In the recent years the development in communication systems requires the development of low cost, minimal weight, low profile antennas that are capable of maintaining high performance over a wide spectrum of frequencies. This technological trend has focused much effort into the design of a micro strip patch antennas. Nowadays Evolutionary Computation has its growth to extent. Generally electromagnetic optimization problems generally involve a large number of parameters. Synthesis of non-uniform linear antenna arrays is one of the most important electromagnetic optimization problems of the current interest.
MEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASEIAEME Publication
Frequent pattern can be extract from any dataset by using Apriori algorithm. Apriori algorithm is first choice of all researchers to find frequently occurs pattern from any binary dataset. Dataset contain record of user purchase item as transaction record. This paper improves existing apriori algorithm performance by extract frequent patterns from binary transaction data. New approach is applied for dataset implementation in form of transposed database of user’s record for fast data access. New work has done to mine frequent patterns using transposition of dataset, if database is large and contains thousands of attributes but having only some objects.
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUDIAEME Publication
Cloud computing is an essential ingredient of today’s modern information technology. Cloud computing is totally based on internet. With the use of cloud computing resources can be shared from anywhere and anytime. In cloud computing there are multiple users simultaneously requests for the number of services and its important to provision all resources to user in efficient manner to satisfy their requirements. To come out this problem in this paper we had reviwed the different types of resource allocation strategies and proposed an ontology based resource management framwork for dynamic resource allocation. Ontology Framework contain four sections, each section equipped with functionality to collect information regarding all resources available in actual cloud deployment based on signed SLA agreement, and then replies to the user with appropriate allocation.
A one decade survey of autonomous mobile robot systems IJECEIAES
Recently, autonomous mobile robots have gained popularity in the modern world due to their relevance technology and application in real world situations. The global market for mobile robots will grow significantly over the next 20 years. Autonomous mobile robots are found in many fields including institutions, industry, business, hospitals, agriculture as well as private households for the purpose of improving day-to-day activities and services. The development of technology has increased in the requirements for mobile robots because of the services and tasks provided by them, like rescue and research operations, surveillance, carry heavy objects and so on. Researchers have conducted many works on the importance of robots, their uses, and problems. This article aims to analyze the control system of mobile robots and the way robots have the ability of moving in real-world to achieve their goals. It should be noted that there are several technological directions in a mobile robot industry. It must be observed and integrated so that the robot functions properly: Navigation systems, localization systems, detection systems (sensors) along with motion and kinematics and dynamics systems. All such systems should be united through a control unit; thus, the mission or work of mobile robots are conducted with reliability.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Semi-supervised learning approach using modified self-training algorithm to c...IJECEIAES
Burst header packet flooding is an attack on optical burst switching (OBS) network which may cause denial of service. Application of machine learning technique to detect malicious nodes in OBS network is relatively new. As finding sufficient amount of labeled data to perform supervised learning is difficult, semi-supervised method of learning (SSML) can be leveraged. In this paper, we studied the classical self-training algorithm (ST) which uses SSML paradigm. Generally, in ST, the available true-labeled data (L) is used to train a base classifier. Then it predicts the labels of unlabeled data (U). A portion from the newly labeled data is removed from U based on prediction confidence and combined with L. The resulting data is then used to re-train the classifier. This process is repeated until convergence. This paper proposes a modified self-training method (MST). We trained multiple classifiers on L in two stages and leveraged agreement among those classifiers to determine labels. The performance of MST was compared with ST on several datasets and significant improvement was found. We applied the MST on a simulated OBS network dataset and found very high accuracy with a small number of labeled data. Finally we compared this work with some related works.
Digital image hiding algorithm for secret communicationeSAT Journals
Abstract
It is important to keep the image secret with the growing popularity of digital media’s through world wide web to avoid geometric attacking and stealing of images. A new digital image hiding algorithm that provides the security of hidden image, Imperceptibility , Robustness, Anti attacking capability is proposed. To achieve this, two different algorithms are used in frequency domain. The first algorithm is Discrete wavelet transform(DWT) and the second one is Singular Value Decomposition(SVD). Wavelet coefficients of secret and carrier image is found using DWT. In this the images are divided into four frequency part called LL, LH, HL, HH. Low frequency component possess main information. So the low frequency part alone taken for the process of SVD to increase imperceptibility. The processed secret image is embedded into the transformed carrier image. From this implementation of new digital image hiding algorithm, image can be stored and transmitted without any loss in that image even after getting affected by external factors such as rotation and noise. The parameter used to test the robustness is peak signal to ratio (PSNR). The experimental results shows that the proposed method is more robust against different kinds of attacks.
Keywords: Image hiding, DWT, SVD, Frequency domain, Attacks.
MEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASEIAEME Publication
Frequent pattern can be extract from any dataset by using Apriori algorithm. Apriori algorithm is first choice of all researchers to find frequently occurs pattern from any binary dataset. Dataset contain record of user purchase item as transaction record. This paper improves existing apriori algorithm performance by extract frequent patterns from binary transaction data. New approach is applied for dataset implementation in form of transposed database of user’s record for fast data access. New work has done to mine frequent patterns using transposition of dataset, if database is large and contains thousands of attributes but having only some objects.
