 
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction NetworkEDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction Networkgerogepatton
 
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...cscpconf
 
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETSFAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETScsandit
 
Fitness function X-means for prolonging wireless sensor networks lifetime
Fitness function X-means for prolonging wireless sensor  networks lifetimeFitness function X-means for prolonging wireless sensor  networks lifetime
Fitness function X-means for prolonging wireless sensor networks lifetimeIJECEIAES
 
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...csandit
 
APPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINES
APPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINESAPPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINES
APPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINEScseij
 
Application of particle swarm optimization to microwave tapered microstrip lines
Application of particle swarm optimization to microwave tapered microstrip linesApplication of particle swarm optimization to microwave tapered microstrip lines
Application of particle swarm optimization to microwave tapered microstrip linescseij
 
Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...ijfcstjournal
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
 
An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...
An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...
An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...IRJET Journal
 
Data clustering using kernel based
Data clustering using kernel basedData clustering using kernel based
Data clustering using kernel basedIJITCA Journal
 
Artificial Intelligence Applications in Petroleum Engineering - Part I
Artificial Intelligence Applications in Petroleum Engineering - Part IArtificial Intelligence Applications in Petroleum Engineering - Part I
Artificial Intelligence Applications in Petroleum Engineering - Part IRamez Abdalla, M.Sc
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 

Similar to 3 article azojete vol 7 24 33 (20)

Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)
 
Energy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LCEnergy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LC
 
OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...
OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...
OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction NetworkEDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
 
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction NetworkEDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
 
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
 
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETSFAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
 
Fitness function X-means for prolonging wireless sensor networks lifetime
Fitness function X-means for prolonging wireless sensor  networks lifetimeFitness function X-means for prolonging wireless sensor  networks lifetime
Fitness function X-means for prolonging wireless sensor networks lifetime
 
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
 
APPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINES
APPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINESAPPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINES
APPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINES
 
Application of particle swarm optimization to microwave tapered microstrip lines
Application of particle swarm optimization to microwave tapered microstrip linesApplication of particle swarm optimization to microwave tapered microstrip lines
Application of particle swarm optimization to microwave tapered microstrip lines
 
L010628894
L010628894L010628894
L010628894
 
Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
 
Bz02516281633
Bz02516281633Bz02516281633
Bz02516281633
 
An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...
An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...
An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...
 
Data clustering using kernel based
Data clustering using kernel basedData clustering using kernel based
Data clustering using kernel based
 
Artificial Intelligence Applications in Petroleum Engineering - Part I
Artificial Intelligence Applications in Petroleum Engineering - Part IArtificial Intelligence Applications in Petroleum Engineering - Part I
Artificial Intelligence Applications in Petroleum Engineering - Part I
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 

More from Oyeniyi Samuel

Particle Swarm Optimization (PSO)-Based Distributed Power Control Algorithm f...
Particle Swarm Optimization (PSO)-Based Distributed Power Control Algorithm f...Particle Swarm Optimization (PSO)-Based Distributed Power Control Algorithm f...
Particle Swarm Optimization (PSO)-Based Distributed Power Control Algorithm f...Oyeniyi Samuel
 
Equilibrium and Kinetic Studies of Adsorption of Safranin-O from Aqueous Solu...
Equilibrium and Kinetic Studies of Adsorption of Safranin-O from Aqueous Solu...Equilibrium and Kinetic Studies of Adsorption of Safranin-O from Aqueous Solu...
Equilibrium and Kinetic Studies of Adsorption of Safranin-O from Aqueous Solu...Oyeniyi Samuel
 
Design Description of a Tentacle Based Scanning System
Design Description of a Tentacle Based Scanning SystemDesign Description of a Tentacle Based Scanning System
Design Description of a Tentacle Based Scanning SystemOyeniyi Samuel
 
Profiled Deck Composite Slab Strength Verification: A Review
Profiled Deck Composite Slab Strength Verification: A ReviewProfiled Deck Composite Slab Strength Verification: A Review
Profiled Deck Composite Slab Strength Verification: A ReviewOyeniyi Samuel
 
Optimization of Mechanical Expression of Castor Seeds Oil (Ricinus communis) ...
Optimization of Mechanical Expression of Castor Seeds Oil (Ricinus communis) ...Optimization of Mechanical Expression of Castor Seeds Oil (Ricinus communis) ...
Optimization of Mechanical Expression of Castor Seeds Oil (Ricinus communis) ...Oyeniyi Samuel
 
