The Vortex Search (VS) algorithm is one of the recently proposed metaheuristic algorithms which was inspired from the vortical flow of the stirred fluids. Although the VS algorithm is
shown to be a good candidate for the solution of certain optimization problems, it also has some drawbacks. In the VS algorithm, candidate solutions are generated around the current best solution by using a Gaussian distribution at each iteration pass. This provides simplicity to the
algorithm but it also leads to some problems along. Especially, for the functions those have a number of local minimum points, to select a single point to generate candidate solutions leads the algorithm to being trapped into a local minimum point. Due to the adaptive step-size
adjustment scheme used in the VS algorithm, the locality of the created candidate solutions is increased at each iteration pass. Therefore, if the algorithm cannot escape a local point as
quickly as possible, it becomes much more difficult for the algorithm to escape from that point
in the latter iterations. In this study, a modified Vortex Search algorithm (MVS) is proposed to
overcome above mentioned drawback of the existing VS algorithm. In the MVS algorithm, the candidate solutions are generated around a number of points at each iteration pass. Computational results showed that with the help of this modification the global search ability of
the existing VS algorithm is improved and the MVS algorithm outperformed the existing VS algorithm, PSO2011 and ABC algorithms for the benchmark numerical function set.
A MODIFIED VORTEX SEARCH ALGORITHM FOR NUMERICAL FUNCTION OPTIMIZATIONijaia
The Vortex Search (VS) algorithm is one of the recently proposed metaheuristic algorithms which was
inspired from the vortical flow of the stirred fluids. Although the VS algorithm is shown to be a good
candidate for the solution of certain optimization problems, it also has some drawbacks. In the VS
algorithm, candidate solutions are generated around the current best solution by using a Gaussian
distribution at each iteration pass. This provides simplicity to the algorithm but it also leads to some
problems along. Especially, for the functions those have a number of local minimum points, to select a
single point to generate candidate solutions leads the algorithm to being trapped into a local minimum
point. Due to the adaptive step-size adjustment scheme used in the VS algorithm, the locality of the created
candidate solutions is increased at each iteration pass. Therefore, if the algorithm cannot escape a local
point as quickly as possible, it becomes much more difficult for the algorithm to escape from that point in
the latter iterations. In this study, a modified Vortex Search algorithm (MVS) is proposed to overcome
above mentioned drawback of the existing VS algorithm. In the MVS algorithm, the candidate solutions
are generated around a number of points at each iteration pass. Computational results showed that with
the help of this modification the global search ability of the existing VS algorithm is improved and the
MVS algorithm outperformed the existing VS algorithm, PSO2011 and ABC algorithms for the benchmark
numerical function set.
GENETIC ALGORITHM FOR FUNCTION APPROXIMATION: AN EXPERIMENTAL INVESTIGATIONijaia
Function Approximation is a popular engineering problems used in system identification or Equation
optimization. Due to the complex search space it requires, AI techniques has been used extensively to spot
the best curves that match the real behavior of the system. Genetic algorithm is known for their fast
convergence and their ability to find an optimal structure of the solution. We propose using a genetic
algorithm as a function approximator. Our attempt will focus on using the polynomial form of the
approximation. After implementing the algorithm, we are going to report our results and compare it with
the real function output.
This is a presentation that I gave to my research group. It is about probabilistic extensions to Principal Components Analysis, as proposed by Tipping and Bishop.
APPROACHES IN USING EXPECTATIONMAXIMIZATION ALGORITHM FOR MAXIMUM LIKELIHOOD ...cscpconf
EM algorithm is popular in maximum likelihood estimation of parameters for state-space models. However, extant approaches for the realization of EM algorithm are still not able to fulfill the task of identification systems, which have external inputs and constrained parameters. In this paper, we propose new approaches for both initial guessing and MLE of the parameters of a constrained state-space model with an external input. Using weighted least square for the initial guess and the partial differentiation of the joint log-likelihood function for the EM algorithm, we estimate the parameters and compare the estimated values with the “actual” values, which are set to generate simulation data. Moreover, asymptotic variances of the estimated parameters are calculated when the sample size is large, while statistics of the estimated parameters are obtained through bootstrapping when the sample size issmall. The results demonstrate that the estimated values are close to the “actual” values.Consequently, our approaches are promising and can applied in future research.
Covariance matrices are central to many adaptive filtering and optimisation problems. In practice, they have to be estimated from a finite number of samples; on this, I will review some known results from spectrum estimation and multiple-input multiple-output communications systems, and how properties that are assumed to be inherent in covariance and power spectral densities can easily be lost in the estimation process. I will discuss new results on space-time covariance estimation, and how the estimation from finite sample sets will impact on factorisations such as the eigenvalue decomposition, which is often key to solving the introductory optimisation problems. The purpose of the presentation is to give you some insight into estimating statistics as well as to provide a glimpse on classical signal processing challenges such as the separation of sources from a mixture of signals.
A MODIFIED VORTEX SEARCH ALGORITHM FOR NUMERICAL FUNCTION OPTIMIZATIONijaia
The Vortex Search (VS) algorithm is one of the recently proposed metaheuristic algorithms which was
inspired from the vortical flow of the stirred fluids. Although the VS algorithm is shown to be a good
candidate for the solution of certain optimization problems, it also has some drawbacks. In the VS
algorithm, candidate solutions are generated around the current best solution by using a Gaussian
distribution at each iteration pass. This provides simplicity to the algorithm but it also leads to some
problems along. Especially, for the functions those have a number of local minimum points, to select a
single point to generate candidate solutions leads the algorithm to being trapped into a local minimum
point. Due to the adaptive step-size adjustment scheme used in the VS algorithm, the locality of the created
candidate solutions is increased at each iteration pass. Therefore, if the algorithm cannot escape a local
point as quickly as possible, it becomes much more difficult for the algorithm to escape from that point in
the latter iterations. In this study, a modified Vortex Search algorithm (MVS) is proposed to overcome
above mentioned drawback of the existing VS algorithm. In the MVS algorithm, the candidate solutions
are generated around a number of points at each iteration pass. Computational results showed that with
the help of this modification the global search ability of the existing VS algorithm is improved and the
MVS algorithm outperformed the existing VS algorithm, PSO2011 and ABC algorithms for the benchmark
numerical function set.
GENETIC ALGORITHM FOR FUNCTION APPROXIMATION: AN EXPERIMENTAL INVESTIGATIONijaia
Function Approximation is a popular engineering problems used in system identification or Equation
optimization. Due to the complex search space it requires, AI techniques has been used extensively to spot
the best curves that match the real behavior of the system. Genetic algorithm is known for their fast
convergence and their ability to find an optimal structure of the solution. We propose using a genetic
algorithm as a function approximator. Our attempt will focus on using the polynomial form of the
approximation. After implementing the algorithm, we are going to report our results and compare it with
the real function output.
This is a presentation that I gave to my research group. It is about probabilistic extensions to Principal Components Analysis, as proposed by Tipping and Bishop.
APPROACHES IN USING EXPECTATIONMAXIMIZATION ALGORITHM FOR MAXIMUM LIKELIHOOD ...cscpconf
EM algorithm is popular in maximum likelihood estimation of parameters for state-space models. However, extant approaches for the realization of EM algorithm are still not able to fulfill the task of identification systems, which have external inputs and constrained parameters. In this paper, we propose new approaches for both initial guessing and MLE of the parameters of a constrained state-space model with an external input. Using weighted least square for the initial guess and the partial differentiation of the joint log-likelihood function for the EM algorithm, we estimate the parameters and compare the estimated values with the “actual” values, which are set to generate simulation data. Moreover, asymptotic variances of the estimated parameters are calculated when the sample size is large, while statistics of the estimated parameters are obtained through bootstrapping when the sample size issmall. The results demonstrate that the estimated values are close to the “actual” values.Consequently, our approaches are promising and can applied in future research.
Covariance matrices are central to many adaptive filtering and optimisation problems. In practice, they have to be estimated from a finite number of samples; on this, I will review some known results from spectrum estimation and multiple-input multiple-output communications systems, and how properties that are assumed to be inherent in covariance and power spectral densities can easily be lost in the estimation process. I will discuss new results on space-time covariance estimation, and how the estimation from finite sample sets will impact on factorisations such as the eigenvalue decomposition, which is often key to solving the introductory optimisation problems. The purpose of the presentation is to give you some insight into estimating statistics as well as to provide a glimpse on classical signal processing challenges such as the separation of sources from a mixture of signals.