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUDIAEME Publication
Cloud computing is an essential ingredient of today’s modern information technology. Cloud computing is totally based on internet. With the use of cloud computing resources can be shared from anywhere and anytime. In cloud computing there are multiple users simultaneously requests for the number of services and its important to provision all resources to user in efficient manner to satisfy their requirements. To come out this problem in this paper we had reviwed the different types of resource allocation strategies and proposed an ontology based resource management framwork for dynamic resource allocation. Ontology Framework contain four sections, each section equipped with functionality to collect information regarding all resources available in actual cloud deployment based on signed SLA agreement, and then replies to the user with appropriate allocation.
A one decade survey of autonomous mobile robot systems IJECEIAES
Recently, autonomous mobile robots have gained popularity in the modern world due to their relevance technology and application in real world situations. The global market for mobile robots will grow significantly over the next 20 years. Autonomous mobile robots are found in many fields including institutions, industry, business, hospitals, agriculture as well as private households for the purpose of improving day-to-day activities and services. The development of technology has increased in the requirements for mobile robots because of the services and tasks provided by them, like rescue and research operations, surveillance, carry heavy objects and so on. Researchers have conducted many works on the importance of robots, their uses, and problems. This article aims to analyze the control system of mobile robots and the way robots have the ability of moving in real-world to achieve their goals. It should be noted that there are several technological directions in a mobile robot industry. It must be observed and integrated so that the robot functions properly: Navigation systems, localization systems, detection systems (sensors) along with motion and kinematics and dynamics systems. All such systems should be united through a control unit; thus, the mission or work of mobile robots are conducted with reliability.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Semi-supervised learning approach using modified self-training algorithm to c...IJECEIAES
Burst header packet flooding is an attack on optical burst switching (OBS) network which may cause denial of service. Application of machine learning technique to detect malicious nodes in OBS network is relatively new. As finding sufficient amount of labeled data to perform supervised learning is difficult, semi-supervised method of learning (SSML) can be leveraged. In this paper, we studied the classical self-training algorithm (ST) which uses SSML paradigm. Generally, in ST, the available true-labeled data (L) is used to train a base classifier. Then it predicts the labels of unlabeled data (U). A portion from the newly labeled data is removed from U based on prediction confidence and combined with L. The resulting data is then used to re-train the classifier. This process is repeated until convergence. This paper proposes a modified self-training method (MST). We trained multiple classifiers on L in two stages and leveraged agreement among those classifiers to determine labels. The performance of MST was compared with ST on several datasets and significant improvement was found. We applied the MST on a simulated OBS network dataset and found very high accuracy with a small number of labeled data. Finally we compared this work with some related works.
Digital image hiding algorithm for secret communicationeSAT Journals
Abstract
It is important to keep the image secret with the growing popularity of digital media’s through world wide web to avoid geometric attacking and stealing of images. A new digital image hiding algorithm that provides the security of hidden image, Imperceptibility , Robustness, Anti attacking capability is proposed. To achieve this, two different algorithms are used in frequency domain. The first algorithm is Discrete wavelet transform(DWT) and the second one is Singular Value Decomposition(SVD). Wavelet coefficients of secret and carrier image is found using DWT. In this the images are divided into four frequency part called LL, LH, HL, HH. Low frequency component possess main information. So the low frequency part alone taken for the process of SVD to increase imperceptibility. The processed secret image is embedded into the transformed carrier image. From this implementation of new digital image hiding algorithm, image can be stored and transmitted without any loss in that image even after getting affected by external factors such as rotation and noise. The parameter used to test the robustness is peak signal to ratio (PSNR). The experimental results shows that the proposed method is more robust against different kinds of attacks.
Keywords: Image hiding, DWT, SVD, Frequency domain, Attacks.
A multilabel classification approach for complex human activities using a com...IJECEIAES
In our daily lives, humans perform different Activities of Daily Living (ADL), such as cooking, and studying. According to the nature of humans, they perform these activities in a sequential/simple or an overlapping/complex scenario. Many research attempts addressed simple activity recognition, but complex activity recognition is still a challenging issue. Recognition of complex activities is a multilabel classification problem, such that a test instance is assigned to a multiple overlapping activities. Existing data-driven techniques for complex activity recognition can recognize a maximum number of two overlapping activities and require a training dataset of complex (i.e. multilabel) activities. In this paper, we propose a multilabel classification approach for complex activity recognition using a combination of Emerging Patterns and Fuzzy Sets. In our approach, we require a training dataset of only simple (i.e. single-label) activities. First, we use a pattern mining technique to extract discriminative features called Strong Jumping Emerging Patterns (SJEPs) that exclusively represent each activity. Then, our scoring function takes SJEPs and fuzzy membership values of incoming sensor data and outputs the activity label(s). We validate our approach using two different dataset. Experimental results demonstrate the efficiency and superiority of our approach against other approaches.
