The document describes an artificial immune system approach for solving the capacitated lot sizing and scheduling problem. It discusses reviewing lot sizing problems, proposed approaches including artificial immune systems and specialized heuristics. It then describes the representation using binary encoding, evaluation of total replenishment cost, and the algorithm which generates antibodies, determines affinities, performs cloning and mutation to find higher affinity solutions.
The document discusses various lot sizing techniques used to determine optimal batch sizes for production and purchasing. It describes techniques like economic order quantity (EOQ), fixed order quantity (FOQ), lot-for-lot (LFL), periods of supply (POS), period order quantity (POQ), least unit cost (LUC), least total cost (LTC), and part period balancing (PPB). Examples are provided to illustrate how each technique works and the optimal lot size is calculated. The goal of lot sizing is to minimize total inventory costs by balancing setup/ordering costs and carrying costs.
The document introduces the profit maximizing capacitated lot-size problem with pricing (PCLSP) as a generalization of the capacitated lot-sizing problem (CLSP) that allows for pricing decisions. It presents the formulation and characteristics of PCLSP and describes how it is computationally more tractable than CLSP by introducing pricing variables. The document outlines a Lagrange relaxation algorithm for solving PCLSP using lower and upper bound subproblems and presents results showing PCLSP solves faster with smaller optimality gaps than CLSP on example problems. It discusses the practical relevance of PCLSP under different market conditions.
The document discusses the importance of summarization techniques for extracting key information from lengthy documents. Effective summarization requires identifying the most important concepts and events while removing unnecessary details to produce a high-level overview in a very concise format. Machine learning and natural language processing methods can help automate document summarization at scale.
Dynamic lot sizing for products with high setup cost subject to obsolescenceLuca Zeppetella
In several industries, sudden changes in technology, fashion and style make the product useless for its intended use at some point in time and hence its utility and therefore its demand drops to zero at that point. The increase of the fragmentation of order quantities that have taken place in
recent years makes the lot-for-lot policy unsuitable in make-to-order environments, especially in case of high setup costs. Thus, firms have to face the obsolescence risk and to produce, at their own risk, more than the ordered quantities.
Debt Market Scannner and Market Scenariopresentation.pptShivalikSingh3
The document discusses causal design and experimental design. It defines key concepts in causality such as concomitant variation, time order, and absence of other factors. It also defines variables in experimental design like independent, dependent, and extraneous variables. The document then classifies experimental designs into pre-experimental, true experimental, quasi-experimental, and statistical designs. It provides examples of different designs like one-shot case study, one-group pretest-posttest, and pretest-posttest control group design.
This document summarizes a webinar presentation about adaptive sample size re-estimation for confirmatory time-to-event trials. The presentation discusses a motivating lung cancer trial example and introduces a promising zone design where the sample size is increased only if interim results fall within a promising zone. It demonstrates the design, simulation, and interim monitoring capabilities of East®SurvAdapt software. Key aspects of the adaptive design methodology are discussed, including conditional power calculations, maintaining type 1 error control, and balancing sample size increases with trial duration.
The document provides an overview of artificial neural networks and bio-inspired algorithms. It discusses various neural network concepts like the perceptron algorithm, backpropagation, genetic algorithms, particle swarm optimization, autoencoders, and deep neural networks. It includes descriptions of key concepts, mathematical equations, examples to illustrate how different algorithms work, and comparisons between algorithms. The document serves as an introduction to neural networks and bio-inspired optimization techniques.
The document discusses various lot sizing techniques used to determine optimal batch sizes for production and purchasing. It describes techniques like economic order quantity (EOQ), fixed order quantity (FOQ), lot-for-lot (LFL), periods of supply (POS), period order quantity (POQ), least unit cost (LUC), least total cost (LTC), and part period balancing (PPB). Examples are provided to illustrate how each technique works and the optimal lot size is calculated. The goal of lot sizing is to minimize total inventory costs by balancing setup/ordering costs and carrying costs.
The document introduces the profit maximizing capacitated lot-size problem with pricing (PCLSP) as a generalization of the capacitated lot-sizing problem (CLSP) that allows for pricing decisions. It presents the formulation and characteristics of PCLSP and describes how it is computationally more tractable than CLSP by introducing pricing variables. The document outlines a Lagrange relaxation algorithm for solving PCLSP using lower and upper bound subproblems and presents results showing PCLSP solves faster with smaller optimality gaps than CLSP on example problems. It discusses the practical relevance of PCLSP under different market conditions.