Polynomial matrices can help to elegantly formulate many broadband multi-sensor / multi-channel processing problems, and represent a direct extension of well-established narrowband techniques which typically involve eigen- (EVD) and singular value decompositions (SVD) for optimisation. Polynomial matrix decompositions extend the utility of the EVD to polynomial parahermitian matrices, and this talk presents a brief overview of such polynomial matrices, characteristics of the polynomial EVD (PEVD) and iterative algorithms for its solution. The presentation concludes with some surprising results when applying the PEVD to subband coding and broadband beamforming.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Contradictory of the Laplacian Smoothing Transform and Linear Discriminant An...TELKOMNIKA JOURNAL
Laplacian smoothing transform uses the negative diagonal element to generate the new space. The negative diagonal elements will deliver the negative new spaces. The negative new spaces will cause decreasing of the dominant characteristics. Laplacian smoothing transform usually singular matrix, such that the matrix cannot be solved to obtain the ordered-eigenvalues and corresponding eigenvectors. In this research, we propose a modeling to generate the positive diagonal elements to obtain the positive new spaces. The secondly, we propose approach to overcome singularity matrix to found eigenvalues and eigenvectors. Firstly, the method is started to calculate contradictory of the laplacian smoothing matrix. Secondly, we calculate the new space modeling on the contradictory of the laplacian smoothing. Moreover, we calculate eigenvectors of the discriminant analysis. Fourth, we calculate the new space modeling on the discriminant analysis, select and merge features. The proposed method has been tested by using four databases, i.e. ORL, YALE, UoB, and local database (CAI-UTM). Overall, the results indicate that the proposed method can overcome two problems and deliver higher accuracy than similar methods.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
AN EFFICIENT PARALLEL ALGORITHM FOR COMPUTING DETERMINANT OF NON-SQUARE MATRI...ijdpsjournal
One of the most significant challenges in Computing Determinant of Rectangular Matrices is high time
complexity of its algorithm. Among all definitions of determinant of rectangular matrices, Radic’s
definition has special features which make it more notable. But in this definition, C(N
M
) sub matrices of the
order m×m needed to be generated that put this problem in np-hard class. On the other hand, any row or
column reduction operation may hardly lead to diminish the volume of calculation. Therefore, in this paper
we try to present the parallel algorithm which can decrease the time complexity of computing the
determinant of non-square matrices to O(N).
Conventional tools in array signal processing have traditionally relied on the availability of a large number of samples acquired at each sensor or array element (antenna, hydrophone, microphone, etc.). Large sample size assumptions typically guarantee the consistency of estimators, detectors, classifiers and multiple other widely used signal processing procedures. However, practical scenario and array mobility conditions, together with the need for low latency and reduced scanning times, impose strong limits on the total number of observations that can be effectively processed. When the number of collected samples per sensor is small, conventional large sample asymptotic approaches are not relevant anymore. Recently, large random matrix theory tools have been proposed in order to address the small sample support problem in array signal processing. In fact, it has been shown that the most important and longstanding problems in this field can be reformulated and studied according to this asymptotic paradigm. By exploiting the latest advances in large random matrix theory and high dimensional statistics, a novel and unconventional methodology can be established, which provides an unprecedented treatment of the finite sample-per-sensor regime. In this talk, we will see that random matrix theory establishes a unifying framework for the study of array signal processing techniques under the constraint of a small number of observations per sensor, which has radically changed the way in which array processing methodologies have been traditionally established. We will show how this unconventional way of revisiting classical array processing has lead to major advances in the design and analysis of signal processing techniques for multidimensional observations.
The leaning speed of the feed forward neural networks is very much slower than
as expected and this is the major drawback/pitfall in their applications since the
past decades. The key reasons behind may
1. Due to the slow gradient-based learning algorithms which are extensively used
to train the neural networks.
2. All the parameters in the networks are tuned iteratively using some learning
algorithms.
Thus, in order to eradicate the above pitfalls, a new learning algorithm was pro
posed known as Extreme Learning Machine (ELMs). This algorithm is for the
single hiddenlayer feed forward networks(SLFNs) which randomly initializes the
input hidden node weights and biases of the hidden nodes after that calculates
the output weights. This algorithm provide the good generalization performance
at an extremely fast learning speed. In this thesis we have experiemented the
algorithm on various types of datasets and various popular algorithm to find the
performances and report a comparison.
We have devised a two-layer-feedforward network for ELM in a new manner with
randomly assigning the weights and biases in both the hidden layer. We have
also studied the ELM autoencoders and thoroughly experimented it with various
datasets and deep networks.
We have implemented ELM with recommender systems to build a new music app
to recommend the user some songs based on the history of the use.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES)
Ad hoc & sensor networks, Adaptive applications, Aeronautical Engineering, Aerospace Engineering
Agricultural Engineering, AI and Image Recognition, Allied engineering materials, Applied mechanics,
Architecture & Planning, Artificial intelligence, Audio Engineering, Automation and Mobile Robots
Automotive Engineering….
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Using several mathematical examples from three different authors in texts from different courses this paper illustrates the easier way to avoid confusions and always get the correct results with the least effort was to use the proposed Excel Gamma function explained in detail for the proper use of the Q(z) and ercf(x) functions in most communication courses. The paper serves as a tutorial and introduction for such functions
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
These are the first slides of the the PhD called Metaheuristics for solving the Time And Space Assembly Line Balancing Problem (TSALBP).
They were presented at the IPMU conference in 2008.
An Improved Iterative Method for Solving General System of Equations via Gene...Zac Darcy
Various algorithms are known for solving linear system of equations. Iteration methods for solving the
large sparse linear systems are recommended. But in the case of general n× m matrices the classic
iterative algorithms are not applicable except for a few cases. The algorithm presented here is based on the
minimization of residual of solution and has some genetic characteristics which require using Genetic
Algorithms. Therefore, this algorithm is best applicable for construction of parallel algorithms. In this
paper, we describe a sequential version of proposed algorithm and present its theoretical analysis.
Moreover we show some numerical results of the sequential algorithm and supply an improved algorithm
and compare the two algorithms.
An Improved Iterative Method for Solving General System of Equations via Gene...Zac Darcy
Various algorithms are known for solving linear system of equations. Iteration methods for solving the
large sparse linear systems are recommended. But in the case of general n× m matrices the classic
iterative algorithms are not applicable except for a few cases. The algorithm presented here is based on the
minimization of residual of solution and has some genetic characteristics which require using Genetic
Algorithms. Therefore, this algorithm is best applicable for construction of parallel algorithms. In this
paper, we describe a sequential version of proposed algorithm and present its theoretical analysis.
Moreover we show some numerical results of the sequential algorithm and supply an improved algorithm
and compare the two algorithms.
Polynomial matrices can help to elegantly formulate many broadband multi-sensor / multi-channel processing problems, and represent a direct extension of well-established narrowband techniques which typically involve eigen- (EVD) and singular value decompositions (SVD) for optimisation. Polynomial matrix decompositions extend the utility of the EVD to polynomial parahermitian matrices, and this talk presents a brief overview of such polynomial matrices, characteristics of the polynomial EVD (PEVD) and iterative algorithms for its solution. The presentation concludes with some surprising results when applying the PEVD to subband coding and broadband beamforming.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Contradictory of the Laplacian Smoothing Transform and Linear Discriminant An...TELKOMNIKA JOURNAL
Laplacian smoothing transform uses the negative diagonal element to generate the new space. The negative diagonal elements will deliver the negative new spaces. The negative new spaces will cause decreasing of the dominant characteristics. Laplacian smoothing transform usually singular matrix, such that the matrix cannot be solved to obtain the ordered-eigenvalues and corresponding eigenvectors. In this research, we propose a modeling to generate the positive diagonal elements to obtain the positive new spaces. The secondly, we propose approach to overcome singularity matrix to found eigenvalues and eigenvectors. Firstly, the method is started to calculate contradictory of the laplacian smoothing matrix. Secondly, we calculate the new space modeling on the contradictory of the laplacian smoothing. Moreover, we calculate eigenvectors of the discriminant analysis. Fourth, we calculate the new space modeling on the discriminant analysis, select and merge features. The proposed method has been tested by using four databases, i.e. ORL, YALE, UoB, and local database (CAI-UTM). Overall, the results indicate that the proposed method can overcome two problems and deliver higher accuracy than similar methods.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
AN EFFICIENT PARALLEL ALGORITHM FOR COMPUTING DETERMINANT OF NON-SQUARE MATRI...ijdpsjournal
One of the most significant challenges in Computing Determinant of Rectangular Matrices is high time
complexity of its algorithm. Among all definitions of determinant of rectangular matrices, Radic’s
definition has special features which make it more notable. But in this definition, C(N
M
) sub matrices of the
order m×m needed to be generated that put this problem in np-hard class. On the other hand, any row or
column reduction operation may hardly lead to diminish the volume of calculation. Therefore, in this paper
we try to present the parallel algorithm which can decrease the time complexity of computing the
determinant of non-square matrices to O(N).