Abstract
The exponential growth of knowledge in the World Wide Web, has understood the need to develop economical and effective ways for organizing relevant contents. In the field of web computing, document clustering plays a vital role and plays an interesting and challenging problem. Document clustering is mainly used for grouping the similar documents in the search engine. The web also has rich and dynamic collection of hyperlink information. The retrieval of relevant document from the internet is the complicated task. Based on the user’s query the document will be retrieved from the various databases to give relevant information and additional information for the given query. The documents are already clustered based on keyword extraction and stored in the database. The probabilistic relational approach for web document clustering is to find the relation between two linked pages and to define a relational clustering algorithm based on probabilistic graph representation. In document clustering, both content information and hyperlink structure of web page are considered and document is viewed as a semantic units. It also provides additional information to the user.
Keywords: Document Clustering, Agglomerative Clustering, Entropy, F-Measure
Enhancing Keyword Query Results Over Database for Improving User Satisfaction ijmpict
Storing data in relational databases is widely increasing to support keyword queries but search results does not gives effective answers to keyword query and hence it is inflexible from user perspective. It would be helpful to recognize such type of queries which gives results with low ranking. Here we estimate prediction of query performance to find out effectiveness of a search performed in response to query and features of such hard queries is studied by taking into account contents of the database and result list. One relevant problem of database is the presence of missing data and it can be handled by imputation. Here an inTeractive Retrieving-Inferring data imputation method (TRIP) is used which achieves retrieving and inferring alternately to fill the missing attribute values in the database. So by considering both the prediction of hard queries and imputation over the database, we can get better keyword search results.
Recognition of Epilepsy from Non Seizure Electroencephalogram using combinati...Atrija Singh
IC3: International IEEE Conference on Contemporary Computing
Noida India
Presented on 10th August 2017.
Topic : Recognition of Epilepsy from Non Seizure Electroencephalogram using combination of Linear SVM and Time Domain Attributes.
The premise of this paper is to discover frequent patterns by the use of data grids in WEKA 3.8 environment. Workload imbalance occurs due to the dynamic nature of the grid computing hence data grids are used for the creation and validation of data. Association rules are used to extract the useful information from the large database. In this paper the researcher generate the best rules by using WEKA 3.8 for better performance. WEKA 3.8 is used to accomplish best rules and implementation of various algorithms.
Approaching Rules Induction CN2 Algorithm in Categorizing of Biodiversityijtsrd
Rule induction is an area of machine learning in which formal rules are extracted from a set of observations. Machine learning is a field of artificial intelligence that uses statistical techniques to give computer systems the ability to learn from data, without being explicitly programmed. Machine learning applications are classification, regression, clustering, density estimation and dimensionality reduction. The CN2 algorithm is a classification technique designed for the efficient induction of simple, comprehensible rules of form “if cond then predict classâ€, even in domains where noise may be present. Biodiversity means biological diversity, the variety of life found in a place on Earth or, often, the total variety of life on Earth. This research used butterflies as biological dataset for categorizing biodiversity and passed it to CN2 Rule Induction. In this research, “The Fauna of British India, Ceylon and Burma. Butterflies. Vol. I and Vol. II†written by C.T Bingham are used as the required knowledge for resource and categorizing biodiversity of butterfly families by rules induction with CN2 algorithm system has developed. In this system, MS Visual Studio as a programming tool and MS SQL Server as for database development are used. Su Myo Swe | Khin Myo Sett ""Approaching Rules Induction: CN2 Algorithm in Categorizing of Biodiversity"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25153.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-architecture/25153/approaching-rules-induction-cn2-algorithm-in-categorizing-of-biodiversity/su-myo-swe
Multibiometric Secure Index Value Code Generation for Authentication and Retr...ijsrd.com
The use of multiple biometric sources for human recognition, referred to as multibiometrics, mitigates some of the limitations of unimodal biometric systems by increasing recognition accuracy, improving population coverage, imparting fault-tolerance, and enhancing security. In a biometric identification system, the identity corresponding to the input data (probe) is typically determined by comparing it against the templates of all identities in a database (gallery). An alternative e approach is to limit the number of identities against which matching is performed based on criteria that are fast to evaluate. We propose a method for generating fixed-length codes for indexing biometric databases. An index code is constructed by computing match scores between a biometric image and a fixed set of reference images. Candidate identities are retrieved based on the similarity between the index code of the probe image and those of the identities in the database. The number of multibiometric systems deployed on a national scale is increasing and the sizes of the underlying databases are growing. These databases are used extensively, thereby requiring efficient ways for searching and retrieving relevant identities. Searching a biometric database for an identity is usually done by comparing the probe image against every enrolled identity in the database and generating a ranked list of candidate identities. Depending on the nature of the matching algorithm, the matching speed in some systems can be slow. The proposed technique can be easily extended to retrieve pertinent identities from multimodal databases. Experiments on a chimeric face and fingerprint bimodal database resulted in an 84% average reduction in the search space at a hit rate of 100%. These results suggest that the proposed indexing scheme has the potential to substantially reduce the response time without compromising the accuracy of identification. New representation schemes that allow for faster search and, therefore, shorter response time are needed.