The document discusses the importance of summarization techniques for extracting key information from lengthy documents. Effective summarization requires identifying the most important concepts and events while removing unnecessary details to produce a high-level overview in a very concise format. Machine learning and natural language processing methods can help automate document summarization at scale.
Dynamic lot sizing for products with high setup cost subject to obsolescenceLuca Zeppetella
In several industries, sudden changes in technology, fashion and style make the product useless for its intended use at some point in time and hence its utility and therefore its demand drops to zero at that point. The increase of the fragmentation of order quantities that have taken place in
recent years makes the lot-for-lot policy unsuitable in make-to-order environments, especially in case of high setup costs. Thus, firms have to face the obsolescence risk and to produce, at their own risk, more than the ordered quantities.
Debt Market Scannner and Market Scenariopresentation.pptShivalikSingh3
The document discusses causal design and experimental design. It defines key concepts in causality such as concomitant variation, time order, and absence of other factors. It also defines variables in experimental design like independent, dependent, and extraneous variables. The document then classifies experimental designs into pre-experimental, true experimental, quasi-experimental, and statistical designs. It provides examples of different designs like one-shot case study, one-group pretest-posttest, and pretest-posttest control group design.
This document summarizes a webinar presentation about adaptive sample size re-estimation for confirmatory time-to-event trials. The presentation discusses a motivating lung cancer trial example and introduces a promising zone design where the sample size is increased only if interim results fall within a promising zone. It demonstrates the design, simulation, and interim monitoring capabilities of East®SurvAdapt software. Key aspects of the adaptive design methodology are discussed, including conditional power calculations, maintaining type 1 error control, and balancing sample size increases with trial duration.
The document provides an overview of artificial neural networks and bio-inspired algorithms. It discusses various neural network concepts like the perceptron algorithm, backpropagation, genetic algorithms, particle swarm optimization, autoencoders, and deep neural networks. It includes descriptions of key concepts, mathematical equations, examples to illustrate how different algorithms work, and comparisons between algorithms. The document serves as an introduction to neural networks and bio-inspired optimization techniques.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
Mental health has been in the news quite a bit lately. Dozens of U.S. states are currently suing Meta for contributing to the youth mental health crisis by inserting addictive features into their products, while the U.S. Surgeon General is touring the nation to bring awareness to the growing epidemic of loneliness and isolation. The country has endured periods of low national morale, such as in the 1970s when high inflation and the energy crisis worsened public sentiment following the Vietnam War. The current mood, however, feels different. Gallup recently reported that national mental health is at an all-time low, with few bright spots to lift spirits.
To better understand how Americans are feeling and their attitudes towards mental health in general, ThinkNow conducted a nationally representative quantitative survey of 1,500 respondents and found some interesting differences among ethnic, age and gender groups.
Technology
For example, 52% agree that technology and social media have a negative impact on mental health, but when broken out by race, 61% of Whites felt technology had a negative effect, and only 48% of Hispanics thought it did.
While technology has helped us keep in touch with friends and family in faraway places, it appears to have degraded our ability to connect in person. Staying connected online is a double-edged sword since the same news feed that brings us pictures of the grandkids and fluffy kittens also feeds us news about the wars in Israel and Ukraine, the dysfunction in Washington, the latest mass shooting and the climate crisis.
Hispanics may have a built-in defense against the isolation technology breeds, owing to their large, multigenerational households, strong social support systems, and tendency to use social media to stay connected with relatives abroad.
Age and Gender
When asked how individuals rate their mental health, men rate it higher than women by 11 percentage points, and Baby Boomers rank it highest at 83%, saying it’s good or excellent vs. 57% of Gen Z saying the same.
Gen Z spends the most amount of time on social media, so the notion that social media negatively affects mental health appears to be correlated. Unfortunately, Gen Z is also the generation that’s least comfortable discussing mental health concerns with healthcare professionals. Only 40% of them state they’re comfortable discussing their issues with a professional compared to 60% of Millennials and 65% of Boomers.