Conventional tools in array signal processing have traditionally relied on the availability of a large number of samples acquired at each sensor or array element (antenna, hydrophone, microphone, etc.). Large sample size assumptions typically guarantee the consistency of estimators, detectors, classifiers and multiple other widely used signal processing procedures. However, practical scenario and array mobility conditions, together with the need for low latency and reduced scanning times, impose strong limits on the total number of observations that can be effectively processed. When the number of collected samples per sensor is small, conventional large sample asymptotic approaches are not relevant anymore. Recently, large random matrix theory tools have been proposed in order to address the small sample support problem in array signal processing. In fact, it has been shown that the most important and longstanding problems in this field can be reformulated and studied according to this asymptotic paradigm. By exploiting the latest advances in large random matrix theory and high dimensional statistics, a novel and unconventional methodology can be established, which provides an unprecedented treatment of the finite sample-per-sensor regime. In this talk, we will see that random matrix theory establishes a unifying framework for the study of array signal processing techniques under the constraint of a small number of observations per sensor, which has radically changed the way in which array processing methodologies have been traditionally established. We will show how this unconventional way of revisiting classical array processing has lead to major advances in the design and analysis of signal processing techniques for multidimensional observations.
The leaning speed of the feed forward neural networks is very much slower than
as expected and this is the major drawback/pitfall in their applications since the
past decades. The key reasons behind may
1. Due to the slow gradient-based learning algorithms which are extensively used
to train the neural networks.
2. All the parameters in the networks are tuned iteratively using some learning
algorithms.
Thus, in order to eradicate the above pitfalls, a new learning algorithm was pro
posed known as Extreme Learning Machine (ELMs). This algorithm is for the
single hiddenlayer feed forward networks(SLFNs) which randomly initializes the
input hidden node weights and biases of the hidden nodes after that calculates
the output weights. This algorithm provide the good generalization performance
at an extremely fast learning speed. In this thesis we have experiemented the
algorithm on various types of datasets and various popular algorithm to find the
performances and report a comparison.
We have devised a two-layer-feedforward network for ELM in a new manner with
randomly assigning the weights and biases in both the hidden layer. We have
also studied the ELM autoencoders and thoroughly experimented it with various
datasets and deep networks.
We have implemented ELM with recommender systems to build a new music app
to recommend the user some songs based on the history of the use.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES)
Ad hoc & sensor networks, Adaptive applications, Aeronautical Engineering, Aerospace Engineering
Agricultural Engineering, AI and Image Recognition, Allied engineering materials, Applied mechanics,
Architecture & Planning, Artificial intelligence, Audio Engineering, Automation and Mobile Robots
Automotive Engineering….
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Using several mathematical examples from three different authors in texts from different courses this paper illustrates the easier way to avoid confusions and always get the correct results with the least effort was to use the proposed Excel Gamma function explained in detail for the proper use of the Q(z) and ercf(x) functions in most communication courses. The paper serves as a tutorial and introduction for such functions
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
These are the first slides of the the PhD called Metaheuristics for solving the Time And Space Assembly Line Balancing Problem (TSALBP).
They were presented at the IPMU conference in 2008.
An Improved Iterative Method for Solving General System of Equations via Gene...Zac Darcy
Various algorithms are known for solving linear system of equations. Iteration methods for solving the
large sparse linear systems are recommended. But in the case of general n× m matrices the classic
iterative algorithms are not applicable except for a few cases. The algorithm presented here is based on the
minimization of residual of solution and has some genetic characteristics which require using Genetic
Algorithms. Therefore, this algorithm is best applicable for construction of parallel algorithms. In this
paper, we describe a sequential version of proposed algorithm and present its theoretical analysis.
Moreover we show some numerical results of the sequential algorithm and supply an improved algorithm
and compare the two algorithms.
An Improved Iterative Method for Solving General System of Equations via Gene...Zac Darcy
Various algorithms are known for solving linear system of equations. Iteration methods for solving the
large sparse linear systems are recommended. But in the case of general n× m matrices the classic
iterative algorithms are not applicable except for a few cases. The algorithm presented here is based on the
minimization of residual of solution and has some genetic characteristics which require using Genetic
Algorithms. Therefore, this algorithm is best applicable for construction of parallel algorithms. In this
paper, we describe a sequential version of proposed algorithm and present its theoretical analysis.
Moreover we show some numerical results of the sequential algorithm and supply an improved algorithm
and compare the two algorithms.
A parsimonious SVM model selection criterion for classification of real-world ...o_almasi
This paper proposes and optimizes a two-term cost function consisting of a sparseness term and a generalized v-fold cross-validation term by a new adaptive particle swarm optimization (APSO). APSO updates its parameters adaptively based on a dynamic feedback from the success rate of the each particle’s personal best. Since the proposed cost function is based on the choosing fewer numbers of support vectors, the complexity of SVM models decreased while the accuracy remains in an acceptable range. Therefore, the testing time decreases and makes SVM more applicable for practical applications in real data sets. A comparative study on data sets of UCI database is performed between the proposed cost function and conventional cost function to demonstrate the effectiveness of the proposed cost function.
Multi objective predictive control a solution using metaheuristicsijcsit
The application of multi objective model predictive control approaches is significantly limited with
computation time associated with optimization algorithms. Metaheuristics are general purpose heuristics
that have been successfully used in solving difficult optimization problems in a reasonable computation
time. In this work , we use and compare two multi objective metaheuristics, Multi-Objective Particle
swarm Optimization, MOPSO, and Multi-Objective Gravitational Search Algorithm, MOGSA, to generate
a set of approximately Pareto-optimal solutions in a single run. Two examples are studied, a nonlinear
system consisting of two mobile robots tracking trajectories and avoiding obstacles and a linear multi
variable system. The computation times and the quality of the solution in terms of the smoothness of the
control signals and precision of tracking show that MOPSO can be an alternative for real time
applications.
AN IMPROVED ITERATIVE METHOD FOR SOLVING GENERAL SYSTEM OF EQUATIONS VIA GENE...Zac Darcy
Various algorithms are known for solving linear system of equations. Iteration methods for solving the
large sparse linear systems are recommended. But in the case of general n× m matrices the classic
iterative algorithms are not applicable except for a few cases. The algorithm presented here is based on the
minimization of residual of solution and has some genetic characteristics which require using Genetic
Algorithms. Therefore, this algorithm is best applicable for construction of parallel algorithms. In this
paper, we describe a sequential version of proposed algorithm and present its theoretical analysis.
Moreover we show some numerical results of the sequential algorithm and supply an improved algorithm
and compare the two algorithms.
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
We proposed a novel approach for solving TSP using PSO, namely edge-PSO by intelligent use of the edge recombination Operator. We observed that the edge recombination operator which was originally proposed for Genetic Algorithm can be used as a velocity operator for Particle Swarm Optimization so as to direct the search effectively to better corners of the hypercube corresponding to the solution space in each iteration thus significantly reducing the number of iterations required to
find the optimum solution. The edge-PSO algorithm not only improved the convergence rate but also could produce near-optimal solutions, with accuracy better than those obtained from GA even without the use of a local search procedure for standard instances from TSPLIB.
A study and implementation of the transit route network design problem for a ...csandit
The design of public transportation networks presup
poses solving optimization problems,
involving various parameters such as the proper mat
hematical description of networks, the
algorithmic approach to apply, and also the conside
ration of real-world, practical
characteristics such as the types of vehicles in th
e network, the frequencies of routes, demand,
possible limitations of route capacities, travel de
cisions made by passengers, the environmental
footprint of the system, the available bus technolo
gies, besides others. The current paper
presents the progress of the work that aims to stud
y the design of a municipal public
transportation system that employs middleware techn
ologies and geographic information
services in order to produce practical, realistic r
esults. The system employs novel optimization
approaches such as the particle swarm algorithms an
d also considers various environmental
parameters such as the use of electric vehicles and
the emissions of conventional ones.