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection SystemIOSRjournaljce
Big data problem in intrusion detection system is mainly due to the large volume of the data. The dimension of the original data is 41. Some of the feature of original data are unnecessary. In this process, the volume of data has expanded into hundreds and thousands of gigabytes(GB) of information. The dimension span of data and volume can be reduced and the system is enhanced by using K-NN and BA. The reduction ratio of KDD datasets and processing speed is very slow so the data has been reduced for extracting features by Bees Algorithm (AB) and use K-nearest neighbors as classification (KNN). So, the KDD99 datasets applied in the experiments with significant features. The results have gave higher detection and accuracy rate as well as reduced false positive rate. Keywords: Big Data; Intru
RECOMMENDER SYSTEM FOR DETECTION OF DENGUE USING FUZZY LOGICIAEME Publication
The recommender System involved in health care is important since user can detect whether he has problem or not. A user will get whole information on the go. Today user doesn’t have much time and information about the dengue and it will be disclosed to the user at later stages. The dengue is deadly disease so its information should be disclosed at earlier stage. The proposed system works toward this aspect. The set of parameters including fever, TLC, blood pressure, severe headache etc. are analysed in proposed system. The filtering mechanism is also utilised in the proposed system which is integral part of recommender system. The content based filtering will be utilised in proposed system.
Recommendation based on Clustering and Association RulesIJARIIE JOURNAL
Recommender systems play an important role in filtering and customizing the desired information.
Recommender system are divided into 3 categories i.e collaborative filtering , content-based filtering, and hybrid
filtering and they are the most adopted techniques being utilized in recommender systems. The paper mainly
describe about the issues of recommendation system.The main aim of paper is to recommend the suitable items to
the user, so for recommending the suitable items a better rule extraction is needed.Thus for better rule extraction
Association mining is applied .The clustering method is also applied here to cluster the data based on similar
characteristics .The propose methods try to eliminate certain problems such as sparsity, cold-start problem. So to
overcome the certain problem association mining over clustering is used
Trust Enhanced Role Based Access Control Using Genetic Algorithm IJECEIAES
Improvements in technological innovations have become a boon for business organizations, firms, institutions, etc. System applications are being developed for organizations whether small-scale or large-scale. Taking into consideration the hierarchical nature of large organizations, security is an important factor which needs to be taken into account. For any healthcare organization, maintaining the confidentiality and integrity of the patients’ records is of utmost importance while ensuring that they are only available to the authorized personnel. The paper discusses the technique of Role-Based Access Control (RBAC) and its different aspects. The paper also suggests a trust enhanced model of RBAC implemented with selection and mutation only ‘Genetic Algorithm’. A practical scenario involving healthcare organization has also been considered. A model has been developed to consider the policies of different health departments and how it affects the permissions of a particular role. The purpose of the algorithm is to allocate tasks for every employee in an automated manner and ensures that they are not over-burdened with the work assigned. In addition, the trust records of the employees ensure that malicious users do not gain access to confidential patient data.
A multilabel classification approach for complex human activities using a com...IJECEIAES
In our daily lives, humans perform different Activities of Daily Living (ADL), such as cooking, and studying. According to the nature of humans, they perform these activities in a sequential/simple or an overlapping/complex scenario. Many research attempts addressed simple activity recognition, but complex activity recognition is still a challenging issue. Recognition of complex activities is a multilabel classification problem, such that a test instance is assigned to a multiple overlapping activities. Existing data-driven techniques for complex activity recognition can recognize a maximum number of two overlapping activities and require a training dataset of complex (i.e. multilabel) activities. In this paper, we propose a multilabel classification approach for complex activity recognition using a combination of Emerging Patterns and Fuzzy Sets. In our approach, we require a training dataset of only simple (i.e. single-label) activities. First, we use a pattern mining technique to extract discriminative features called Strong Jumping Emerging Patterns (SJEPs) that exclusively represent each activity. Then, our scoring function takes SJEPs and fuzzy membership values of incoming sensor data and outputs the activity label(s). We validate our approach using two different dataset. Experimental results demonstrate the efficiency and superiority of our approach against other approaches.
Abstract
The exponential growth of knowledge in the World Wide Web, has understood the need to develop economical and effective ways for organizing relevant contents. In the field of web computing, document clustering plays a vital role and plays an interesting and challenging problem. Document clustering is mainly used for grouping the similar documents in the search engine. The web also has rich and dynamic collection of hyperlink information. The retrieval of relevant document from the internet is the complicated task. Based on the user’s query the document will be retrieved from the various databases to give relevant information and additional information for the given query. The documents are already clustered based on keyword extraction and stored in the database. The probabilistic relational approach for web document clustering is to find the relation between two linked pages and to define a relational clustering algorithm based on probabilistic graph representation. In document clustering, both content information and hyperlink structure of web page are considered and document is viewed as a semantic units. It also provides additional information to the user.