Inundation and Hazard Mapping on River Asa, using GIS
Inundation and Hazard Mapping on River Asa, using GISInundation and Hazard Mapping on River Asa, using GIS
Inundation and Hazard Mapping on River Asa, using GISOyeniyi Samuel
 
A Review of Smart Grids Deployment Issues in Developing Countries
A Review of Smart Grids Deployment Issues in Developing CountriesA Review of Smart Grids Deployment Issues in Developing Countries
A Review of Smart Grids Deployment Issues in Developing CountriesOyeniyi Samuel
 
NOx Emission in Iron and Steel Production: A Review of Control Measures for S...
NOx Emission in Iron and Steel Production: A Review of Control Measures for S...NOx Emission in Iron and Steel Production: A Review of Control Measures for S...
NOx Emission in Iron and Steel Production: A Review of Control Measures for S...Oyeniyi Samuel
 
Artificial Neural Network Modelling of the Energy Content of Municipal Solid ...
Artificial Neural Network Modelling of the Energy Content of Municipal Solid ...Artificial Neural Network Modelling of the Energy Content of Municipal Solid ...
Artificial Neural Network Modelling of the Energy Content of Municipal Solid ...Oyeniyi Samuel
 
Development of Inundation Map for Hypothetical Asa Dam Break using HEC-RAS an...
Development of Inundation Map for Hypothetical Asa Dam Break using HEC-RAS an...Development of Inundation Map for Hypothetical Asa Dam Break using HEC-RAS an...
Development of Inundation Map for Hypothetical Asa Dam Break using HEC-RAS an...Oyeniyi Samuel
 
Job Safety Assessment of Woodwork Industry in the South-western Nigeria
Job Safety Assessment of Woodwork Industry in the South-western NigeriaJob Safety Assessment of Woodwork Industry in the South-western Nigeria
Job Safety Assessment of Woodwork Industry in the South-western NigeriaOyeniyi Samuel
 
Anaerobicaly - Composted Environmental Wastes as Organic Fertilizer and Ident...
Anaerobicaly - Composted Environmental Wastes as Organic Fertilizer and Ident...Anaerobicaly - Composted Environmental Wastes as Organic Fertilizer and Ident...
Anaerobicaly - Composted Environmental Wastes as Organic Fertilizer and Ident...Oyeniyi Samuel
 
Security Architecture for Thin Client Network
Security Architecture for Thin Client NetworkSecurity Architecture for Thin Client Network
Security Architecture for Thin Client NetworkOyeniyi Samuel
 
Algorithm for the Dynamic Analysis of Plane Rectangular Rigid Frame Subjected...
Algorithm for the Dynamic Analysis of Plane Rectangular Rigid Frame Subjected...Algorithm for the Dynamic Analysis of Plane Rectangular Rigid Frame Subjected...
Algorithm for the Dynamic Analysis of Plane Rectangular Rigid Frame Subjected...Oyeniyi Samuel
 
Comparism of the Properties and Yield of Bioethanol from Mango and Orange Waste
Comparism of the Properties and Yield of Bioethanol from Mango and Orange WasteComparism of the Properties and Yield of Bioethanol from Mango and Orange Waste
Comparism of the Properties and Yield of Bioethanol from Mango and Orange WasteOyeniyi Samuel
 
Development of Farm Records Software
Development of Farm Records SoftwareDevelopment of Farm Records Software
Development of Farm Records SoftwareOyeniyi Samuel
 
Compressive Strength of Concrete made from Natural Fine Aggregate Sources in ...
Compressive Strength of Concrete made from Natural Fine Aggregate Sources in ...Compressive Strength of Concrete made from Natural Fine Aggregate Sources in ...
Compressive Strength of Concrete made from Natural Fine Aggregate Sources in ...Oyeniyi Samuel
 
Evaluation of Chemical and Physico-Mechanical Properties of Ado-Ekiti Natural...
Evaluation of Chemical and Physico-Mechanical Properties of Ado-Ekiti Natural...Evaluation of Chemical and Physico-Mechanical Properties of Ado-Ekiti Natural...
Evaluation of Chemical and Physico-Mechanical Properties of Ado-Ekiti Natural...Oyeniyi Samuel
 
Modeling and Simulation of Pyrolysis Process for a Beech Wood Material
Modeling and Simulation of Pyrolysis Process for a Beech Wood MaterialModeling and Simulation of Pyrolysis Process for a Beech Wood Material
Modeling and Simulation of Pyrolysis Process for a Beech Wood MaterialOyeniyi Samuel
 
An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...Oyeniyi Samuel
 

More from Oyeniyi Samuel (20)

Particle Swarm Optimization (PSO)-Based Distributed Power Control Algorithm f...
Particle Swarm Optimization (PSO)-Based Distributed Power Control Algorithm f...Particle Swarm Optimization (PSO)-Based Distributed Power Control Algorithm f...
Particle Swarm Optimization (PSO)-Based Distributed Power Control Algorithm f...
 
