The document summarizes the artificial bee colony (ABC) algorithm, which was introduced in 2005 and is inspired by the foraging behavior of honeybee swarms. The ABC algorithm simulates three groups of bees - employed bees, onlookers, and scouts - to solve optimization problems. It involves phases of employed bee search, onlooker bee choice, and scout bee recruitment to balance exploration and exploitation. The ABC algorithm has few parameters and fast convergence but is limited by its initial solutions. Variations include multi-objective ABC algorithms and parameter studies on swarm size, limit, and dimension.
The cuckoo search algorithm is a recently developed meta-heuristic optimization algorithm, which is suitable for solving optimization problems. Cuckoo search is a nature-inspired metaheuristic algorithm, based on the brood parasitism of some cuckoo species, along with Levy flights random walks
A presentation on PSO with videos and animations to illustrate the concept. The ppt throws light on the concept, the algo, the application and comparison of PSO with GA and DE.
The cuckoo search algorithm is a recently developed meta-heuristic optimization algorithm, which is suitable for solving optimization problems. Cuckoo search is a nature-inspired metaheuristic algorithm, based on the brood parasitism of some cuckoo species, along with Levy flights random walks
A presentation on PSO with videos and animations to illustrate the concept. The ppt throws light on the concept, the algo, the application and comparison of PSO with GA and DE.
This presentation provides an introduction to the Ant Colony Optimization topic, it shows the basic idea of ACO, advantages, limitations and the related applications.
This presentation provides an introduction to the Ant Colony Optimization topic, it shows the basic idea of ACO, advantages, limitations and the related applications.
کدنویسی الگوریتم کلونی مصنوعی زنبور عسل یا الگوریتم ABC در متلب کتابخانه خانه متلب
matlabhome.ir matlab_net@yahoo.com 09190090258
الگوریتم کلونی مصنوعی زنبورعسل یا الگوریتم ABC
بر اساس هوش ازدحامی و نحوه زندگی زنبورهای عسل ایجاد گردیده است. با استفاده از شیوه زندگی زنبورعسل و مراحل جستجوی زنبور عسل برای غذا می توان به بهینه سازی مدل های پیچیده و مدل هایی که در اصطلاح در کلاس Np-Hrad قرار می گیرند ، پرداخت. با استفاده از الگوریتم ABC می توان مدل هایی با محدودیت های زیاد و سنگین و همچنین مدل هایی که با روش های قطعی قابل حل نیستند را مورد حل قرار داد.
در الگوریتم کلونی مصنوعی زنبور عسل یا الگوریتم ABC سه دسته زنبور مورد بررسی قرار می گیرند.
زنبورهای کارگر ، زنبورهای تماشاچی و زنبورهای پیش آهنگ.
برای حل مدل های مختلف با این الگوریتم می توانید اینجا کلیک نمایید.
در الگوریتم کلونی مصنوعی زنبور عسل ، محل هر غذا یک جواب در نظر گرفته می شود. در مرحله اول تعدادی محل غذا به طور تصادفی در نظر گرفته می شود و زنبورها به سراغ آن محل ها می روند و پس از بررسی شهد موجود در غذا به کندو برگشته و تبادل اطلاعات می نمایند . این تبادل اطلاعات در محلی به نام محل رقص صورت می گیرد و دیگر زنبورهای تماشاچی می توانند محل غذای مورد نظر را انتخاب نموده و به سراغ آن بروند.
الگوریتم ABC
الگوریتم ABC
سپس هر زنبور کارگر به محل غذایی قبلی رفته و با توجه به اطلاعات موجود در حافظه اش محل غذایی جدیدی را در همسایگی پیدا می گردد.
در محل رقص هر زنبور کارگر محل غذایی با شهد بالاتر را یافته باشد ، احتمال اینکه این محل توسط زنبورهای تماشاچی انتخاب شود ، بیشتر می باشد.