Race Affects Attitudes
As seen in previous research conducted by ThinkNow, Asian Americans lag other groups when it comes to awareness of mental health issues. Twenty-four percent of Asian Americans believe that having a mental health issue is a sign of weakness compared to the 16% average for all groups. Asians are also considerably less likely to be aware of mental health services in their communities (42% vs. 55%) and most likely to seek out information on social media (51% vs. 35%).
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
Creative operations teams expect increased AI use in 2024. Currently, over half of tasks are not AI-enabled, but this is expected to decrease in the coming year. ChatGPT is the most popular AI tool currently. Business leaders are more actively exploring AI benefits than individual contributors. Most respondents do not believe AI will impact workforce size in 2024. However, some inhibitions still exist around AI accuracy and lack of understanding. Creatives primarily want to use AI to save time on mundane tasks and boost productivity.
Organizational culture includes values, norms, systems, symbols, language, assumptions, beliefs, and habits that influence employee behaviors and how people interpret those behaviors. It is important because culture can help or hinder a company's success. Some key aspects of Netflix's culture that help it achieve results include hiring smartly so every position has stars, focusing on attitude over just aptitude, and having a strict policy against peacocks, whiners, and jerks.
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
PepsiCo provided a safe harbor statement noting that any forward-looking statements are based on currently available information and are subject to risks and uncertainties. It also provided information on non-GAAP measures and directing readers to its website for disclosure and reconciliation. The document then discussed PepsiCo's business overview, including that it is a global beverage and convenient food company with iconic brands, $91 billion in net revenue in 2023, and nearly $14 billion in core operating profit. It operates through a divisional structure with a focus on local consumers.
Content Methodology: A Best Practices Report (Webinar)contently
This document provides an overview of content methodology best practices. It defines content methodology as establishing objectives, KPIs, and a culture of continuous learning and iteration. An effective methodology focuses on connecting with audiences, creating optimal content, and optimizing processes. It also discusses why a methodology is needed due to the competitive landscape, proliferation of channels, and opportunities for improvement. Components of an effective methodology include defining objectives and KPIs, audience analysis, identifying opportunities, and evaluating resources. The document concludes with recommendations around creating a content plan, testing and optimizing content over 90 days.
How to Prepare For a Successful Job Search for 2024Albert Qian
The document provides guidance on preparing a job search for 2024. It discusses the state of the job market, focusing on growth in AI and healthcare but also continued layoffs. It recommends figuring out what you want to do by researching interests and skills, then conducting informational interviews. The job search should involve building a personal brand on LinkedIn, actively applying to jobs, tailoring resumes and interviews, maintaining job hunting as a habit, and continuing self-improvement. Once hired, the document advises setting new goals and keeping skills and networking active in case of future opportunities.
A report by thenetworkone and Kurio.
The contributing experts and agencies are (in an alphabetical order): Sylwia Rytel, Social Media Supervisor, 180heartbeats + JUNG v MATT (PL), Sharlene Jenner, Vice President - Director of Engagement Strategy, Abelson Taylor (USA), Alex Casanovas, Digital Director, Atrevia (ES), Dora Beilin, Senior Social Strategist, Barrett Hoffher (USA), Min Seo, Campaign Director, Brand New Agency (KR), Deshé M. Gully, Associate Strategist, Day One Agency (USA), Francesca Trevisan, Strategist, Different (IT), Trevor Crossman, CX and Digital Transformation Director; Olivia Hussey, Strategic Planner; Simi Srinarula, Social Media Manager, The Hallway (AUS), James Hebbert, Managing Director, Hylink (CN / UK), Mundy Álvarez, Planning Director; Pedro Rojas, Social Media Manager; Pancho González, CCO, Inbrax (CH), Oana Oprea, Head of Digital Planning, Jam Session Agency (RO), Amy Bottrill, Social Account Director, Launch (UK), Gaby Arriaga, Founder, Leonardo1452 (MX), Shantesh S Row, Creative Director, Liwa (UAE), Rajesh Mehta, Chief Strategy Officer; Dhruv Gaur, Digital Planning Lead; Leonie Mergulhao, Account Supervisor - Social Media & PR, Medulla (IN), Aurelija Plioplytė, Head of Digital & Social, Not Perfect (LI), Daiana Khaidargaliyeva, Account Manager, Osaka Labs (UK / USA), Stefanie Söhnchen, Vice President Digital, PIABO Communications (DE), Elisabeth Winiartati, Managing Consultant, Head of Global Integrated Communications; Lydia Aprina, Account Manager, Integrated Marketing and Communications; Nita Prabowo, Account Manager, Integrated Marketing and Communications; Okhi, Web Developer, PNTR Group (ID), Kei Obusan, Insights Director; Daffi Ranandi, Insights Manager, Radarr (SG), Gautam Reghunath, Co-founder & CEO, Talented (IN), Donagh Humphreys, Head of Social and Digital Innovation, THINKHOUSE (IRE), Sarah Yim, Strategy Director, Zulu Alpha Kilo (CA).