Equilibrium and Kinetic Studies of Adsorption of Safranin-O from Aqueous Solu...
Equilibrium and Kinetic Studies of Adsorption of Safranin-O from Aqueous Solu...Equilibrium and Kinetic Studies of Adsorption of Safranin-O from Aqueous Solu...
Equilibrium and Kinetic Studies of Adsorption of Safranin-O from Aqueous Solu...
 
Design Description of a Tentacle Based Scanning System
Design Description of a Tentacle Based Scanning SystemDesign Description of a Tentacle Based Scanning System
Design Description of a Tentacle Based Scanning System
 
Profiled Deck Composite Slab Strength Verification: A Review
Profiled Deck Composite Slab Strength Verification: A ReviewProfiled Deck Composite Slab Strength Verification: A Review
Profiled Deck Composite Slab Strength Verification: A Review
 
Optimization of Mechanical Expression of Castor Seeds Oil (Ricinus communis) ...
Optimization of Mechanical Expression of Castor Seeds Oil (Ricinus communis) ...Optimization of Mechanical Expression of Castor Seeds Oil (Ricinus communis) ...
Optimization of Mechanical Expression of Castor Seeds Oil (Ricinus communis) ...
 
Inundation and Hazard Mapping on River Asa, using GIS
Inundation and Hazard Mapping on River Asa, using GISInundation and Hazard Mapping on River Asa, using GIS
Inundation and Hazard Mapping on River Asa, using GIS
 
A Review of Smart Grids Deployment Issues in Developing Countries
A Review of Smart Grids Deployment Issues in Developing CountriesA Review of Smart Grids Deployment Issues in Developing Countries
A Review of Smart Grids Deployment Issues in Developing Countries
 
NOx Emission in Iron and Steel Production: A Review of Control Measures for S...
NOx Emission in Iron and Steel Production: A Review of Control Measures for S...NOx Emission in Iron and Steel Production: A Review of Control Measures for S...
NOx Emission in Iron and Steel Production: A Review of Control Measures for S...
 
Artificial Neural Network Modelling of the Energy Content of Municipal Solid ...
Artificial Neural Network Modelling of the Energy Content of Municipal Solid ...Artificial Neural Network Modelling of the Energy Content of Municipal Solid ...
Artificial Neural Network Modelling of the Energy Content of Municipal Solid ...
 
Development of Inundation Map for Hypothetical Asa Dam Break using HEC-RAS an...
Development of Inundation Map for Hypothetical Asa Dam Break using HEC-RAS an...Development of Inundation Map for Hypothetical Asa Dam Break using HEC-RAS an...
Development of Inundation Map for Hypothetical Asa Dam Break using HEC-RAS an...
 
Job Safety Assessment of Woodwork Industry in the South-western Nigeria
Job Safety Assessment of Woodwork Industry in the South-western NigeriaJob Safety Assessment of Woodwork Industry in the South-western Nigeria
Job Safety Assessment of Woodwork Industry in the South-western Nigeria
 
Anaerobicaly - Composted Environmental Wastes as Organic Fertilizer and Ident...
Anaerobicaly - Composted Environmental Wastes as Organic Fertilizer and Ident...Anaerobicaly - Composted Environmental Wastes as Organic Fertilizer and Ident...
Anaerobicaly - Composted Environmental Wastes as Organic Fertilizer and Ident...
 
Security Architecture for Thin Client Network
Security Architecture for Thin Client NetworkSecurity Architecture for Thin Client Network
Security Architecture for Thin Client Network
 
Algorithm for the Dynamic Analysis of Plane Rectangular Rigid Frame Subjected...
Algorithm for the Dynamic Analysis of Plane Rectangular Rigid Frame Subjected...Algorithm for the Dynamic Analysis of Plane Rectangular Rigid Frame Subjected...
Algorithm for the Dynamic Analysis of Plane Rectangular Rigid Frame Subjected...
 