A STUDY AND IMPLEMENTATION OF THE TRANSIT ROUTE NETWORK DESIGN PROBLEM FOR A ...cscpconf
The design of public transportation networks presupposes solving optimization problems,
involving various parameters such as the proper mathematical description of networks, the
algorithmic approach to apply, and also the consideration of real-world, practical
characteristics such as the types of vehicles in the network, the frequencies of routes, demand,
possible limitations of route capacities, travel decisions made by passengers, the environmental
footprint of the system, the available bus technologies, besides others. The current paper
presents the progress of the work that aims to study the design of a municipal public
transportation system that employs middleware technologies and geographic information
services in order to produce practical, realistic results. The system employs novel optimization
approaches such as the particle swarm algorithms and also considers various environmental
parameters such as the use of electric vehicles and the emissions of conventional ones.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Optimal rule set generation using pso algorithmcsandit
Classification and Prediction is an important resea
rch area of data mining. Construction of
classifier model for any decision system is an impo
rtant job for many data mining applications.
The objective of developing such a classifier is to
classify unlabeled dataset into classes. Here
we have applied a discrete Particle Swarm Optimizat
ion (PSO) algorithm for selecting optimal
classification rule sets from huge number of rules
possibly exist in a dataset. In the proposed
DPSO algorithm, decision matrix approach was used f
or generation of initial possible
classification rules from a dataset. Then the propo
sed algorithm discovers important or
significant rules from all possible classification
rules without sacrificing predictive accuracy.
The proposed algorithm deals with discrete valued d
ata, and its initial population of candidate
solutions contains particles of different sizes. Th
e experiment has been done on the task of
optimal rule selection in the data sets collected f
rom UCI repository. Experimental results show
that the proposed algorithm can automatically evolv
e on average the small number of
conditions per rule and a few rules per rule set, a
nd achieved better classification performance
of predictive accuracy for few classes.
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMSecij
Travelling salesman problem (TSP) is a most popular combinatorial routing problem, belongs to the class of NP-hard problems. Many approacheshave been proposed for TSP.Among them, swarm intelligence (SI) algorithms can effectively achieve optimal tours with the minimum lengths and attempt to avoid trapping in local minima points. The transcendence of each SI is depended on the nature of the problem. In our studies, there has been yet no any article, which had compared the performance of SI algorithms for TSP perfectly. In this paper,four common SI algorithms are used to solve TSP, in order to compare the performance of SI algorithms for the TSP problem. These algorithms include genetic algorithm, particle swarm optimization, ant colony optimization, and artificial bee colony. For each SI, the various parameters and operators were tested, and the best values were selected for it. Experiments oversome benchmarks fromTSPLIBshow that
artificial bee colony algorithm is the best one among the fourSI-basedmethods to solverouting problems like TSP.
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
The progressive development of Synthetic Aperture Radar (SAR) systems diversify the exploitation of the generated images by these systems in different applications of geoscience. Detection and monitoring surface deformations, procreated by various phenomena had benefited from this evolution and had been realized by interferometry (InSAR) and differential interferometry (DInSAR) techniques. Nevertheless, spatial and temporal decorrelations of the interferometric couples used, limit strongly the precision of analysis results by these techniques. In this context, we propose, in this work, a methodological approach of surface deformation detection and analysis by differential interferograms to show the limits of this technique according to noise quality and level. The detectability model is generated from the deformation signatures, by simulating a linear fault merged to the images couples of ERS1 / ERS2 sensors acquired in a region of the Algerian south.
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed . The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT.The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigen lips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips reading modeled , which wasn’t illustrate the superior performance of the
method.
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
Universities offer software engineering capstone course to simulate a real world-working environment in which students can work in a team for a fixed period to deliver a quality product. The objective of the paper is to report on our experience in moving from Waterfall process to Agile process in conducting the software engineering capstone project. We present the capstone course designs for both Waterfall driven and Agile driven methodologies that highlight the structure, deliverables and assessment plans.To evaluate the improvement, we conducted a survey for two different sections taught by two different instructors to evaluate students’ experience in moving from traditional Waterfall model to Agile like process. Twentyeight students filled the survey. The survey consisted of eight multiple-choice questions and an open-ended question to collect feedback from students. The survey results show that students were able to attain hands one experience, which simulate a real world-working environment. The results also show that the Agile approach helped students to have overall better design and avoid mistakes they have made in the initial design completed in of the first phase of the capstone project. In addition, they were able to decide on their team capabilities, training needs and thus learn the required technologies earlier which is reflected on the final product quality
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
Using social media in education provides learners with an informal way for communication. Informal communication tends to remove barriers and hence promotes student engagement. This paper presents our experience in using three different social media technologies in teaching software project management course. We conducted different surveys at the end of every semester to evaluate students’ satisfaction and engagement. Results show that using social media enhances students’ engagement and satisfaction. However, familiarity with the tool is an important factor for student satisfaction.
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
In real world computing environment with using a computer to answer questions has been a human dream since the beginning of the digital era, Question-answering systems are referred to as intelligent systems, that can be used to provide responses for the questions being asked by the user based on certain facts or rules stored in the knowledge base it can generate answers of questions asked in natural , and the first main idea of fuzzy logic was to working on the problem of computer understanding of natural language, so this survey paper provides an overview on what Question-Answering is and its system architecture and the possible relationship and
different with fuzzy logic, as well as the previous related research with respect to approaches that were followed. At the end, the survey provides an analytical discussion of the proposed QA models, along or combined with fuzzy logic and their main contributions and limitations.
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
Human beings generate different speech waveforms while speaking the same word at different times. Also, different human beings have different accents and generate significantly varying speech waveforms for the same word. There is a need to measure the distances between various words which facilitate preparation of pronunciation dictionaries. A new algorithm called Dynamic Phone Warping (DPW) is presented in this paper. It uses dynamic programming technique for global alignment and shortest distance measurements. The DPW algorithm can be used to enhance the pronunciation dictionaries of the well-known languages like English or to build pronunciation dictionaries to the less known sparse languages. The precision measurement experiments show 88.9% accuracy.
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
In education, the use of electronic (E) examination systems is not a novel idea, as Eexamination systems have been used to conduct objective assessments for the last few years. This research deals with randomly designed E-examinations and proposes an E-assessment system that can be used for subjective questions. This system assesses answers to subjective questions by finding a matching ratio for the keywords in instructor and student answers. The matching ratio is achieved based on semantic and document similarity. The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and grading. A survey and case study were used in the research design to validate the proposed system. The examination assessment system will help instructors to save time, costs, and resources, while increasing efficiency and improving the productivity of exam setting and assessments.
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
African Buffalo Optimization (ABO) is one of the most recent swarms intelligence based metaheuristics. ABO algorithm is inspired by the buffalo’s behavior and lifestyle. Unfortunately, the standard ABO algorithm is proposed only for continuous optimization problems. In this paper, the authors propose two discrete binary ABO algorithms to deal with binary optimization problems. In the first version (called SBABO) they use the sigmoid function and probability model to generate binary solutions. In the second version (called LBABO) they use some logical operator to operate the binary solutions. Computational results on two knapsack problems (KP and MKP) instances show the effectiveness of the proposed algorithm and their ability to achieve good and promising solutions.
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, Domain Generation Algorithm (DGA) is often perceived as the most difficult to detect using traditional methods. This paper presents an approach for detecting DGA using frequency analysis of the character distribution and the weighted scores of the domain names. The approach’s feasibility is demonstrated using a range of legitimate domains and a number of malicious algorithmicallygenerated domain names. Findings from this study show that domain names made up of English characters “a-z” achieving a weighted score of < 45 are often associated with DGA. When a weighted score of < 45 is applied to the Alexa one million list of domain names, only 15% of the domain names were treated as non-human generated.
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
The amount of piracy in the streaming digital content in general and the music industry in specific is posing a real challenge to digital content owners. This paper presents a DRM solution to monetizing, tracking and controlling online streaming content cross platforms for IP enabled devices. The paper benefits from the current advances in Blockchain and cryptocurrencies. Specifically, the paper presents a Global Music Asset Assurance (GoMAA) digital currency and presents the iMediaStreams Blockchain to enable the secure dissemination and tracking of the streamed content. The proposed solution provides the data owner the ability to control the flow of information even after it has been released by creating a secure, selfinstalled, cross platform reader located on the digital content file header. The proposed system provides the content owners’ options to manage their digital information (audio, video, speech, etc.), including the tracking of the most consumed segments, once it is release. The system benefits from token distribution between the content owner (Music Bands), the content distributer (Online Radio Stations) and the content consumer(Fans) on the system blockchain.