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
The search marketing landscape is evolving rapidly with new technologies, and professionals, like you, rely on innovative paid search strategies to meet changing demands.
It’s important that you’re ready to implement new strategies in 2024.
Check this out and learn the top trends in paid search advertising that are expected to gain traction, so you can drive higher ROI more efficiently in 2024.
You’ll learn:
- The latest trends in AI and automation, and what this means for an evolving paid search ecosystem.
- New developments in privacy and data regulation.
- Emerging ad formats that are expected to make an impact next year.
Watch Sreekant Lanka from iQuanti and Irina Klein from OneMain Financial as they dive into the future of paid search and explore the trends, strategies, and technologies that will shape the search marketing landscape.
If you’re looking to assess your paid search strategy and design an industry-aligned plan for 2024, then this webinar is for you.
5 Public speaking tips from TED - Visualized summarySpeakerHub
From their humble beginnings in 1984, TED has grown into the world’s most powerful amplifier for speakers and thought-leaders to share their ideas. They have over 2,400 filmed talks (not including the 30,000+ TEDx videos) freely available online, and have hosted over 17,500 events around the world.
With over one billion views in a year, it’s no wonder that so many speakers are looking to TED for ideas on how to share their message more effectively.
The article “5 Public-Speaking Tips TED Gives Its Speakers”, by Carmine Gallo for Forbes, gives speakers five practical ways to connect with their audience, and effectively share their ideas on stage.
Whether you are gearing up to get on a TED stage yourself, or just want to master the skills that so many of their speakers possess, these tips and quotes from Chris Anderson, the TED Talks Curator, will encourage you to make the most impactful impression on your audience.
See the full article and more summaries like this on SpeakerHub here: https://speakerhub.com/blog/5-presentation-tips-ted-gives-its-speakers
See the original article on Forbes here:
http://www.forbes.com/forbes/welcome/?toURL=http://www.forbes.com/sites/carminegallo/2016/05/06/5-public-speaking-tips-ted-gives-its-speakers/&refURL=&referrer=#5c07a8221d9b
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
Everyone is in agreement that ChatGPT (and other generative AI tools) will shape the future of work. Yet there is little consensus on exactly how, when, and to what extent this technology will change our world.
Businesses that extract maximum value from ChatGPT will use it as a collaborative tool for everything from brainstorming to technical maintenance.
For individuals, now is the time to pinpoint the skills the future professional will need to thrive in the AI age.
Check out this presentation to understand what ChatGPT is, how it will shape the future of work, and how you can prepare to take advantage.
The document provides career advice for getting into the tech field, including:
- Doing projects and internships in college to build a portfolio.
- Learning about different roles and technologies through industry research.
- Contributing to open source projects to build experience and network.
- Developing a personal brand through a website and social media presence.
- Networking through events, communities, and finding a mentor.
- Practicing interviews through mock interviews and whiteboarding coding questions.
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
1. Core updates from Google periodically change how its algorithms assess and rank websites and pages. This can impact rankings through shifts in user intent, site quality issues being caught up to, world events influencing queries, and overhauls to search like the E-A-T framework.
2. There are many possible user intents beyond just transactional, navigational and informational. Identifying intent shifts is important during core updates. Sites may need to optimize for new intents through different content types and sections.
3. Responding effectively to core updates requires analyzing "before and after" data to understand changes, identifying new intents or page types, and ensuring content matches appropriate intents across video, images, knowledge graphs and more.