Comparism of the Properties and Yield of Bioethanol from Mango and Orange Waste
Comparism of the Properties and Yield of Bioethanol from Mango and Orange WasteComparism of the Properties and Yield of Bioethanol from Mango and Orange Waste
Comparism of the Properties and Yield of Bioethanol from Mango and Orange Waste
 
Development of Farm Records Software
Development of Farm Records SoftwareDevelopment of Farm Records Software
Development of Farm Records Software
 
Compressive Strength of Concrete made from Natural Fine Aggregate Sources in ...
Compressive Strength of Concrete made from Natural Fine Aggregate Sources in ...Compressive Strength of Concrete made from Natural Fine Aggregate Sources in ...
Compressive Strength of Concrete made from Natural Fine Aggregate Sources in ...
 
Evaluation of Chemical and Physico-Mechanical Properties of Ado-Ekiti Natural...
Evaluation of Chemical and Physico-Mechanical Properties of Ado-Ekiti Natural...Evaluation of Chemical and Physico-Mechanical Properties of Ado-Ekiti Natural...
Evaluation of Chemical and Physico-Mechanical Properties of Ado-Ekiti Natural...
 
Modeling and Simulation of Pyrolysis Process for a Beech Wood Material
Modeling and Simulation of Pyrolysis Process for a Beech Wood MaterialModeling and Simulation of Pyrolysis Process for a Beech Wood Material
Modeling and Simulation of Pyrolysis Process for a Beech Wood Material
 
An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...
 

Recently uploaded

Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 

Recently uploaded (20)

Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 

3 article azojete vol 7 24 33

  • 1. Arid Zone Journal of Engineering, Technology and Environment. August, 2010; Vol.7, 24 -33 Copyright© Faculty of Engineering, University of Maiduguri, Nigeria. Print ISSN: 1596-2490, Electronic ISSN: 2545-5818 www.azojete.com.ng K-NODE SET RELIABILITY OPTIMIZATION OF A DISTRIBUTED COMPUTING SYSTEM USING PARTICLE SWARM ALGORITHM Bakare, G.A.,1 Chiroma, I.N. 2 and Ibrahim, A.A.3 Abstract A discrete Particle Swarm algorithm is proposed to solve a typical combinatorial optimization problem: K-Node Set Reliability (KNR) optimization of a distributed computing system (DCS) which is a well-known NP-hard problem is presented in this paper. The reliability of a subset of network nodes of a DCS is determined such that the reliability is maximized and specified capacity constraint is satisfied. The proposed algorithm is demonstrated on an 8 node 11 link DCS topology. The test results show that the proposed algorithm can achieve good solution quality and convergence characteristics. 1. Introduction Advances in computer networks and low cost computing elements have led to increasing interest in Distributed Computing System (DCS). Among the numerous merits of using a DCS include more effective resource sharing, better fault tolerance, and higher reliability. In designing such systems, reliability must be considered, which largely relies on the topological layout of the communication links (Jan et al., 1993; Lin, 1994). Almost all of the optimization problems relevant to distributed computing system design are NP-complete. That is, for most problems, there is no known algorithm that could guarantee finding the global optimum in a polynomial amount of time. Several DCS reliability measures have been developed and one of these distributed system reliability measures, K-Node reliability (KNR), is adopted in Chen et al. (1994). Reliability optimization is the design of distributed computing systems, where KNR is viewed as the probability that all k (a subset of the processing elements) nodes in the DCS can be run successfully. They presented a heuristic algorithm for maximizing reliability by the node select problem to obtain an optimal design DCS. Their work did not consider an exhaustive method because it is too time consuming. Instead, they applied the exact algorithm, which examine k-node set reliability optimization with a capacity constraint to find an optimal solution of k-node reliability. The heuristic algorithm work well for large DCS problems as it largely avoids unnecessary generation of spanning trees. They regarded the DCS as a weighted graph, in which the weight of each node represents its capacity and generate k-node disjoint terms using a k-tree disjoint reduction method to obtain the KNR. This reduces the disjoint terms and hence reduces the computation time. In Chen (1993), K-node set reliability optimization with capacity constraint for a DCS was examined using exact method. This method can obtain an optimal solution but cannot effectively reduce the problem space. Moreover, exact method spends more execution time 1 Department of Electrical Engineering Programme, Abubakar Tafawa Balewa University, Bauchi. Nigeria. e-mail: bakare_03@yahoo.com 2 University Computer Centre, Abubakar Tafawa Balewa University, Bauchi. Nigeria. e-mail: inchiroma@yahoo.com 3 Department of Electrical & Electronics Engineering, University of Maiduguri, Maiduguri. Nigeria. e-mail:ibrahim_ali@yahoo.com
  • 2. K-node set reliability optimization of a distributed computing system using particle swarm algorithm 25 with a large DCS. In fact, most distributed system problems are large and an increase in the number of nodes causes the exact method execution time to grow exponentially. Occasionally, therefore an application requiring an efficient algorithm with an approximate solution is highly attractive. In many cases, complex heuristics have to be developed to achieve satisfying results. Previous approaches have either been enumerative-based, which are applicable only for small DCS sizes (Aggarwal et al., 1982), or heuristic-based, which can only be applied to larger networks, but do not guarantee optimality. Therefore other heuristic approaches are required. There exist a number of researches, which deal with such approaches as discussed in Pierre et al. (1998). Genetic algorithm (GA) is one of such heuristics that have been found to be a very good computational tool for problem of this nature. They can be applied to search large, multimodal, complex problem spaces (Holland, 1975; Bakare, 2001). In Davis et al. (1987), a genetic algorithm to determine the link capacities of a network, initially generated by the software called DESIGNET was proposed. Chiroma (2005) applied GA to the optimization of K-node set reliability of a distributed computing system. Good results in terms of solution quality and convergence characteristics were obtained. Cheng (1998) employed GA approach in the backbone network design under the constraint: minimal total link cost and 1-FT (fault-tolerant to 1 link-failure). Kennedy and Eberhart proposed a new evolutionary computation technique called particle swarm optimization (PSO) in 1995. This method was developed through the simulation of a simplified social system and has been found to be robust in solving continuous non-linear optimization problems (Gudise et al. 2003; Abido 2002; Kennedy et al., 1997; Zhang, 2004). Particle swarm algorithms differ from other evolutionary algorithms most importantly in both metaphorical explanations and how they work. The individuals (particles) persist over time, influencing one another’s search of the problem space, unlike genetic algorithm where the weakest chromosomes are immediately discarded. The particles in PSO (similar to chromosomes in GA) are known to have fast convergence to local / global optimum position (s) over a small number of iterations. In this paper, an innovative particle swarm algorithm, called discrete PSO for K-node set reliability optimization of a distributed computing system is presented. The feasibility of the proposed algorithm is demonstrated on a typical DCS topology obtained from Cheng (1998). Simulation shows that the proposed algorithm can achieve good results in terms of solution quality and convergence characteristics. 2. Problem formulation The KNR problem is characterized as follows: Given the topology of an undirected DCS, the reliability of each communication link, the capacity of each node and a possible set of data files, and assume that each node is perfectly reliable and each link is either in the working state or failed state. The problem can be mathematically stated thus: Maximize R (Gk) (1) Subject to: ∑c (vi) ≥ C constraint (2)