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
This paper discusses the importance of verb suffix mapping in Discourse translation system. In
discourse translation, the crucial step is Anaphora resolution and generation. In Anaphora
resolution, cohesion links like pronouns are identified between portions of text. These binders
make the text cohesive by referring to nouns appearing in the previous sentences or nouns
appearing in sentences after them. In Machine Translation systems, to convert the source
language sentences into meaningful target language sentences the verb suffixes should be
changed as per the cohesion links identified. This step of translation process is emphasized in
the present paper. Specifically, the discussion is on how the verbs change according to the
subjects and anaphors. To explain the concept, English is used as the source language (SL) and
an Indian language Telugu is used as Target language (TL)
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
In this paper, based on the definition of conformable fractional derivative, the functional
variable method (FVM) is proposed to seek the exact traveling wave solutions of two higherdimensional
space-time fractional KdV-type equations in mathematical physics, namely the
(3+1)-dimensional space–time fractional Zakharov-Kuznetsov (ZK) equation and the (2+1)-
dimensional space–time fractional Generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony
(GZK-BBM) equation. Some new solutions are procured and depicted. These solutions, which
contain kink-shaped, singular kink, bell-shaped soliton, singular soliton and periodic wave
solutions, have many potential applications in mathematical physics and engineering. The
simplicity and reliability of the proposed method is verified.
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
The using of information technology resources is rapidly increasing in organizations,
businesses, and even governments, that led to arise various attacks, and vulnerabilities in the
field. All resources make it a must to do frequently a penetration test (PT) for the environment
and see what can the attacker gain and what is the current environment's vulnerabilities. This
paper reviews some of the automated penetration testing techniques and presents its
enhancement over the traditional manual approaches. To the best of our knowledge, it is the
first research that takes into consideration the concept of penetration testing and the standards
in the area.This research tackles the comparison between the manual and automated
penetration testing, the main tools used in penetration testing. Additionally, compares between
some methodologies used to build an automated penetration testing platform.
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
Since the mid of 1990s, functional connectivity study using fMRI (fcMRI) has drawn increasing
attention of neuroscientists and computer scientists, since it opens a new window to explore
functional network of human brain with relatively high resolution. BOLD technique provides
almost accurate state of brain. Past researches prove that neuro diseases damage the brain
network interaction, protein- protein interaction and gene-gene interaction. A number of
neurological research paper also analyse the relationship among damaged part. By
computational method especially machine learning technique we can show such classifications.
In this paper we used OASIS fMRI dataset affected with Alzheimer’s disease and normal
patient’s dataset. After proper processing the fMRI data we use the processed data to form
classifier models using SVM (Support Vector Machine), KNN (K- nearest neighbour) & Naïve
Bayes. We also compare the accuracy of our proposed method with existing methods. In future,
we will other combinations of methods for better accuracy.
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
In order to treat and analyze real datasets, fuzzy association rules have been proposed. Several
algorithms have been introduced to extract these rules. However, these algorithms suffer from
the problems of utility, redundancy and large number of extracted fuzzy association rules. The
expert will then be confronted with this huge amount of fuzzy association rules. The task of
validation becomes fastidious. In order to solve these problems, we propose a new validation
method. Our method is based on three steps. (i) We extract a generic base of non redundant
fuzzy association rules by applying EFAR-PN algorithm based on fuzzy formal concept analysis.
(ii) we categorize extracted rules into groups and (iii) we evaluate the relevance of these rules
using structural equation model.
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
In many applications of data mining, class imbalance is noticed when examples in one class are
overrepresented. Traditional classifiers result in poor accuracy of the minority class due to the
class imbalance. Further, the presence of within class imbalance where classes are composed of
multiple sub-concepts with different number of examples also affect the performance of
classifier. In this paper, we propose an oversampling technique that handles between class and
within class imbalance simultaneously and also takes into consideration the generalization
ability in data space. The proposed method is based on two steps- performing Model Based
Clustering with respect to classes to identify the sub-concepts; and then computing the
separating hyperplane based on equal posterior probability between the classes. The proposed
method is tested on 10 publicly available data sets and the result shows that the proposed
method is statistically superior to other existing oversampling methods.
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
Data collection is an essential, but manpower intensive procedure in ecological research. An
algorithm was developed by the author which incorporated two important computer vision
techniques to automate data cataloging for butterfly measurements. Optical Character
Recognition is used for character recognition and Contour Detection is used for imageprocessing.
Proper pre-processing is first done on the images to improve accuracy. Although
there are limitations to Tesseract’s detection of certain fonts, overall, it can successfully identify
words of basic fonts. Contour detection is an advanced technique that can be utilized to
measure an image. Shapes and mathematical calculations are crucial in determining the precise
location of the points on which to draw the body and forewing lines of the butterfly. Overall,
92% accuracy were achieved by the program for the set of butterflies measured.
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
Smart cities utilize Internet of Things (IoT) devices and sensors to enhance the quality of the city
services including energy, transportation, health, and much more. They generate massive
volumes of structured and unstructured data on a daily basis. Also, social networks, such as
Twitter, Facebook, and Google+, are becoming a new source of real-time information in smart
cities. Social network users are acting as social sensors. These datasets so large and complex
are difficult to manage with conventional data management tools and methods. To become
valuable, this massive amount of data, known as 'big data,' needs to be processed and
comprehended to hold the promise of supporting a broad range of urban and smart cities
functions, including among others transportation, water, and energy consumption, pollution
surveillance, and smart city governance. In this work, we investigate how social media analytics
help to analyze smart city data collected from various social media sources, such as Twitter and
Facebook, to detect various events taking place in a smart city and identify the importance of
events and concerns of citizens regarding some events. A case scenario analyses the opinions of
users concerning the traffic in three largest cities in the UAE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
The anonymity of social networks makes it attractive for hate speech to mask their criminal
activities online posing a challenge to the world and in particular Ethiopia. With this everincreasing
volume of social media data, hate speech identification becomes a challenge in
aggravating conflict between citizens of nations. The high rate of production, has become
difficult to collect, store and analyze such big data using traditional detection methods. This
paper proposed the application of apache spark in hate speech detection to reduce the
challenges. Authors developed an apache spark based model to classify Amharic Facebook
posts and comments into hate and not hate. Authors employed Random forest and Naïve Bayes
for learning and Word2Vec and TF-IDF for feature selection. Tested by 10-fold crossvalidation,
the model based on word2vec embedding performed best with 79.83%accuracy. The
proposed method achieve a promising result with unique feature of spark for big data.
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
This article presents Part of Speech tagging for Nepali text using General Regression Neural
Network (GRNN). The corpus is divided into two parts viz. training and testing. The network is
trained and validated on both training and testing data. It is observed that 96.13% words are
correctly being tagged on training set whereas 74.38% words are tagged correctly on testing
data set using GRNN. The result is compared with the traditional Viterbi algorithm based on
Hidden Markov Model. Viterbi algorithm yields 97.2% and 40% classification accuracies on
training and testing data sets respectively. GRNN based POS Tagger is more consistent than the
traditional Viterbi decoding technique.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
2. 114 Computer Science & Information Technology (CS & IT)
found. All of these metaheuristics have certain characteristics and thus each one may be more
successful on a certain optimization problem when compared to the others. The Vortex Search
(VS) algorithm [16] is one of these recently proposed metaheuristic algorithms which was
inspired from the vortical flow of the stirred fluids. The search behaviour of the VS algorithm is
modelled as a vortex pattern by using an adaptive step-size adjustment scheme. By this way, it is
aimed to have a good balance between the explorative and exploitative behaviour of the search.
The proposed VS algorithm was tested over 50 benchmark mathematical functions and the
obtained results compared to the single-solution based (Simulated Annealing, SA and Pattern
Search, PS) and population-based (Particle Swarm Optimization, PSO2011 and Artificial Bee
Colony, ABC) algorithms. A Wilcoxon-Signed Rank Test was performed to measure the pair-
wise statistical performances of the algorithms, the results of which indicated that the proposed
VS algorithm outperforms the SA, PS and ABC algorithms while being competitive with the
PSO2011 algorithm. Because of the simplicity of the proposed VS algorithm, a significant
decrease in the computational time of the 50 benchmark numerical functions was also achieved
when compared to the population-based algorithms. In some other studies [17-20], the VS
algorithm has also been successfully used for the solution of some real-world optimization
problems.
Although the proposed VS algorithm is a good candidate for the solution of optimization
problems, it also has some drawbacks. In the VS algorithm, candidate solutions are generated
around the current best solution by using a Gaussian distribution at each iteration pass. This
provides simplicity to the algorithm but it also leads to some problems along. Especially, for the
functions those have a number of local minimum points, to select a single point to generate
candidate solutions leads the algorithm to being trapped into a local minimum point. Due to the
adaptive step-size adjustment scheme used in the VS algorithm, the locality of the created
candidate solutions is increased at each iteration pass. Therefore, if the algorithm cannot escape a
local point as quickly as possible, it becomes much more difficult for the algorithm to escape
from that point in the latter iterations.