همچنین اگر محل غذایی ترک شود ، زنبورهای پیش آهنگ یک محل غذایی جدید پیدا می کنند.
با توجه به اصول هوش ازدحامی ، زنبورها در نهایت به محل غذایی ( جوابی) با بهترین مقدار پی ش می روند و این کار باعث یافتن جوابی مناسب برای مسئله مورد نظر می شود.
Networks community detection using artificial bee colony swarm optimizationAboul Ella Hassanien
Community structure identification in complex networks has been an important research topic in recent years. Community detection can be viewed as an optimization problem in which an objective quality function that captures the intuition of a community as a group of nodes with better internal connectivity than external connectivity is chosen to be optimized. In this work Artificial bee
colony (ABC) optimization has been used as an effective optimization technique to solve the community detection problem with the advantage that the number of
communities is automatically determined in the process. However, the algorithm performance is influenced directly by the quality function used in the optimization
process. A comparison is conducted between different popular communities’ quality measures when used as an objective function within ABC. Experiments on real life networks show the capability of the ABC to successfully find an optimized community structure based on the quality function used.
We try to solve the Vehicle Routing Problem by using the Artificial Bee Colony (ABC) algorithm--an optimisation algorithm that mimics the swarm intelligence of bees in nature. We implement this algorithm in parallel over several cores and present a comparative study of the results.
A Modified Bee Colony Optimization Algorithm for Nurse Rostering ProblemAM Publications
Scheduling shifts to the nurses in the hospital is highly a complex problem. The Nurse Scheduling
Problem (NRP) is considered to be a NP-Hard. It can be solved by combinatorial optimization problem. This paper
proposes a modified BCO algorithm for solving the problem. The modified Bee Colony Optimization algorithm
modifies the forward pass phases by introducing a pipelined constructive move followed by local search and
discarding move for solving Nurse Rostering Problem.
Artificial Bee Colony (ABC) algorithm is a Nature
Inspired Algorithm (NIA) which based on intelligent food
foraging behaviour of honey bee swarm. This paper introduces
a local search strategy that enhances exploration competence
of ABC and avoids the problem of stagnation. The proposed
strategy introduces two new local search phases in original
ABC. One just after onlooker bee phase and one after scout
bee phase. The newly introduced phases are inspired by
modified Golden Section Search (GSS) strategy. The proposed
strategy named as new local search strategy in ABC
(NLSSABC). The proposed NLSSABC algorithm applied over
thirteen standard benchmark functions in order to prove its
efficiency.
WA STATE(MYANMAR) MINERAL DEPOSIT AND EXPRESS WAY R3W (KUNMING-WA STATE-BANGKOK)MYO AUNG Myanmar
WA STATE(MYANMAR) MINERAL DEPOSIT AND EXPRESS WAY R3W (KUNMING-WA STATE-BANGKOK)
DESCRIPTION: WA SET UP TIN MINE EXPORT TO CHINA and KUNMING-BANGKOK HIGHWAY ROUTE R3W ON WA STATE WA state in Myanmar set up Tin Mine in Nuoba District support by CHINESE Geological exploration WA state in Myanmar support by CHINA to do Route on KUNMING-BANGKOk HIGH WAY ROUTE R3W WA STATE IN MYANMAR HAVE REE RARE EARTH ELEMENTS DEPOSIT AND CHINESE REMINING ! ENVIRONMENT CAN BE PROBLEM.
The amount of digital data in the new era has grown exponentially in recent years and with the development of new technologies, is growing more rapidly than ever before.
Nevertheless, simply knowing that all these data are out there is easily understandable, utilizing these data to turn a profit is not trivial.
The need of data mining techniques able to extract profitable insight information is the next frontier of innovation, competition and profit.
A data analytic services provider, in order to well-scale and exponentially grow its profit, has to deal with scalability, multi-tenancy and self-adaptability.