  • 3. AZOJETE Vol. 7 2010 26 Where Gk is the graph G with set k of nodes specified, k ≥ 2, R(Gk) is the reliability of the k-node set, vi is an ith node which represents the ith processing element, c(vi) is the capacity of the ith node and Cconstraint is the total capacity constraint in the DCS . 3. Applied software techniques 3.1 Overview of Particle Swarm Optimization Technique Particle swarm optimization (PSO ) is an evolutionary computation technique that was originally developed in 1995 by Kennedy and Eberhart. It has been developed through simulation of simplified social models and has been found to be robust for solving non-linear, non-differentiability multiple optimal and multi-objective problems. The features of the technique are as follows:  It is based on a simple concept and has high quality solution with stable convergence.  The method is based on the researches about swarms such as fish schooling and bird flocking.  It was originally developed for non-linear optimization with continuous variables; however it is easily expanded to treat problems with discrete variables. Therefore it is applicable to K-node reliability optimization of a distributing computing system. PSO is an evolutionary technique that does not implement survival of the fittest. Unlike other evolutionary algorithms where an evolutionary operator is manipulated, each individual in the swarm flies in the search space with a velocity which is dynamically adjusted according to its own flying experience and its companions flying experience. The system initially has a population of random solutions. Each potential solution, called a particle, is given a random velocity and is flown through the problem space. The particles have memory and each particle keeps track of its previous best position, called the pbest and its corresponding fitness. There exist a number of pbest for the respective particles in the swarm and the particle with greatest fitness is called the global best (gbest ) of the swarm. The basic concept of the PSO method lies in accelerating each particle towards its pbest and gbest locations, with random weight acceleration at each time step. The modified velocity of each particle can be computed using the current velocity and the distance from pbest and gbest as given by:    2211 1 k idid k idid k id k id xgbestrandcxpbestrandcVWV  (3) In the discrete version of the PSO, the trajectories are changed in the probability that a coordinate will take on a binary value (0 or 1). Therefore, the positions are computed using: 0else 1enth))(( 1 11     k id k id k id x xVSrandif (4) Where: S(V) is a sigmoid limiting transformation function given by:  V eVS   11)( (5) rand , rand1 and rand2 : random numbers between 0 and 1 Vk id : current velocity of individual i at iteration k
  • 4. K-node set reliability optimization of a distributed computing system using particle swarm algorithm 27 Vmin id ≤Vk id ≤ Vmax id Vk+1 id : modified velocity of individual i xk id : current position of individual i at iteration k pbestid : pbest of individual i gbestid : gbest of the group c1 and c2: the weighting of the stochastic acceleration that pulls each particle towards pbest and gbest . W : inertia weight factor that controls the exploitation and exploration of the search space by dynamically adjusting the velocity. It is computed using: max minmax max iter gen WW WW    (6) genmax : maximum generation iter : current iteration number. 3.2 Overview of Genetic Algorithms Based Technique Genetic Algorithms (GAs), first proposed by John Holland in the 1960’s, are numerical optimization algorithms based on principles inspired from the genetic and evolution mechanisms observed in natural systems and populations of living beings (Bakare, 2001). The robust behaviour, which is the distinguishing feature of GAs with respect to other optimization methods, implies that GAs must differ in the following fundamental ways:  It searches from a population of candidates and do not process only one single solution; thus, they are resistant to being trapped in local optima.  GAs use probabilistic transition rules and not deterministic rules.  GAs exploit only the payoff information of the objective function to guide their search towards the global optimum. They do not depend on any additional information like the existence of derivatives. One of the disadvantages of GA search is the large number of function evaluations, with the resulting undesirably long execution time. Binary encoding GAs deals with binary strings, where the number of bits of each string simulates the genes of an individual chromosome, and the number of individuals constitutes a population. Each parameter set is encoded into a series of a fixed length of string symbols, usually from the binary bits, which are then concatenated into a complete string called chromosome. Sub-strings of specified length are extracted successively from the concatenated string and are then decoded and mapped into the value in the corresponding search space. Generally, GAs implementation comprises three different phases: initial population generation, fitness evaluation and genetic operations (Bakare, 2001).