In this study, a modified Vortex Search algorithm (MVS) is proposed to overcome above
mentioned drawback of the existing VS algorithm. In the MVS algorithm, the candidate solutions
are generated around different points at each iteration pass. These points are iteratively updated
during the search process, details of which are given in the following section. The MVS
algorithm is tested with 7 benchmark functions that was used earlier in [16]. These 7 functions
are selected from the benchmark set of 50 functions for which the VS algorithm trapped into the
local minimum points. Because the SA and PS algorithms showed poor performances in [16], in
this study these two algorithms are excluded and the results are compared to the results those
obtained by the VS algorithm, PSO2011 and ABC algorithms. It is shown that, the MVS
algorithm outperforms all of these algorithms and can successfully escape from the local
minimum points of the functions that the VS algorithm was being trapped earlier.
The remaining part of this paper is organized as follows. In the following section, first a brief
description of the VS algorithm is given. Then, the modification performed on the VS algorithm
is detailed and the MVS algorithm is introduced. Section 3 covers the experimental results and
discussion. Finally, Section 4 concludes the work.
3. Computer Science & Information Technology (CS & IT) 115
2. METHODOLOGY
2.1. A Brief Description of the Vortex Search Algorithm
Let us consider a two-dimensional optimization problem. In a two dimensional space a vortex
pattern can be modelled by a number of nested circles. Here, the outer (largest) circle of the
vortex is first centered on the search space, where the initial center can be calculated using Eq. 1.
In Eq.1, upperlimit and lowerlimit are 1×d vectors that define the bound constraints of the
problem in d dimensional space. Then, a number of neighbor solutions )(sCt , (t represents the
iteration index and initially 0=t ) are randomly generated around the initial center 0µ in the d -
dimensional space by using a Gaussian distribution. Here, { } nkssssC k ,...,2,1,...,,)( 210 ==
represents the solutions, and n represents the total number of candidate solutions. In Eq. 2, the
general form of the multivariate Gaussian distribution is given.
In Eq.2, d represents the dimension, x is the 1×d vector of a random variable, µ is the 1×d
vector of sample mean (center) and Σ is the covariance matrix. If the diagonal elements
(variances) of the values of Σ are equal and if the off-diagonal elements (covariance) are zero
(uncorrelated), then the resulting shape of the distribution will be spherical (which can be
considered circular for a two-dimensional problem, as in our case). Thus, the value of Σ can be
computed by using equal variances with zero covariance by using Eq. 3.
In Eq. 3,
2
σ represents the variance of the distribution and I represents the dd × identity
matrix. The initial standard deviation ( 0σ ) of the distribution can be calculated by using Eq. 4.
Here, 0σ can also be considered as the initial radius ( 0r ) of the outer circle for a two
dimensional optimization problem. Because a weak locality is required in the initial phases, 0r is
chosen to be a large value. Thus, a full coverage of the search space by the outer circle is
provided in the initial step. This process provides a bird's-eye view for the problem at hand.
In the selection phase, a solution (which is the best one) )(0
'
sCs ∈ is selected and memorized
from )(0 sC to replace the current circle center 0µ . Prior to the selection phase, the candidate
solutions must be ensured to be inside the search boundaries. For this purpose, the solutions that
exceed the boundaries are shifted into the boundaries, as in Eq. 5.
4. 116 Computer Science & Information Technology (CS & IT)
In Eq.5, nk ,...2,1= and di ,...,2,1= and rand is a uniformly distributed random number. Next,
the memorized best solution
'
s is assigned to be the center of the second circle (the inner one). In
the generation phase of the second step, the effective radius ( 1r ) of this new circle is reduced, and
then, a new set of solutions )(1 sC is generated around the new center. Note that in the second
step, the locality of the generated neighbors increased with the decreased radius. In the selection
phase of the second step, the new set of solutions )(1 sC is evaluated to select a solution
)(1
'
sCs ∈ . If the selected solution is better than the best solution found so far, then this solution
is assigned to be the new best solution and it is memorized. Next, the center of the third circle is
assigned to be the memorized best solution found so far. This process iterates until the
termination condition is met. An illustrative sketch of the process is given in Figure 1. In this
manner, once the algorithm is terminated, the resulting pattern appears as a vortex-like structure,
where the center of the smallest circle is the optimum point found by the algorithm. A
representative pattern is sketched in Figure 2 for a two-dimensional optimization problem for
which the upper and lower limits are between the [-10,10] interval. A description of the VS
algorithm is also provided in Figure 3.
The radius decrement process given in Figure 3 can be considered as a type of adaptive step-size
adjustment process which has critical importance on the performance of the VS algorithm. This
process should be performed in such a way that allows the algorithm to behave in an explorative
manner in the initial steps and in an exploitative manner in the latter steps. To achieve this type
of process, the value of the radius must be tuned properly during the search process. In the VS
algorithm, the inverse incomplete gamma function is used to decrease the value of the radius
during each iteration pass.
Figure 1. An illustrative sketch of the search process
5. Computer Science & Information Technology (CS & IT) 117
Figure 2. A representative pattern showing the search boundaries (circles) of the VS algorithm after a
search process, which has a vortex-like structure.
The incomplete gamma function given in Eq. 6 most commonly arises in probability theory,
particularly in those applications involving the chi-square distribution [21].
In Eq.6, 0>a is known as the shape parameter and 0≥x is a random variable. In conjunction
with the incomplete gamma function, its complementary ),( axΓ is usually also introduced (Eq.
7).
Thus, it follows that,
where )(aΓ is known as the gamma function. There exist many studies in the literature on
different proposed methods for the numerical calculation of the incomplete gamma function [22-
24]. MATLAB® also provides some tools for the calculation of the inverse incomplete gamma
(gammaincinv) function. The inverse incomplete gamma function (gammaincinv), computes the
inverse of the incomplete gamma function with respect to the integration limit x and represented
as gammaincinv(x,a) in MATLAB®.
In Figure 4, the inverse incomplete gamma function is plotted for 1.0=x and [ ]1,0∈a . Here, for
our case the parameter a of the inverse incomplete gamma function defines the resolution of the
search. By equally sampling a values within [ ]1,0 interval at a certain step size, the resolution of
the search can be adjusted. For this purpose, at each iteration, a value of a is computed by using
the Eq.9
6. 118 Computer Science & Information Technology (CS & IT)
Figure 3. A description of the VS algorithm
where 0a is selected as 10 =a to ensure a full coverage of the search space at the first iteration,
t is the iteration index, and MaxItr represents the maximum number of iterations.
Let us consider an optimization problem defined within the [-10,10] region. The initial radius 0r
can be calculated with Eq. 10. Because 10 =a , the resulting function value is
1),()1( 0 ≈⋅ axvgammaincinx , which means 00 σ≈r as indicated before.
By means of Eq.4, the initial radius value 0r can be calculated as 100 ≈r . In Eq.11, a general
formula is also given to obtain the value of the radius at each iteration pass.
Here, t represents the iteration index.
7. Computer Science & Information Technology (CS & IT) 119
Figure 4. ),()1( axvgammaincinx ⋅ where 1.0=x and [ ]1,0∈a
2.2. The Modified Vortex Search Algorithm
The VS algorithm creates candidate solutions around a single point at each iteration pass. At the
first iteration, this point is the initial center 0µ which is determined with the upper and lower
limits of the problem at hand while in the latter iterations the center is shifted to the current best
position found so far. As mentioned before, this mechanism leads the VS algorithm to being
trapped into local minimum points for a number of functions.
To overcome above mentioned drawback, in this study a modified VS algorithm (MVS) is
proposed. In the MVS algorithm, candidate solutions are generated around multiple centers at
each iterations pass. The search behavior of the MVS algorithm can be thought as a number of
parallel vortices that have different centers at each iteration pass. Initially, the centers of these
multiple vortices are selected as in the VS algorithm. Let us consider, the total number of centers
(or vortices) to be represented by m . Let us say, )(µtM represents the matrix that stores the
values of these m centers at each iteration pass and t represents the iteration index. Thus,
initially { } mlM l
,...,2,1,,...,,)( 0
2
0
1
00 == µµµµ and initial positions of these centers are computed
as in Eq. 12.
Next, a number of candidate solutions are generated with a Gaussian distribution around these
initial centers by using the initial radius value 0r . In this case the total number of candidate
solutions is again selected to be n. But note that, these n solutions are generated around m
centers. Thus, one should select mn solutions around each center.