In big data applications, machine learning is a very powerful instrument but a bad choice regarding the algorithm and its configuration parameters can easily lead to poor results. The key problem is automating the tuning process without a priori knowledge of the data and without human intervention.
In this research project we implemented and analysed TunUp: A Distributed Cloud-based Genetic Evolutionary Tuning for Data Clustering.
The proposed solution automatically evaluates and tunes data clustering algorithms, so that big data services can self-adapt and scale in a cost-efficient manner.
For our experiments, we considered k-means as clustering algorithm, that is a simple but popular algorithm, widely used in many data mining applications.
Clustering outputs are evaluated using four internal techniques: AIC, Dunn, Davies-Bouldin and Silhouette and an external evaluation: AdjustedRand.
We then performed a correlation t-test in order to validate and benchmark our internal techniques against AdjustedRand.
Defined the best evaluation criteria, the main challenge of k-means is setting the right value of k, that represents the number of clusters, and the distance measure used to compute distances of each pair of points in the data space.
To address this problem we propose an implementation of the Genetic Evolutionary Algorithm that heuristically finds out an optimal configuration of our clustering algorithm.
In order to improve performances, we implemented a parallel version of genetic algorithm developing a REST API and deploying several instances in the Amazon Cloud Computing (EC2) infrastructure.
In conclusion, with this research we contributed building and analysing TunUp, an open solution for evaluation, validation and tuning of data clustering algorithms, with a particularly focused on cloud services.
Our experiments show the quality and efficiency of tuning k-means on a set of public datasets.
The research also provides a Roadmap that gives indications of how the current system should be extended and utilized for future clustering applications, such as: Tuning of existing clustering algorithms, Supporting new algorithms design, Evaluation and comparison of different algorithms.
Practical and Worst-Case Efficient ApportionmentRaphael Reitzig
Proportional apportionment is the problem of assigning seats to parties according to their relative share of votes. Divisor methods are the de-facto standard solution, used in many countries.
In recent literature, there are two algorithms that implement divisor methods: one by Cheng and Eppstein (ISAAC, 2014) has worst-case optimal running time but is complex, while the other (Pukelsheim, 2014) is relatively simple and fast in practice but does not offer worst-case guarantees.
This talk presents the ideas behind a novel algorithm that avoids the shortcomings of both. We investigate the three contenders in order to determine which is most useful in practice.
Read more over here: http://reitzig.github.io/publications/RW2015b
Supervised learning is a category of machine learning that uses labeled datasets to train algorithms to predict outcomes and recognize patterns. Unlike unsupervised learning, supervised learning algorithms are given labeled training to learn the relationship between the input and the outputs.
Supervised machine learning algorithms make it easier for organizations to create complex models that can make accurate predictions. As a result, they are widely used across various industries and fields, including healthcare, marketing, financial services, and more.
Here, we’ll cover the fundamentals of supervised learning in AI, how supervised learning algorithms work, and some of its most common use cases.
Get started for free
How does supervised learning work?
The data used in supervised learning is labeled — meaning that it contains examples of both inputs (called features) and correct outputs (labels). The algorithms analyze a large dataset of these training pairs to infer what a desired output value would be when asked to make a prediction on new data.
For instance, let’s pretend you want to teach a model to identify pictures of trees. You provide a labeled dataset that contains many different examples of types of trees and the names of each species. You let the algorithm try to define what set of characteristics belongs to each tree based on the labeled outputs. You can then test the model by showing it a tree picture and asking it to guess what species it is. If the model provides an incorrect answer, you can continue training it and adjusting its parameters with more examples to improve its accuracy and minimize errors.
Once the model has been trained and tested, you can use it to make predictions on unknown data based on the previous knowledge it has learned.
How does supervised learning work?
The data used in supervised learning is labeled — meaning that it contains examples of both inputs (called features) and correct outputs (labels). The algorithms analyze a large dataset of these training pairs to infer what a desired output value would be when asked to make a prediction on new data.