Keywords: Document Clustering, Agglomerative Clustering, Entropy, F-Measure
Enhancing Keyword Query Results Over Database for Improving User Satisfaction ijmpict
Storing data in relational databases is widely increasing to support keyword queries but search results does not gives effective answers to keyword query and hence it is inflexible from user perspective. It would be helpful to recognize such type of queries which gives results with low ranking. Here we estimate prediction of query performance to find out effectiveness of a search performed in response to query and features of such hard queries is studied by taking into account contents of the database and result list. One relevant problem of database is the presence of missing data and it can be handled by imputation. Here an inTeractive Retrieving-Inferring data imputation method (TRIP) is used which achieves retrieving and inferring alternately to fill the missing attribute values in the database. So by considering both the prediction of hard queries and imputation over the database, we can get better keyword search results.
Recognition of Epilepsy from Non Seizure Electroencephalogram using combinati...Atrija Singh
IC3: International IEEE Conference on Contemporary Computing
Noida India
Presented on 10th August 2017.
Topic : Recognition of Epilepsy from Non Seizure Electroencephalogram using combination of Linear SVM and Time Domain Attributes.
The premise of this paper is to discover frequent patterns by the use of data grids in WEKA 3.8 environment. Workload imbalance occurs due to the dynamic nature of the grid computing hence data grids are used for the creation and validation of data. Association rules are used to extract the useful information from the large database. In this paper the researcher generate the best rules by using WEKA 3.8 for better performance. WEKA 3.8 is used to accomplish best rules and implementation of various algorithms.
Approaching Rules Induction CN2 Algorithm in Categorizing of Biodiversityijtsrd
Rule induction is an area of machine learning in which formal rules are extracted from a set of observations. Machine learning is a field of artificial intelligence that uses statistical techniques to give computer systems the ability to learn from data, without being explicitly programmed. Machine learning applications are classification, regression, clustering, density estimation and dimensionality reduction. The CN2 algorithm is a classification technique designed for the efficient induction of simple, comprehensible rules of form “if cond then predict classâ€, even in domains where noise may be present. Biodiversity means biological diversity, the variety of life found in a place on Earth or, often, the total variety of life on Earth. This research used butterflies as biological dataset for categorizing biodiversity and passed it to CN2 Rule Induction. In this research, “The Fauna of British India, Ceylon and Burma. Butterflies. Vol. I and Vol. II†written by C.T Bingham are used as the required knowledge for resource and categorizing biodiversity of butterfly families by rules induction with CN2 algorithm system has developed. In this system, MS Visual Studio as a programming tool and MS SQL Server as for database development are used. Su Myo Swe | Khin Myo Sett ""Approaching Rules Induction: CN2 Algorithm in Categorizing of Biodiversity"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25153.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-architecture/25153/approaching-rules-induction-cn2-algorithm-in-categorizing-of-biodiversity/su-myo-swe
Multibiometric Secure Index Value Code Generation for Authentication and Retr...ijsrd.com
The use of multiple biometric sources for human recognition, referred to as multibiometrics, mitigates some of the limitations of unimodal biometric systems by increasing recognition accuracy, improving population coverage, imparting fault-tolerance, and enhancing security. In a biometric identification system, the identity corresponding to the input data (probe) is typically determined by comparing it against the templates of all identities in a database (gallery). An alternative e approach is to limit the number of identities against which matching is performed based on criteria that are fast to evaluate. We propose a method for generating fixed-length codes for indexing biometric databases. An index code is constructed by computing match scores between a biometric image and a fixed set of reference images. Candidate identities are retrieved based on the similarity between the index code of the probe image and those of the identities in the database. The number of multibiometric systems deployed on a national scale is increasing and the sizes of the underlying databases are growing. These databases are used extensively, thereby requiring efficient ways for searching and retrieving relevant identities. Searching a biometric database for an identity is usually done by comparing the probe image against every enrolled identity in the database and generating a ranked list of candidate identities. Depending on the nature of the matching algorithm, the matching speed in some systems can be slow. The proposed technique can be easily extended to retrieve pertinent identities from multimodal databases. Experiments on a chimeric face and fingerprint bimodal database resulted in an 84% average reduction in the search space at a hit rate of 100%. These results suggest that the proposed indexing scheme has the potential to substantially reduce the response time without compromising the accuracy of identification. New representation schemes that allow for faster search and, therefore, shorter response time are needed.