A brief introduction to DataScience with explaining of the concepts, algorithms, machine learning, supervised and unsupervised learning, clustering, statistics, data preprocessing, real-world applications etc.
It's part of a Data Science Corner Campaign where I will be discussing the fundamentals of DataScience, AIML, Statistics etc.
Time Management & Productivity - Best PracticesVit Horky
Here's my presentation on by proven best practices how to manage your work time effectively and how to improve your productivity. It includes practical tips and how to use tools such as Slack, Google Apps, Hubspot, Google Calendar, Gmail and others.
The six step guide to practical project managementMindGenius
The six step guide to practical project management
If you think managing projects is too difficult, think again.
We’ve stripped back project management processes to the
basics – to make it quicker and easier, without sacrificing
the vital ingredients for success.
“If you’re looking for some real-world guidance, then The Six Step Guide to Practical Project Management will help.”
Dr Andrew Makar, Tactical Project Management
2. Outline of the Presentation
Review of the lot sizing problems
AIS and SFL as alternative approaches
Implementation
Results and Scope for future work
Rohit Voothaluru, IIT Guwahati
3. Review of Lot sizing Problems
Characteristics used in defining lot sizing:
Planning Horizon- time interval on which the
Plan schedule extends into the future.
No. of levels
Resource constraints – capacitated or un-
capacitated.
Deterioration of items.
Demand.
Inventory shortage.
Rohit Voothaluru, IIT Guwahati
5. Assumptions
The demand is deterministic, varying with time
Shortages aren’t allowed
Replenishment lead time is zero
Size of the replenishment must be established for at least one
period
The item is treated as independent from other items,
replenishment in groups aren’t allowed
Rohit Voothaluru, IIT Guwahati
6. Parameters
Qj : Replenishment order quantity in the jth period(units)
A : Fixed cost component (independent of replenishment
quantity) incurred with each replenishment quantity
D (j) : Demand rate of the item in period j (j=1,2...N)
TRC (Q) : Total replenishment cost per unit time
Rohit Voothaluru, IIT Guwahati
7. Problem
Ij : Ending inventory in period j (units)
h : Inventory cost per unit ( $/unit)
( A (Q j ) hI j )
n
Minimize: Total replenishment cost :
i 1
Subject to:
Ij = Ij-1 + Qj − Dj ; j = 1, 2,…,N
Qj ≥ 0; j = 1, 2,…,N
Ij ≥ 0; j =1, 2,…,N
δ(Qj) = 0, if Qj =0
= 1, if Qj >0
Rohit Voothaluru, IIT Guwahati
9. Heuristics
The lot sizing and scheduling deals with two tasks
Finding the best replenishment procedure
The best possible schedule for the jobs on
specified machines
Rohit Voothaluru, IIT Guwahati
10. Heuristics
Lot sizing task is NP-Hard
Scheduling problem in this case is also NP-Hard
We need to solve these separately for best solution
Rohit Voothaluru, IIT Guwahati
11. Heuristics
NP-Hard implies no polynomial time
algorithm
Heuristics are used to suggest a possible
procedure
It may be correct, but may not be proven to
produce an optimal solution#
Rohit Voothaluru, IIT Guwahati
# Pearl, Judea (April 1984). Heuristics. Addison-Wesley Publication.
12. Heuristics
Fundamental goals of any polynomial time
algorithm:
Finding algorithms with good runtime
(i)
Finding algorithms to get optimum quality solution
(ii)
Heuristics abandon one or both of the above
Lack proof; But, backed by good results over the
past few decades
Rohit Voothaluru, IIT Guwahati
14. Proposed Approach
Artificial Immune Systems strategy
Performance on other NP-Hard problems
Application of AIS in previous works
prompted our decision to explore its
ability on CLSP IIT Guwahati
Rohit Voothaluru,
15. Artificial Immune Systems
An antigen is used to represent the
programming problem to be addressed
A potential solution is called an antibody
Generating an antibody set
Rohit Voothaluru, IIT Guwahati
16. Artificial Immune Systems
Affinity is the attraction between the antigen and the
antibody (receptor cells)
Analogous to the shape-complementary structures in
biological systems
The affinity function is defined as
Affinity = 1/ (objective function)
Rohit Voothaluru, IIT Guwahati
17. Artificial Immune Systems
Affinity criterion is used to determine
Fate of the antibody
Completion of the algorithm
When the antibody set has not yielded affinity
relating to algorithm completion, individual
antibodies are replaced, cloned or hypermutated
Rohit Voothaluru, IIT Guwahati
18. Operative Mechanisms
The operative mechanisms of immune system
Clonal Selection
Affinity Maturation
These mechanisms form the basis for the AIS
strategy
Rohit Voothaluru, IIT Guwahati
19. Cloning
Initial Set
Initial population
TRC Affinity (1/TRC)
1–0–1–0–0–1–1–0–0–1–0 500 0.00200
1–1–0–1–0–0–0–1–1–0–0 580 0.00172
1–0–0–1–1–0–0–0–1–0–1 430 0.00232
1–1–1–0–0–0–0–1–0–1–1 610 0.00164
1–1–1–1–1–0–0–0–0–0–1 730 0.00137
Average Value of Affinity = 0.00181
Rohit Voothaluru, IIT Guwahati
20. Cloning
New Population
Cloned Generation
TRC Affinity (1/TRC)
1–0–0–1–1–0–0–0–1–0–1 430 0.00232
1–0–0–1–1–0–0–0–1–0–1 430 0.00232
1–0–1–0–0–1–1–0–0–1–0 500 0.00200
1–0–1–0–0–1–1–0–0–1–0 500 0.00200
1–1–0–1–0–0–0–1–1–0–0 580 0.00172
Average Value of Affinity = 0.00207
Rohit Voothaluru, IIT Guwahati
21. Affinity Maturation
The process of mutation and selection of
antibodies that better recognize the antigen
Basic mechanisms
1) Hypermutation
2) Receptor Editing
Rohit Voothaluru, IIT Guwahati
22. Mutation
Two phase mutation procedure has been
adopted in the present algorithm for lot
sizing problem
They are
Inverse
Pair-wise interchange
Rohit Voothaluru, IIT Guwahati
23. Artificial Immune Systems-Mutation
Inverse Mutation:
Sequence between two points ‘i’ and ‘j’ is
inversed in the antibody
Eg.:
Clone: 1 – 0 – 1 – 1 – 1 – 0 – 0 – 1 – 0
New: 1 – 0 – 1 – 1 – 0 – 0 – 1 – 1 – 0
Rohit Voothaluru, IIT Guwahati
25. Representation
Suitable for the problem
Close interaction between encoding and
affinity function
Satisfy the problem at hand
Rohit Voothaluru, IIT Guwahati
26. Representation
Replenishment is done at the beginning of each period
Best strategy must involve quantities that serve for an
integer number of periods
Binary encoding with N bits
N is the number of periods in planning horizon
Rohit Voothaluru, IIT Guwahati
27. Representation
The replenishment quantity in any period i,Q i is given
by i T
Qi D( j )
i
j 1
Where Ti is the number of bits from ith bit to the first bit
on the right, which has value 1
If ith bit has a value =1 then, we need to replenish at the
beginning of that period
Rohit Voothaluru, IIT Guwahati
28. Representation - Illustration
Let this be a potential solution
1 0 0 1 0 0 0 1 0 1 0 1
First replenishment is at first period, i=1, Ti = 2
Q1 = D1 + D2 + D3
Q4 = D4 + D5 + D6 + D7 ; i=4, Ti = 3