For instance, let’s pretend you want to teach a model to identify pictures of trees. You provide a labeled dataset that contains many different examples of types of trees and the names of each species. You let the algorithm try to define what set of characteristics belongs to each tree based on the labeled outputs. You can then test the model by showing it a tree picture and asking it to guess what species it is. If the model provides an incorrect answer, you can continue training it and adjusting its parameters with more examples to improve its accuracy and minimize errors.
Once the model has been trained and tested, you can use it to make predictions on unknown data based on the previous knowledge it has learned.
Types of supervised learning
Supervised learning in machine learning is generally divided into two categories: classification and regre
In real-world scenarios, decision making can be a very challenging task even for modern computers. Generalized reinforcement learning (GRL) was developed to facilitate complex decision making in highly dynamical systems through flexible policy generalization mechanisms using kernel-based methods. GRL combines the use of sampling, kernel functions, stochastic process, non-parametric regression and functional clustering.
Cuckoo Search Algorithm: An IntroductionXin-She Yang
This presentation explains the fundamental ideas of the standard Cuckoo Search (CS) algorithm, which also contains the links to the free Matlab codes at Mathswork file exchanges and the animations of numerical simulations (video at Youtube). An example of multi-objective cuckoo search (MOCS) is also given with link to the Matlab code.
FLATMAP ZAT SHIT : les monades expliquées aux geeks (Devoxx France 2013)François Sarradin
Vous commencez à peine dans la programmation fonctionnelle avec Scala, Java 8, CoffeeScript, etc. et on vous sort déjà des noms à dormir debout. Parmi ceux-ci, il en a un qui fait la joie des Scalaïstes les plus velus : je veux parler des monades.
Dans cette session, je vous propose de découvrir ce qu'est une monade, à quoi ça sert et est-ce qu'il y a un intérêt de les étudier... ou pas ! La présentation qui contient plus de code que de slides se fera autour de deux langages : Java 8 et Scala.
Wikipedia is the largest user-generated knowledge base. We propose a structured query mechanism, entity-relationship query, for searching entities in Wikipedia corpus by their properties and inter-relationships. An entity-relationship query consists of arbitrary number of predicates on desired entities. The semantics of each predicate is specified with keywords. Entity-relationship query searches entities directly over text rather than pre-extracted structured data stores. This characteristic brings two benefits: (1) Query semantics can be intuitively expressed by keywords; (2) It avoids information loss that happens during extraction. We present a ranking framework for general entity-relationship queries and a position-based Bounded Cumulative Model for accurate ranking of query answers. Experiments on INEX benchmark queries and our own crafted queries show the effectiveness and accuracy of our ranking method.
EXPERT SYSTEMS AND SOLUTIONS
Project Center For Research in Power Electronics and Power Systems
IEEE 2010 , IEEE 2011 BASED PROJECTS FOR FINAL YEAR STUDENTS OF B.E
Email: expertsyssol@gmail.com,
Cell: +919952749533, +918608603634
www.researchprojects.info
OMR, CHENNAI
IEEE based Projects For
Final year students of B.E in
EEE, ECE, EIE,CSE
M.E (Power Systems)
M.E (Applied Electronics)
M.E (Power Electronics)
Ph.D Electrical and Electronics.
Training
Students can assemble their hardware in our Research labs. Experts will be guiding the projects.
EXPERT GUIDANCE IN POWER SYSTEMS POWER ELECTRONICS
We provide guidance and codes for the for the following power systems areas.
1. Deregulated Systems,
2. Wind power Generation and Grid connection
3. Unit commitment
4. Economic Dispatch using AI methods
5. Voltage stability
6. FLC Control
7. Transformer Fault Identifications
8. SCADA - Power system Automation
we provide guidance and codes for the for the following power Electronics areas.