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection SystemIOSRjournaljce
Big data problem in intrusion detection system is mainly due to the large volume of the data. The dimension of the original data is 41. Some of the feature of original data are unnecessary. In this process, the volume of data has expanded into hundreds and thousands of gigabytes(GB) of information. The dimension span of data and volume can be reduced and the system is enhanced by using K-NN and BA. The reduction ratio of KDD datasets and processing speed is very slow so the data has been reduced for extracting features by Bees Algorithm (AB) and use K-nearest neighbors as classification (KNN). So, the KDD99 datasets applied in the experiments with significant features. The results have gave higher detection and accuracy rate as well as reduced false positive rate. Keywords: Big Data; Intru
RECOMMENDER SYSTEM FOR DETECTION OF DENGUE USING FUZZY LOGICIAEME Publication
The recommender System involved in health care is important since user can detect whether he has problem or not. A user will get whole information on the go. Today user doesn’t have much time and information about the dengue and it will be disclosed to the user at later stages. The dengue is deadly disease so its information should be disclosed at earlier stage. The proposed system works toward this aspect. The set of parameters including fever, TLC, blood pressure, severe headache etc. are analysed in proposed system. The filtering mechanism is also utilised in the proposed system which is integral part of recommender system. The content based filtering will be utilised in proposed system.
Recommendation based on Clustering and Association RulesIJARIIE JOURNAL
Recommender systems play an important role in filtering and customizing the desired information.
Recommender system are divided into 3 categories i.e collaborative filtering , content-based filtering, and hybrid
filtering and they are the most adopted techniques being utilized in recommender systems. The paper mainly
describe about the issues of recommendation system.The main aim of paper is to recommend the suitable items to
the user, so for recommending the suitable items a better rule extraction is needed.Thus for better rule extraction
Association mining is applied .The clustering method is also applied here to cluster the data based on similar
characteristics .The propose methods try to eliminate certain problems such as sparsity, cold-start problem. So to
overcome the certain problem association mining over clustering is used
Trust Enhanced Role Based Access Control Using Genetic Algorithm IJECEIAES
Improvements in technological innovations have become a boon for business organizations, firms, institutions, etc. System applications are being developed for organizations whether small-scale or large-scale. Taking into consideration the hierarchical nature of large organizations, security is an important factor which needs to be taken into account. For any healthcare organization, maintaining the confidentiality and integrity of the patients’ records is of utmost importance while ensuring that they are only available to the authorized personnel. The paper discusses the technique of Role-Based Access Control (RBAC) and its different aspects. The paper also suggests a trust enhanced model of RBAC implemented with selection and mutation only ‘Genetic Algorithm’. A practical scenario involving healthcare organization has also been considered. A model has been developed to consider the policies of different health departments and how it affects the permissions of a particular role. The purpose of the algorithm is to allocate tasks for every employee in an automated manner and ensures that they are not over-burdened with the work assigned. In addition, the trust records of the employees ensure that malicious users do not gain access to confidential patient data.
EFFECT OF PROCESS PARAMETERS ON FLATNESS OF PLASTIC COMPONENT IAEME Publication
Dimensional changes because of shrinkage is one of the most important problem in production of plastic parts using plastic injection molding(PIM). In this study, effect of injection
molding parameters on surface flatness of plastic component is investigated and achieving the flatness according to customer requirement is the big task, for that this work is carried out.
Comparative and comprehensive study of linear antenna arrays’ synthesisIJECEIAES
In this paper, a comparative and comprehensive study of synthesizing linear antenna array (LAA) designs, is presented. Different desired objectives are considered in this paper; reducing the maximum sidelobe radiation pattern (i.e., pencil-beam pattern), controlling the first null beamwidth (FNBW), and imposing nulls at specific angles in some designs, which are accomplished by optimizing different array parameters (feed current amplitudes, feed current phase, and array elements positions). Three different optimization algorithms are proposed in order to achieve the wanted goals; grasshopper optimization algorithms (GOA), ant lion optimization (ALO), and a new hybrid optimization algorithm based on GOA and ALO. The obtained results show the effectiveness and robustness of the proposed algorithms to achieve the wanted targets. In most experiments, the proposed algorithms outperform other well-known optimization methods, such as; Biogeography based optimization (BBO), particle swarm optimization (PSO), firefly algorithm (FA), cuckoo search (CS) algorithm, genetic algorithm (GA), Taguchi method, self-adaptive differential evolution (SADE), modified spider monkey optimization (MSMO), symbiotic organisms search (SOS), enhanced firefly algorithm (EFA), bat flower pollination (BFP) and tabu search (TS) algorithm.
The optimal synthesis of scanned linear antenna arrays IJECEIAES
In this paper, symmetric scanned linear antenna arrays are synthesized, in order to minimize the side lobe level of the radiation pattern. The feeding current amplitudes are considered as the optimization parameters. Newly proposed optimization algorithms are presented to achieve our target; Antlion Optimization (ALO) and a new hybrid algorithm. Three different examples are illustrated in this paper; 20, 26 and 30 elements scanned linear antenna array. The obtained results prove the effectiveness and the ability of the proposed algorithms to outperform and compete other algorithms like Symbiotic Organisms Search (SOS) and Firefly Algorithm (FA).