Let us say, { } mnkssssCS k
l
t
,...,2,1,...,,)( 21 == represents the subset of solutions generated
around the center ml ,...,2,1= for the iteration t . Then, the total solution set generated for the
8. 120 Computer Science & Information Technology (CS & IT)
iteration 0=t can be represented by
phase, for each subset of solutions, a solution (which is the best one)
Prior to the selection phase it must be ensured that the candid
the search boundaries. For this purpose, the solutions that exceed the boundaries are shifted into
the boundaries, as in Eq. 5. Let us say, the best solution of each subset is stored in a matrix
)( '
sPBestt at each iteration pass. Thus, for
that, the best solution of this matrix (
solution set )(0 sC for the current iteration, which is represented as
In the VS algorithm, at each iterations pass, the center is always shifted to the best solution found
so far, bests . However, in the MVS algorithm, there exist
updated for the next iteration. The most important difference between the VS and MVS algorithm
arises from here. In the MVS algorithm, one of these centers is again shifted to the best solution
found so far, bests . But, the remaining
the best positions generated around the each center at the iteration
so far, bests as shown in Eq. 13.
In Eq. 13, rand is a uniformly distributed random number,
)( '
1
'
sPBests tl −∈ . Thus, for t
using the )( '
0
'
sPBestsl ∈ positions and the best position found so far,
illustrative sketch of the center update process is given for a two
5, only one center is considered.
Figure 5. An illustrative sketch of the center updating process for the MVS algorithm (only one center is
In the MVS algorithm, the radius decrement process is held totally in the same way as it is done
in the VS algorithm. At each iteration pass, the radius is decreased by u
Computer Science & Information Technology (CS & IT)
can be represented by { } mlCSCSCSsC l
,...,2,1,,...,,)( 0
2
0
1
00 == . In the selection
phase, for each subset of solutions, a solution (which is the best one) (0
'
sCSs l
l ∈
Prior to the selection phase it must be ensured that the candidate subsets of solutions are inside
the search boundaries. For this purpose, the solutions that exceed the boundaries are shifted into
the boundaries, as in Eq. 5. Let us say, the best solution of each subset is stored in a matrix
t each iteration pass. Thus, for 0=t , { }lssssPBest l ,1,,...,,)( ''
2
'
1
'
0 ==
that, the best solution of this matrix ( )( '
0 sPBest ) is also the best solution of the total candidate
for the current iteration, which is represented as bestItr .
In the VS algorithm, at each iterations pass, the center is always shifted to the best solution found
. However, in the MVS algorithm, there exist m centers which positions need to be
updated for the next iteration. The most important difference between the VS and MVS algorithm
arises from here. In the MVS algorithm, one of these centers is again shifted to the best solution
. But, the remaining 1−m centers are shifted to a new position determined by
the best positions generated around the each center at the iteration t and the best position found
is a uniformly distributed random number, ,...,2,1=l
1= , { } 1,...,2,1,,...,,)( 1
2
1
1
11 −== mlM l
µµµµ is determined by
positions and the best position found so far, bests . In Figure
illustrative sketch of the center update process is given for a two-dimensional problem. In Figure
5, only one center is considered.
of the center updating process for the MVS algorithm (only one center is
considered)
In the MVS algorithm, the radius decrement process is held totally in the same way as it is done
in the VS algorithm. At each iteration pass, the radius is decreased by utilizing the inverse
. In the selection
)s is selected.
ate subsets of solutions are inside
the search boundaries. For this purpose, the solutions that exceed the boundaries are shifted into
the boundaries, as in Eq. 5. Let us say, the best solution of each subset is stored in a matrix
m,...,2, . Note
) is also the best solution of the total candidate
In the VS algorithm, at each iterations pass, the center is always shifted to the best solution found
centers which positions need to be
updated for the next iteration. The most important difference between the VS and MVS algorithm
arises from here. In the MVS algorithm, one of these centers is again shifted to the best solution
centers are shifted to a new position determined by
and the best position found
1,..., −m and
is determined by
. In Figure-5, an
dimensional problem. In Figure
of the center updating process for the MVS algorithm (only one center is
In the MVS algorithm, the radius decrement process is held totally in the same way as it is done
tilizing the inverse
9. Computer Science & Information Technology (CS & IT)
incomplete gamma function and thus, the locality of the generated solutions is increased. In
Figure 6, a description of the MVS algorithm is provided.
Figure 6. A description of the MVS algorithm
3. RESULTS
The proposed MVS algorithm is tested on 7 benchmark functions for which the VS algorithm
was being trapped into a local minimum point. By using these functions, in this study, the
Computer Science & Information Technology (CS & IT)
incomplete gamma function and thus, the locality of the generated solutions is increased. In
Figure 6, a description of the MVS algorithm is provided.
Figure 6. A description of the MVS algorithm
The proposed MVS algorithm is tested on 7 benchmark functions for which the VS algorithm
was being trapped into a local minimum point. By using these functions, in this study, the
121
incomplete gamma function and thus, the locality of the generated solutions is increased. In
The proposed MVS algorithm is tested on 7 benchmark functions for which the VS algorithm
was being trapped into a local minimum point. By using these functions, in this study, the
10. 122 Computer Science & Information Technology (CS & IT)
performance of the MVS algorithm is compared to the VS, PSO2011 and ABC algorithms.
PSO2011 [25-26] is an extension of the standard PSO algorithm and the ABC algorithm is a
well-known optimization algorithm which was inspired from the collective behaviours of honey
bees.
The functions used in the experiments are listed in Table 1. For the formulations of the functions
listed in Table 1, please refer to the reference [16].
3.1. Algorithm Settings
The ABC and PSO2011 algorithms are selected to have a population size of 50, which is also the
number of neighborhood solutions of the proposed VS algorithm. The acceleration coefficients (
1c and 2c ) of the PSO2011 algorithm are both set to 1.8, and the inertia coefficient is set to 0.6,
as in [27]. The limit value for the ABC algorithm is determined as limit = SN * D, where SN
represents the number of food sources and D represents the dimension. VS algorithm does not
have any additional parameters. Different from the VS algorithm, the MVS algorithm has the
parameter m , which represents the total number of centers.
3.2. Experimental Results
For each algorithm, 30 different runs are performed, and the mean and the best values are
recorded. The maximum number of iterations is selected to be 500,000. For the MATLAB®
codes of the PSO2011, ABC, VS and MVS algorithms please refer to [25], [28], [29] and [30].
For each algorithm, all of the functions are run in parallel using a 32 core Intel® CPU 32 GB
RAM workstation. For the first set of experiments, results are given in Table 2
Table 1. Benchmark function set that is used in the experiments
No Function Characteristics Range Dim. Min.
F1 Powell Unimodal Non-Separable [-4,5] 24 0
F2 Rosenbrock Unimodal Non-Separable [-30, 30] 30 0
F3 Dixon-Price Unimodal Non-Separable [-10, 10] 30 0
F4 Rastrigin Multimodal Separable [-5.12, 5.12] 30 0
F5 Schwefel Multimodal Separable [-500, 500] 30 -12569.5
F6 Griewank Multimodal Non-Separable [-600, 600] 30 0
F7 Penalized Multimodal Non-Separable [-50, 50] 30 0
As shown in Table 2, for the MVS algorithm two different cases are considered. In the first case,
the total number of candidate solutions is selected to be 50, which means 10 candidate solutions
are generated around each center for 5=m . In this case, the MVS algorithm can avoid from the
local minimum points of the functions which is not the case for the VS algorithm. However, poor
sampling of the search space for this case (10 points around each center) may lead the MVS
algorithm to show a correspondingly poor performance on the improvement of the found near
optimal solutions (exploitation). Therefore, another case in which the total number of candidate
solutions is selected to be 250 is considered for the MVS algorithm. In this case, 50 candidate
solutions are generated around each center for 5=m . As can be shown in Table 2, the MVS
algorithm with 250 candidate solutions performs better than the MVS algorithm with 50
candidate solutions.
11. Computer Science & Information Technology (CS & IT) 123
In [31], authors stated that after a sufficient value for colony size, any increment in the value does
not improve the performance of the ABC algorithm significantly. For the test problems carried
out in [31] colony sizes of 10, 50 and 100 are used for the ABC algorithm. It is shown that
although from 10 to 50 the performance of the ABC algorithm significantly increased, there is
not any significant difference between the performances achieved by 50 and 100 colony sizes.
Similarly, for the PSO algorithm it is reported that, PSO with different population sizes has
almost the similar performance which means the performance of PSO is not sensitive to the
population size [32]. Based on the above considerations, in this study a comparison of the MVS
algorithm to the ABC and PSO2011 algorithms with a different population size is not performed.