1. Three phase inverter and converters
2. Buck Boost Converter
3. Matrix Converter
4. Inverter and converter topologies
5. Fuzzy based control of Electric Drives.
6. Optimal design of Electrical Machines
7. BLDC and SR motor Drives
Information-theoretic clustering with applicationsFrank Nielsen
Information-theoretic clustering with applications
Abstract: Clustering is a fundamental and key primitive to discover structural groups of homogeneous data in data sets, called clusters. The most famous clustering technique is the celebrated k-means clustering that seeks to minimize the sum of intra-cluster variances. k-Means is NP-hard as soon as the dimension and the number of clusters are both greater than 1. In the first part of the talk, we first present a generic dynamic programming method to compute the optimal clustering of n scalar elements into k pairwise disjoint intervals. This case includes 1D Euclidean k-means but also other kinds of clustering algorithms like the k-medoids, the k-medians, the k-centers, etc.
We extend the method to incorporate cluster size constraints and show how to choose the appropriate number of clusters using model selection. We then illustrate and refine the method on two case studies: 1D Bregman clustering and univariate statistical mixture learning maximizing the complete likelihood. In the second part of the talk, we introduce a generalization of k-means to cluster sets of histograms that has become an important ingredient of modern information processing due to the success of the bag-of-word modelling paradigm.
Clustering histograms can be performed using the celebrated k-means centroid-based algorithm. We consider the Jeffreys divergence that symmetrizes the Kullback-Leibler divergence, and investigate the computation of Jeffreys centroids. We prove that the Jeffreys centroid can be expressed analytically using the Lambert W function for positive histograms. We then show how to obtain a fast guaranteed approximation when dealing with frequency histograms and conclude with some remarks on the k-means histogram clustering.
References: - Optimal interval clustering: Application to Bregman clustering and statistical mixture learning IEEE ISIT 2014 (recent result poster) http://arxiv.org/abs/1403.2485
- Jeffreys Centroids: A Closed-Form Expression for Positive Histograms and a Guaranteed Tight Approximation for Frequency Histograms.
IEEE Signal Process. Lett. 20(7): 657-660 (2013) http://arxiv.org/abs/1303.7286
http://www.i.kyoto-u.ac.jp/informatics-seminar/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Artificial bee colony (abc)
1.
2. Introduced in 2005 by Dervis Karaboga
Honey bee foraging behavior
3. Types of foraging bee
◦ Employed bees
◦ Unemployed bees
Scout
Onlooker bees
Picture form www.acclaimclipart.com
4. Hive
Dancing
area for A
Dancing
area for B
Picture form www.acclaimclipart.com , www.computerclipart.com
5. Modify from Parmaksızoğlu, S.; Alçı, M. A Novel Cloning Template Designing Method by Using an Artificial Bee Colony Algorithm for
Edge Detection of CNN Based Imaging Sensors. Sensors 2011, 11, 5337-5359
7. Food source initialize
(Number of solutions = Employed bees)
xi , j = xmin, j + rand (0,1)( xmax, j − xmin, j )
Where
i = 1,2,…,n
n = Food source
j = Dimension
8. Send to each solutions (Can be done with Initial phase)
◦ Number of solutions = Employed bees
Calculate fitness
f ( x1 )
f ( x2 )
f ( x3 )
f ( x4 )
f ( x5 )
9. Evolve Solution to neighborhood Where
φij= rand(-1,1)
vij = xij + φij ( xij − xkj ) i = 1,2,…,n
n = Food source
j = Dimension
Evolved k = rand(1,n)!=i
Solution Solution
Xi Vi
j=6
Select better solution
10. Calculate probability for each solution
f ( xi )
P{xi } = n
∑ f (x )
i =1
i
Select solution due to probability
Employed bee 1 2 3 4 5
Ri<P(xi) ?