A genetic algorithm for the optimal design of a multistage amplifier IJECEIAES
The optimal sizing of analog circuits is one of the most complicated processes, because of the number of variables taken into, to the number of required objectives to be optimized and to the constraint functions restrictions. The aim is to automate this activity in order to accelerate the circuits design and sizing. In this paper, we deal with the optimization of the three stage bipolar transistor amplifier performances namely the voltage gain (AV), the input impedance (ZIN), the output impedance (ZOUT), the power consumption (P) and the low and the high cutoff frequency (FL,FH), through the Genetic Algorithm (GA). The presented optimization problem is of multi-dimensional parameters, and the trade-off of all parameters. In fact, the passive components (Resistors and Capacitors) are selected from manufactured constant values (E12, E24, E48, E96, E192) for the purpose of reduce the cost of design; also, the intrinsic parameters of transistors (hybrid parameters and the junction capacitances) are considered variables in order not to be limited in design. SPICE simulation is used to validate the obtained result/performances.
Elements Space and Amplitude Perturbation Using Genetic Algorithm for Antenna...CSCJournals
A simple and fast genetic algorithm (GA) developed to reduce the sidelobes in non-uniformly spaced linear antenna arrays. The proposed GA algorithm optimizes two vectors of variables to increase the Main lobe to Sidelobe power ratio (M/S) of array’s radiation pattern. The algorithm, in the first phase calculates the positions of the array elements and in the second phase, it manipulates the amplitude of excitation signals for each element. The simulations performed for 16 and 24 elements array structure. The results indicated that M/S improved in first phase from 13.2 to over 22.2dB meanwhile the half power beamwidth (HPBW) left almost unchanged. After element replacement, in the second phase, by using amplitude tapering further improvement up to 32dB was achieved. Also, the simulations shown that after element space perturbation, some antenna elements can be merged together without any performance degradation in radiation pattern in terms of gain and sidelobes level.
performance analysis of different radiation pattern using genetic algorithmijtsrd
In most applications of antenna arrays, side lobe levels SLLs are commonly unwanted. Especially, the first side lobe level which determines maximum SLL is the main source of electromagnetic interference EMI , and hence, it should be lowered. In this thesis proposed a very simple and powerful method for the synthesis of linear array antenna. This method reduced the desired level of side lobe level SLL as well as to steer the main beam at different different angle. In this paper we draw the radiation pattern for N = 24 elements with main beam are shifted by 30° and the simulation result analysis by Matlab R2013a tool. Rahul Pandya | Praveen Kumar Patidar "Performance Analysis of Different Radiation Pattern using Genetic Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33020.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/33020/performance-analysis-of-different-radiation-pattern-using-genetic-algorithm/rahul-pandya
Enhancing radial distribution system performance by optimal placement of DST...IJECEIAES
In this paper, A novel modified optimization method was used to find the optimal location and size for placing distribution Static Compensator in the radial distribution test feeder in order to improve its performance by minimizing the total power losses of the test feeder, enhancing the voltage profile and reducing the costs. The modified grey wolf optimization algorithm is used for the first time to solve this kind of optimization problem. An objective function was developed to study the radial distribution system included total power loss of the system and costs due to power loss in system. The proposed method is applied to two different test distribution feeders (33 bus and 69 bus test systems) using different Dstatcom sizes and the acquired results were analyzed and compared to other recent optimization methods applied to the same test feeders to ensure the effectiveness of the used method and its superiority over other recent optimization mehods. The major findings from obtained results that the applied technique found the most minimized total power loss in system, the best improved voltage profile and most reduction in costs due power loss compared to other methods.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Radio-frequency circular integrated inductors sizing optimization using bio-...IJECEIAES
In this article, a comparative study is accomplished between three of the most used swarm intelligence (SI) techniques; namely artificial bee colony (ABC), ant colony optimization (ACO), and particle swarm optimization (PSO) to carry out the optimal design of radio-frequency (RF) spiral inductors, the three algorithms are applied to the cost function of RF circular inductors for 180 nm beyond 2.50 GHz, the aim is to ensure optimal performance with less error in inductance, and a high-quality factor when compared to electromagnetic simulation. Simulation experiments are achieved and performances regarding convergence velocity, robustness, and computing time are checked. Also, this paper shows an impact study of technological parameters and geometric features on the inductance and the quality factor of the studied integrated inductor. The building method of constraints design with algorithms used has given good results and electromagnetic simulations are of good accuracy with an error of 2.31% and 4.15% on the quality factor and inductance respectively. The simulation shows that ACO provides more accuracy in circuit size and fewer errors than ABC and PSO, while PSO and ABC are better in terms of convergence velocity.
Synthesis of new antenna arrays with arbitrary geometries based on the super...IJECEIAES
The synthesis of antenna arrays with low sidelobe levels is needed to enhance the communication systems’ efficiency. In this paper, new arbitrary geometries that improve the ability of the antenna arrays to minimize the sidelobe level, are proposed. We employ the well-known superformula equation in the antenna arrays field by implementing the equation in the general array factor equation. Three metaheuristic optimization algorithms are used to synthesize the antenna arrays and their geometries; antlion optimization (ALO) algorithm, grasshopper optimization algorithm (GOA), and a new hybrid algorithm based on ALO and GOA. All the proposed algorithms are high-performance computational methods, which proved their efficiency for solving different real-world optimization problems. 15 design examples are presented and compared to prove validity with the most general standard geometry: elliptical antenna array (EAA). It is observed that the proposed geometries outperform EAA geometries by 4.5 dB and 10.9 dB in the worst and best scenarios, respectively, which proves the advantage and superiority of our approach.