For the VS algorithm it is expected to achieve better exploitation ability with an increased
number of candidate solutions. But the problem with the VS algorithm is with its global search
ability rather than the local search ability for some of the functions listed above. Therefore, a
comparison of the MVS (m = 5, n = 50) to VS algorithm with 50 candidate solutions is thought to
be enough to show the improvement achieved by the modification performed on the VS
algorithm.
In Figure 7, average computational time of 30 runs for 500,000 iterations is also provided for the
MVS (m = 5, n = 50), MVS (m = 5, n = 250), VS, PSO2011 and ABC algorithms. As shown in
this figure, the required computational time to perform 500,000 iterations with the MVS
algorithm is slightly increased when compared to the VS algorithm. However, even for the MVS
(m = 5, n = 250) algorithm the required computational time to perform 500,000 iterations is still
lower than the PSO2011 and ABC algorithms.
Table 2. Statistical results of 30 runs obtained by PSO2011, ABC, VS and MVS algorithms (values <
16
10−
are considered as 0).
12. 124 Computer Science & Information Technology (CS & IT)
Figure 7. Average computational time of 30 runs for 50 benchmark functions (500,000 iterations)
4. CONCLUSIONS
This paper presents a modified VS algorithm in which the global search ability of the existing VS
algorithm is improved. This is achieved by using multiple centers during the candidate solution
generation phase of the algorithm at each iteration pass. In the VS algorithm, only one center is
used for this purpose and this usually leads the algorithm to being trapped into a local minimum
point for some of the benchmark functions. Computational experiments performed on the
benchmark functions showed that, the MVS algorithm outperforms the VS, PSO211 and ABC
algorithms and can successfully escapes from the local minimum points of the functions that the
VS algorithm was being trapped earlier. Although the complexity of the existing VS algorithm is
a bit increased with the performed modification, there is not any significant difference between
the computational time of the modified VS algorithm and the existing VS algorithm.
In the future studies, the proposed MVS algorithm will be used for the solution of some real
world optimization problems such as neural network optimization, optimum data partitioning,
and analog circuit parameters optimization.
REFERENCES
[1] Holland J.H., Adaptation in Natural and Artificial Systems, University of Michigan Press, Ann Arbor,
MI, 1975
[2] Storn R., Price K., Differential evolution – a simple and efficient adaptive scheme for global
optimization over continuous spaces, Technical report, International Computer Science Institute,
Berkley, 1995
[3] Storn R., Price K., Differential evolution – a simple and efficient heuristic for global optimization
over continuous spaces, Journal of Global Optimization 11 (1997) 341–359.
[4] Kirkpatrick S., Gelatt Jr C.D., Vecchi M.P., Optimization by Simulated Annealing, Science 220
(4598): 671–680, (1983).
13. Computer Science & Information Technology (CS & IT) 125
[5] Černý V., Thermodynamical approach to the traveling salesman problem: An efficient simulation
algorithm, Journal of Optimization Theory and Applications, 45: 41–51, (1985).
[6] Dorigo M., Optimization, Learning and Natural Algorithms, PhD thesis, Politecnico di Milano, Italy,
1992
[7] Kennedy J., Eberhart R.C., in: Particle Swarm Optimization, 1995 IEEE International Conference on
Neural Networks, vol. 4, 1995, pp. 1942–1948
[8] Karaboga D., An idea based on honeybee swarm for numerical optimization, Technical Report TR06,
Erciyes University, Engineering Faculty, Computer Engineering Department, 2005.
[9] Karaboga D., Basturk B., A. powerful, A powerful and efficient algorithm for numerical function
optimization: artificial bee colony (abc) algorithm, Journal of Global Optimization 39 (3) (2007) 459–
471.
[10] Civicioglu P., Backtracking Search Optimization Algorithm for numerical optimization problems,
Applied Mathematics and Computation, Volume 219, Issue 15, 1 April 2013, Pages 8121-8144, ISSN
0096-3003
[11] Kashan A.H., A new metaheuristic for optimization: Optics inspired optimization (OIO), Computers
& Operations Research, Volume 55, March 2015, Pages 99-125, ISSN 0305-0548
[12] Yang X.S., Flower pollination algorithm for global optimization, Unconventional computation and
natural computation. Springer Berlin Heidelberg, 2012. 240-249
[13] Hajipour H., Khormuji H.B., and Rostami H., ODMA: a novel swarm-evolutionary metaheuristic
optimizer inspired by open source development model and communities. Soft Computing (2014): 1-
21.
[14] Yong L., Peng T., A multi-start central force optimization for global optimization, Applied Soft
Computing, Volume 27, February 2015, Pages 92-98, ISSN 1568-4946
[15] Yu-Jun Z., Water wave optimization: A new nature-inspired metaheuristic, Computers & Operations
Research, Volume 55, March 2015, Pages 1-11, ISSN 0305-0548
[16] Doğan B., Ölmez T., A new metaheuristic for numerical function optimization: Vortex Search
algorithm, Information Sciences, Volume 293, 1 February 2015, Pages 125-145, ISSN 0020-0255
[17] Doğan B., Ölmez T., Vortex search algorithm for the analog active filter component selection
problem, AEU - International Journal of Electronics and Communications, Volume 69, Issue 9,
September 2015, Pages 1243-1253, ISSN 1434-8411
[18] Doğan, B., Yuksel, A., Analog filter group delay optimization using the Vortex Search algorithm,
Signal Processing and Communications Applications Conference (SIU), 2015 23th , vol., no.,
pp.288,291, 16-19 May 2015
[19] Doğan B., Ölmez T., Modified Off-lattice AB Model for Protein Folding Problem Using the Vortex
Search Algorithm, International Journal of Machine Learning and Computing vol. 5, no. 4, pp. 329-
333, 2015.
14. 126 Computer Science & Information Technology (CS & IT)
[20] Doğan B., Ölmez T., Fuzzy clustering of ECG beats using a new metaheuristic approach, 2nd
International Work-Conference on Bioinformatics and Biomedical Engineering (IWBBIO), 7-9 April
2014, Granada, Spain.
[21] Andrews L.C., Special Functions of Mathematics for Engineers, SPIE Press, 1992
[22] Gautschi W., A note on the recursive calculation of incomplete gamma functions ACM Trans. Math.
Software, 25 (1) (1999), pp. 101–107
[23] Winitzki S., Computing the incomplete Gamma function to arbitrary precision Computational
Science and Its Applications – ICCSA 2003, of LNCS, Vol. 2667 Springer-Verlag, Berlin (2003), pp.
790–798
[24] Allasia, G., Besenghi R., Numerical calculation of incomplete gamma function by the trapezoidal
rule, Numer. Math. (Numerische Mathematik) 50 (4):419{428, 1987
[25] Omran M.G.H., Clerc M., 2011, <http://www.particleswarm.info/>, accessed 25 February 2016
[26] Clerc M., "Standard Particle Swarm Optimization," Particle Swarm Central, Tech. Rep., 2012,
http://clerc.maurice.free.fr/pso/SPSO_descriptions.pdf, accessed 25 February 2016
[27] Karaboga, D., Akay, B., A comparative study of Artificial Bee Colony algorithm, Applied
Mathematics and Computation, Volume 214, Issue 1, 1 August 2009, Pages 108-132, ISSN 0096-
3003.
[28] ABC algorithm, http://mf.erciyes.edu.tr/abc/, accessed 25 February 2016
[29] VS algorithm, http://web.itu.edu.tr/~bdogan/VortexSearch/VS.htm, accessed 25 February 2016
[30] MVS algorithm, http://web.itu.edu.tr/~bdogan/ModifiedVortexSearch/MVS.htm, accessed 25
February 2016
[31] Karaboga D., Basturk B., On the performance of artificial bee colony (abc) algorithm, Applied Soft
Computing 8 (1) (2008) 687–697.
[32] Shi, Y., Eberhart R.C., Empirical study of particle swarm optimization, Evolutionary Computation,
1999. CEC 99. Proceedings of the 1999 Congress on. Vol. 3. IEEE, 1999.
AUTHORS
Dr. Berat Doğan received his BSc. degree in Electronics Engineering from Erciyes
University, Turkey, 2006. He received his MSc. degree in Biomedical Engineering
from Istanbul Technical University, Turkey, 2009. He received his PhD. in
Electronics Engineering at Istanbul Technical University, Turkey, 2015. Between
2008-2009 he worked as a software engineer at Nortel Networks Netas
Telecommunication Inc. Then, from 2009 to July 2015 he worked as a Research
Assistant at Istanbul Technical University. Now he is working as an Assistant
Professor at Inonu University, Malatya, Turkey. His research interests include
optimization algorithms, pattern recognition, biomedical signal and image processing, and bioinformatics.