No
1 2 3 4 5 Ri =rand(0,1)
Onlooker
Modify from G. Yan et al. “” An Effective Refinement Artificial Bee Colony Optimization Algorithm
Based On Chaotic Search and Application for PID Control Tuning,Journal of Computational Information Systems 7:9 (2011) 3309-3316
11. Evolve Solution to neighborhood
Where
φij= rand(-1,1)
vij = xij + φij ( xij − xkj ) i = 1,2,…,n
n = Food source
j = Dimension
k = rand(1,n)!=i
Select better solution
(Same as Employed bee phase)
Modify from G. Yan et al. “” An Effective Refinement Artificial Bee Colony Optimization Algorithm
Based On Chaotic Search and Application for PID Control Tuning,Journal of Computational Information Systems 7:9 (2011) 3309-3316
12. No of food source visited = “limit”
Send scouts to find new
source
xmin + rand (0,1)( xmax − xmin ) , counter ≥ limit
xi (G + 1) =
xi (G ) , else
13. Swarm size
Employed bees(50% of swarm)
Onlookers(50% of swarm)
Scouts(1)
Limit
Dimension
Modify from D. Karaboga, An idea based on honey bee swarm for numerical optimization. Technical Report TR06, Erciyes University,
Engineering Faculty, Computer Engineering Department, 2005
14. Advantages
◦ Few control parameters
◦ Fast convergence
◦ Both exploration & exploitation
Disadvantages
◦ Search space limited by initial solution (normal
distribution sample should use in initialize step)
15. VEABC
◦ Multi-objective ABC
◦ Inspired by VEGA, BEPSO
◦ Separate in to k swarm
◦ Due to number of objective
◦ Evaluate each swarm to each
objective
◦ Position of each swarm -> update
neighbor solution
S.N. Omkar, J. Senthilnath, R. Khandelwal, G. Nrayana Naik, S. Gopalakrishnan “Artificial Bee Colony (ABC) for multi-objective
design optimization of composite structures
,” Applied Soft Computing, Volume 11, Issue 1, January, 2011
16. Design composite structure
◦ Objectives
Minimize weight
Minimize total cost
Specified strength
◦ Variables
Number of layers
Stacking sequence
Thickness of each layer
◦ Evaluation
Stresses of component
Failure criteria
◦ Comparison
PSO, AIS, GA
17. De Jong
◦ Function
D
∑ xi2
i =1
◦ Decision space
[ − 5.12,5.12] D
Griewangk
◦ Function
1 D 2 D xi
∑ xi − ∏ cos( i ) + 1
4000 i =1 i =1
◦ Decision space
[ − 600,600] D
M. Molga, C. Smutnicki, “Test functions for optimization needs”,
http://www.zsd.ict.pwr.wroc.pl/files/docs/functions.pdf
18. Rastrigin
◦ Function
D
10 D + ∑ ( xi2 − 10 cos(2πxi ))
i =0
◦ Decision space
[ − 5.12,5.12] D
Rosenbrock
◦ Function
∑ [100( x ]
D −1
i +1 − xi2 ) 2 + (1 − xi ) 2
i =0
◦ Decision space
[ − 2.048,2.048] D
M. Molga, C. Smutnicki, “Test functions for optimization needs”,
http://www.zsd.ict.pwr.wroc.pl/files/docs/functions.pdf
19. De Jong ◦ Swarm size = 10
◦ Swarm size = 50
5
10
◦ Swarm size = 100
0
10
Best function value
-5
10
-10
10
-15
10
0 200 400 600 800 1000 1200 1400 1600 1800 2000
Cycle
23. Effect of “limit”
Function 0.1*D*n e 0.5*D*n e D*n e No scouts
De Jong 1.40E-15 9.97E-16 9.86E-16 1.11E-15
Griewank 2.53E-14 2.52E-16 1.44E-16 0.000350
Rastrigin 5.25E-11 6.07E-16 2.31E-16 0.000336
Rosenbrock 58.310518 58.444032 51.074693 48.912436
ne is number of employed bee
Swarm size = 50, D = 50, 30 runs, 5000 evaluations