Q8 = D8 + D9 ; i=8, Ti = 1
Q10= D10 + D11 + D12 ; i=10, Ti = 2
This scheme is proposed to handle the problem using
Artificial Immune Systems
29. Evaluation
Total replenishment cost
T T
TRC kA h QCk
k 1 k 1
Tk
QCk ( j 1) D j
j 1
T = number of replenishments
QCk = carrying units corresponding to kth replenishment
Tk = number of ‘0’ bits between kth and (k+1)th period
Rohit Voothaluru, IIT Guwahati
30. Algorithm
1: Generate an antibody set (solution population)
2: Determine the affinity of these antibodies
3: Cloning according to affinities
4: For generated strings:
a) Inverse Mutation
b) Decode and evaluate the total replenishment cost
c) if TRC(new string) < TRC(clone), clone = new string
else go to d)
Rohit Voothaluru, IIT Guwahati
31. Algorithm
d) Pairwise interchange mutation
e) Decode and evaluate the total replenishment cost
f) if TRC(new string) < TRC(clone), clone = new string
else, clone=clone; antibody=clone
5. New antibody population
6. Receptor editing
7. If no. of iterations=Max or affinity criterion is
satisfied: Stop,
else, go to Step 2
33. Scheduling
Follows the replenishment phase
Assignment of orders to work centers
Relative priorities of the jobs
Rohit Voothaluru, IIT Guwahati
34. Scheduling
Encountered in any shop floor with ‘m’
machines and ‘n’ jobs
Allocation of tasks to time intervals on
machines
Minimizing the makespan
Rohit Voothaluru, IIT Guwahati
35. Scheduling
Each job consists of sequence of tasks
Hard to find optimal solution
Several heuristics were employed
Rohit Voothaluru, IIT Guwahati
36. Scheduling
The problem has two constraints:
(i) Sequence constraints
(ii) Resource constraints
Rohit Voothaluru, IIT Guwahati
37. Scheduling
Sequence constraint: Two operations cannot
be processed at the same time
Resource constraint: No more than one job can
be handled on one machine at the same time
Rohit Voothaluru, IIT Guwahati
38. Problem
n m
Z ( qimk ( X ik pik ))
Minimize:
i 1 k 1
Subject to :
m m
q ( X ik pik ) qi ( j 1) k X ik
i)Sequence constraint imk
k 1 k 1
X hk X ik pik ( H pik )(1 Yihk )
ii)Resource constraints:
X ik X hk phk ( H phk )Yihk
where, pik is the processing time of job i on machine k, Xik be the starting/waiting time
of job i on machine k ,Yihk = 1 of i precedes h on machine k or else 0; qijk is 1 if
operation j of job i requires processing on machine k; H is a very large number
39. Scheduling
AIS developed can be modified for use in
scheduling case
The objective function differs between the two
We also propose a memetic heuristic for
comprehensive study
Rohit Voothaluru, IIT Guwahati
40. Proposed strategies
Development of a Shuffled Frog Leaping
algorithm
Shuffled Frog Leaping has not been explored to a
great extent in case of the lot sizing problems
We intend to provide a new way of solving the
problem along with our existing solution
Rohit Voothaluru, IIT Guwahati
41. Proposed strategies
Why shuffled frog leaping only?
PSOs were successful with scheduling
Memetic algorithms were also successful to an
extent
SFLA combines the benefits of genetic based
MAs and the social behavior based PSOs
Rohit Voothaluru, IIT Guwahati
42. Notifications
Notifications
Actual SFLA
Solutions Frogs
Subset of
Memeplexes
solutions
Rohit Voothaluru, IIT Guwahati
43. Comparison
AIS Shuffled Frog Leaping Algorithm
Qualities can be transferred Information can be
only from one chromosome to Transmitted between any two
its clone individuals
Improved idea can be Improved idea can be
incorporated after full incorporated as and when it is
generation is replenished found
Improvement by cloning is Number of individuals that
limited to the number of can take over from single
clones based upon affinity entity does not have a limit
Rohit Voothaluru, IIT Guwahati
44. Advantages
Progressive improvement of ideas held by the
frogs (potential solutions)
Ideas are passed between all individuals in the
population
Unlike parent sibling relation in other AI
techniques
Rohit Voothaluru, IIT Guwahati
45. Shuffled Frog Leaping
Goal of the frogs is to find the stone with maximum amount of food as quickly
as possible by improving their memes
Rohit Voothaluru, IIT Guwahati
48. Shuffled Frog Leaping
Exchange of information by communicating the best local position and
adjusting leap step size
Rohit Voothaluru, IIT Guwahati
49. Shuffled Frog Leaping
Quick achievement of final goal due to local and global interaction and
adjustment of leap size accordingly