  • 5. AZOJETE Vol. 7 2010 28 4. Implementation of the proposed technique Particle swarm K-node reliability optimization is developed as follows: 4.1 Representation of Individual String Before using the binary PSO algorithm to solve the KNR combinatorial optimization problem, the representation of a particle must be defined. A particle is also called an individual. The problem involves a capacity constraint. The network topology is fixed. The size of every node is also fixed. Binary coding scheme is therefore employed. The length of a chromosome is equal to the number of network nodes of the form: xn, xn-1,.. xi-1,… x2, x1 (7) Each bit indicates whether the node is selected for the k-node set, where xi = 1 if vi is selected; otherwise xi = 0. 4.2 Initialization The DCS parameter such as the number of nodes (n), the number of links (e), each link’s reliability (aij) and unreliability (bij), each node’s capacity, c(vi), capacity constraint (Cconstraint), etc are entered into the FORTRAN program. The PSO parameters such as particle size (ps), minimum and maximum inertia weights, Wmin and Wmax , the limit of velocity change Vmin and Vmax , maximum generation (genmax ), acceleration constants c1 and c2, etc are also entered. For each node vi, if the degree of vi is d(vi) and if the links ei,k1, ei,k2, ei,k3, …, ei,kd(vi) are adjacent to vi, then its weight can be computed as in Yeh (2001) using:   (8)))..)(..((*((* )(32211 ,,,,,, ivdkikikikikikii bababavw  Where i, k1, k2, …, kd(vi) ϵ {1, n}. The heaviest node is then determined. Initial population of chromosome Xi =[xn, .., x1] ϵ X are randomly generated with the heaviest node included. The node capacity that includes this chromosome is computed. If the sum of the capacity of this chromosome satisfies the capacity constraint, then it is appended to the population, otherwise it is discarded. 4.3 Evaluation function The objective function of chromosome is then computed using Yeh et al. (2001):   2/deg  kratioratioprdlf kk (9) Where )1(,            kkaratioprdl kjki Gv ji Gv k 
  • 6. K-node set reliability optimization of a distributed computing system using particle swarm algorithm 29  knvdratio ki Gv ik 1)(deg           nk 2 The fitness values that determine which chromosomes are to be carried onto the next generation are computed from the objective function equation. 4.3 Implementation of the PSO for KNR The main steps involved in the searching procedures of the proposed PSO method are given by the following: Step 1: Read the DCS data and the PSO parameters. Compute the weight of each node using Equation (8) and select the heaviest node. Step 2: Generate randomly initial population of particles with random positions and velocities and the heaviest node included. The node capacity that includes this chromosome is computed. If the sum of the capacity of this chromosome satisfies the capacity constraint, then it is appended to the population, otherwise it is discarded. Step 3: Compute the fitness value of the initial particles in the swarm using the objective function (Equation 9). Set the initial pbest to current position of each particle and the initial best evaluated values among the swarm is set to gbest . Step 4: Update the generation count. Step 5: Update the velocities and the positions according to Equations (3) and (4) respectively. Step 6: Compute the fitness value of the new particles in the swarm using Equation (9). Update the pbest with new positions if the particle’s present fitness is better than the previous one. Also update the gbest with the best in the population swarm. Step 7: Repeat steps 4 to 6 until the preset convergence criterion: maximum number of generations is fulfilled. Step 8: Compute the reliability R (GK) of the optimal K-node set result in the chromosome of the population using Monte Carlo technique (Lin et al. 1994) and output the K-node set corresponding to the R (GK).
  • 7. AZOJETE Vol. 7 2010 30 5. Results and discussion The procedure described above was implemented using the FORTRAN language and the developed software program was executed on a 450 MHz Pentium III PC. To illustrate the effectiveness of the proposed method, a distributed computing system topology obtained from Chen et al. (1993) was considered. The topology of the distributed computing system with eight (8) nodes, and eleven (11) links, was considered as a case study where c (vi) represents the capacity of nodes vi, and aij represents the reliability of the link eij. v2 v4v3 e67 v5 v7 v6 e18 e17 e68 e56 e46 e48 e45 e34 e12 e18 v8v1 e23 Figure 1: A DCS with 8 nodes and 11 links Benchmark input data for DCS are: c (v1) = 39, c(v2) = 45, c(v3) = 38, c(v4) = 53, c(v5) = 47, c (v6) = 49, c(v7) = 51, c(v8) = 41. a12= 0.89, a17= 0.81, a18= 0.93, a23= 0.85, a34= 0.91, a45= 0.82, a46= 0.83, a48= 0.96, a56= 0.87, a67= 0.84, a68= 0.88. Cconstraint ≥ 100. The proposed approach was then applied to this problem and the optimum parameter setting for the PSO is shown in Table I. Table I: Optimum parameter setting for PSO C1 2 C2 2 Vmax 2 Vmin -2 genmax 50 Particle size (PS) 20 Wmax 0.9 Wmin 0.4
  • 8. K-node set reliability optimization of a distributed computing system using particle swarm algorithm 31 The maximum fitness value of 0.701 was achieved and the chromosomes are 0001010 (from left to right). The k-node set in the population chromosome is {v4, v6}, i.e. nodes 4 and 6. The algorithm then computes the reliability and output the k-node set, which is the highest reliability k-node set, and R ({v4, v6}) = 0.9974. It can therefore be seen that the same solution quality was achieved by the PSO when compared with GA approach (Chiroma, 2005) and the exact method (Chen et al., 1993). The convergence characteristic of PSO is as shown in Figure 2. The convergence characteristics of both GA and PSO methods are comparatively shown in Figure 3. As can be seen from this figure, both the PSO and GA have rapid convergence characteristics. GA achieved the maximum fitness earlier than the PSO: second and third generations respectively. 0.2 0.3 0.4 0.5 0.6 0.7 0.8 1 8 15 22 29 36 43 50 Generation number Fitnessvalue Average fitness Maximum fitness Figure 2: Convergence characteristics of PSO 0.4 0.45 0.5 0.55 0.6 0.65 0.7 0.75 1 7 13 19 25 31 37 43 49 Generation number Fitnessvalue GA maximum fitness PSO maximum fitness Figure 3: Comparison of convergence characteristics of PSO & GA This shows that PSO has good convergence characteristics and is less prone to being trapped into local optimal. Finally, PSO has less parameter settings when compared to GA.