Rohit Voothaluru, IIT Guwahati
50. Shuffled Frog Leaping
A sample of virtual frogs constitutes the
population
Partition into memeplexes
Our SFLA considers discrete variables as opposed
to PSO and Shuffled Computing Evolution
Rohit Voothaluru, IIT Guwahati
51. Shuffled Frog Leaping
Defined number of memetic evolution steps
Information is passed by shuffling
Enhances solution quality due to exchange in
information from different sources
Rohit Voothaluru, IIT Guwahati
52. Shuffled Frog Leaping
Shuffling ensures that evolution is free from bias
The process is repeated
Local search and shuffling repeat until
convergence criterion is satisfied
Rohit Voothaluru, IIT Guwahati
53. Shuffled Frog Leaping
Number of frogs (solutions)
Number of memeplexes
Number of generations before
Main
shuffling
parameters
Max. Number of shuffling iterations
Maximum step size for leaping
Rohit Voothaluru, IIT Guwahati
54. The algorithm
1. Generate the population
2. Choose the number of memeplexes
3. Select the number of steps to be completed in a memeplex before shuffling
4. Divide the population into subsets (memeplexes)
5. Determine the best and worst frog in each memeplex
6. Improve the worst frog position
55. The algorithm
7. Repeat for a specific number of iterations
8. Combine the evolved memeplexes
9. Sort the population in decreasing order of their fitness and check for termination
If true, End
Rohit Voothaluru, IIT Guwahati
56. Transformation
SFL requires transformation from permutation
space to search space
Greatest Value Priority is employed for
transformation
Condition to be satisfied by the transformation
function f
For any memetic vector in search space there must be
one and only one permutation corresponding to it
Rohit Voothaluru, IIT Guwahati
57. Transformation
For arbitrary position in space,
X = {x1, x2, …, xn}
where xi ε { -P_min,-P_max}
for i = { 1, 2, …, n}
The only permutation that corresponds to X
is A = { a1, a2, … , an} which represents the
solution
58. Transformation
For a component xi,
n
if ( xj xi ).1, else.0
k=1+
j 1
Then, ak = i
In GVP the maximum quantity in Xi is first
chosen out and its index number becomes
the value of the first element a1 in A
59. Representation
The velocity function shall be similar to that in
PSO
Vi I 1 Vi I C1 * Rand () * ( X bI X w ) C2 * Rand () * ( X g X w )
I I I
X w1 X w Vi I 1
I I
Where C1, C2 are constants and Rand()
generates random number between 0 and 1
Rohit Voothaluru, IIT Guwahati
60. Results
Fixed setup cost = 200 units
Holding cost = 20 per unit in inventory
Number of periods is taken as a parameter
The algorithm was run on C platform on a
1GHz Pentium Dual Core computer
Rohit Voothaluru, IIT Guwahati
63. Lot sizing problem
2.5e+5
2.0e+5
AIS value and SM value
1.5e+5
1.0e+5
5.0e+4
0.0
0 20 40 60 80 100 120
No. of periods
SM value vs No. of periods
AIS value Vs No. of periods.
64. Results
Algorithm was tested on 10 and 12 period
problems
Per unit inventory holding cost = 0.4 units
With varying demands for each period proposed
by Hindi9 as 10, 62, 12, 130, 154, 129, 88, 124, 160,
238, 41, 52
Rohit Voothaluru, IIT Guwahati
66. Results
Tested the AIS and SFL algorithms for the
second phase
The algorithms were tested on problem
instances from OR-library contributed by Dirk
Mattfield and Rob Vassens
The results are as shown in the following table
Rohit Voothaluru, IIT Guwahati
68. Summary
The algorithms worked well for most of the
instances
AIS algorithm was particularly successful in lot
sizing decisions involving larger number of
periods
For fewer periods the results obtained were on
par with the existing solutions
Rohit Voothaluru, IIT Guwahati
69. Summary
AIS algorithm proposed can be employed for
both phases
Results obtained showed that SFL worked
better in case of certain problems for the
second phase
We can thus employ the AIS for evaluating
TRC and SFL for the scheduling phase
Rohit Voothaluru, IIT Guwahati
70. Scope for future work
The AIS algorithm suggested can be coupled
with other metaheuristics to develop a hybrid
algorithm
The solutions can be further improved by
employing different representation schemes in
SFL
Rohit Voothaluru, IIT Guwahati
71. Scope for future work
Owing to the simply constructed nature of the
algorithms they can be tweaked to
accommodate new constraints
The algorithms can be successfully employed
for solving the huge number of variants of lot
sizing problems
Rohit Voothaluru, IIT Guwahati