  • 9. AZOJETE Vol. 7 2010 32 Comparing the complexity of the proposed method with that of exact method, the complexity of the exact method is O (2e x 2n), where e denotes the number of edges (links) and n represents the number of nodes (Chen et al., 1994). With our proposed algorithm, however, in the worst case, the complexity of evaluating the weight of each node is O(e), that of selecting the heaviest node is O(n), and that of computing the reliability of the k- node set is O(m2), where m represents the number of paths of the selected k-node set (Aziz, 1982). Therefore, the complexity of the proposed algorithm is O (n*ps*ng+m2), where ps is the population size, and ng is the total number of generation. Although the conventional techniques can yield an optimal solution, they cannot effectively reduce the number of reliability computations. Some applications, especially NP-complete problems, often require an efficient algorithm for computing the reliability. Under this circumstance deriving the optimal reliability may not be feasible. So an efficient algorithm, even when it yields only approximate reliability, is preferred. 4. Conclusions In this paper, comparison is made between the particle swarm optimization and genetic algorithm based K-node set reliability optimization. The efficiency and accuracy of the proposed algorithm has been verified by implementing the procedure using FORTRAN language program on a Pentium III microcomputer. Verification on a typical DCS topology revealed that PSO achieved the same good solution quality as compared with GA and exact method. PSO exhibits good convergence characteristics and is less prone to being caught at the local optimal. The proposed algorithm can efficiently obtain the optimal k-node set reliability with a capacity constraint. References Abido M. A. (2002). Optimal design of power system stabilizers using PSO. IEEE Transactions on Energy and Conversion. Vol 17, No. 3, pp. 406-413. Aggarwal, K.K., Chopra, Y.C. and Bajwa J.S. (1982). Topological layout of links for optimizing the overall reliability in a computer communication system. Microelectronics and Reliability 22, pp.347-351 Aziz M. A., (1982). Path set enumeration of directed graphs by the set theoretic method. Microelectronics and Reliability, Vol. 5, No. 37, pp. 809-814. Bakare, G. A. (2001). Removal of Overloads and Voltage Problem in Electric Power Systems using Genetic Algorithm/Expert Systems Approaches. Ph.D. Dissertation published by Shaker Verlag, Germany. Chen R. S., Chen, D. J. and Yel, Y. S. (1994). Reliability optimization in the design of distributed computing systems. Proceedings of Int. Conference on Computing and Information Institute of Computer Science and Engineering of National Chiao Tung University, Hsinchu, Taiwan. R.O.C., pp.422-439.
  • 10. K-node set reliability optimization of a distributed computing system using particle swarm algorithm 33 Chen R. S., Chen, D. J. and Yel, Y. S. (1993). Reliability optimization of distributed computing systems subject to capacity constraint. International journal of Computers & Mathematics with Applications. 29(3), pp. 93-99. Cheng S. T. (1998) Topological optimization of a reliable communications network. IEEE Trans. on Reliability. Vol.47, No.3, pp. 225-233. Chiroma I. N. (2005) A genetic algorithm- based efficient optimization of K-node set reliability for distributed computing system. MSc. Thesis (Computer Science), Abubakar Tafawa Balewa University, Bauchi, Nigeria. Davis, L. and Coombs, S. (1987). Optimizing network link sizes with genetic algorithms in modelling and simulation methodology. Knowledge System’s Paradegins. Amsterdam, The Netherlands, Elsevier, pp.22-28. Gudise V. G. and Venayamooorthy G. K. (2003) Comparison of PSO and back propagation of training algorithms for neural networks”, IEEE Swarm Intelligence Symposium. Holland, J. H (1975). Adaptation in natural and artificial systems. University of Michigan Press. Jan, R.H., Hwang, F.J. and Cheng, S.T. (1993). Topological optimization of a communication network subject to a reliability constraint. IEEE Trans on Reliability. Vol. 42, N0.1, pp.63-70. Kennedy J. and Eberhart R. (1997). A discrete binary version of the particle swarm optimization”. Proceedings of IEEE International Conference on Neural Networks, Perth, Australia,Vol. 4, pp. 4104-4108. Lin, M. S. (1994). The reliability analysis on distributed computing systems. PhD Dissertation, Institute of Computer Science and Information Engineering, National Chiao Tung University, Hsinchu, Taiwan, R.O.C., pp.64-75. Pierre, S. and Legault, G. (1988). A genetic algorithm for designing distributed computer network topologies. IEEE Transactions on Systems, Man and Cybernetics. Part B: Cybernetics, Vol.28, No.2. Yeh Y. S., Chiu C. C. and Chen R. S. (2001). A genetic algorithm for K-node set optimization with capacity constraint of a distributed system. Proceedings National Science Council ROC (A), Vol. 25, No. 1, pp. 27-34. Yeh M. S., Lin J. S. and Yeh W. C. (1994). A new Monte Carlo method for estimating network reliability. Proceedings of the 16th International Conference on Computers and Industrial Engineering, pp. 723-726. Zhang W. and Liu Y. (2004). Reactive power optimization based on PSO in a practical power system”. IEEE, PES Meeting.