Optimal electric distribution network configuration using adaptive sunflower ...journalBEEI
Network reconfiguration (NR) is a powerful approach for power loss reduction in the distribution system. This paper presents a method of network reconfiguration using adaptive sunflower optimization (ASFO) to minimize power loss of the distribution system. ASFO is developed based on the original sunflower optimization (SFO) that is inspired from moving of sunflower to the sun. In ASFO, the mechanisms including pollination, survival and mortality mechanisms have been adjusted compared to the original SFO to fit with the network reconfiguration problem. The numerical results on the 14-node and 33-node systems have shown that ASFO outperforms to SFO for finding the optimal network configuration with greater success rate and better obtained solution quality. The comparison results with other previous approaches also indicate that ASFO has better performance than other methods in term of optimal network configuration. Thus, ASFO is a powerful method for the NR.
Capacitor Placement Using Bat Algorithm for Maximum Annual Savings in Radial ...IJERA Editor
This paper presents a two stage approach that determines the optimal location and size of capacitors on radial distribution systems to improve voltage profile and to reduce the active power loss. In first stage, the capacitor locations can be found by using loss sensitivity method. Bat algorithm is used for finding the optimal capacitor sizes in radial distribution systems. The sizes of the capacitors corresponding to maximum annual savings are determined by considering the cost of the capacitors. The proposed method is tested on 15-bus, 33 bus, 34-bus, 69-bus and 85-bus test systems and the results are presented.
ESTIMATION OF THE PARAMETERS OF SOLAR CELLS FROM CURRENT-VOLTAGE CHARACTERIST...ijscai
This paper presents a method for calculating the light generated current, the series resistance, shun
resistance and the two components of the reverse saturation current usually encountered in the double
diode representation of the solar cell from the experimental values of the current-voltage characteristics
of the cell using genetic algorithm. The theory is able to regenerate the above mentioned parameters to
very good accuracy when applied to cell data that was generated from pre-defined parameters. The
method is applied to various types of space quality solar cells and sub cells. All parameters except the
light generated current are seen to be nearly the same in the case of a cell whose characteristics under
illumination and in dark were analyzed. The light generated current is nearly equal to the short- circuit
current in all cases. The parameters obtained by this method and another method are nearly equal
wherever applicable. The parameters are also shown to represent the current-voltage characteristics
well.
Similar to PATTERN SYNTHESIS OF NON-UNIFORM AMPLITUDE EQUALLY SPACED MICROSTRIP ARRAY ANTENNA USING GA, PSO AND DE ALGORITHMS (20)
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
2. Pattern Synthesis of Non-Uniform Amplitude equally Spaced Microstrip Array Antenna
Using GA, PSO and DE Algorithms
http://www.iaeme.com/IJARET/index.asp 133 editor@iaeme.com
1. INTRODUCTION
Low side lobe antennas are becoming an increasingly important component of high
performance electronic systems, particularly those operating in heavy clutter and
jamming environments. Practically, the radiation pattern of antenna array has not only
having the main beam but also side lobes .Most of the power is confined in main
beam which provides the coverage in desired portion. Some of the power is also
remained in sidelobe levels that are nothing but wastage of transmitting power [16]. If
the sidelobe levels are very high, large amount of transmitting power is wastage. For
efficient use of transmitting power and desired radiation characteristics can be
achieved by using this five following control methods: 1) The geometrical
configuration of the overall array 2) The relative displacement between the elements
3) The excitation amplitude of the individual elements 4) The excitation phase of
individual elements 5) The relative pattern of the individual elements .Various
analytical and numerical methods have been used to optimize the side lobe levels
relative to the main beam by using above controls.
Several new optimization techniques have been emerged in the past two decades,
that mimic biological evolution, or the way biological entities communicate in nature.
Some of these algorithms have been used successively in many electromagnetic and
antenna problems include Genetic Algorithms (GA) [1], Particle Swarm Optimization
(PSO) [2], and the method of Differential Evolution (DE) Algorithm [3]. In the
electromagnetism research area, mainly the antenna synthesis, the use of these
optimizers is widely and clearly appreciated. To date, different GA, PSO and DE
algorithms have been successfully applied to different problems including antenna
design and the array synthesis.
Many efforts have also been devoted to compare these algorithms to each other.
Typically, such comparisons have been based on artificial numerical benchmark
problems. The goal of many studies was to verify that one algorithm outperformed
another on a given set of problems. In general, it has been possible to improve a given
standard method within a restricted set of benchmark problems by making minor
modifications to it.Recently, Genetic Algorithms (GA) ,particle swarm optimization
(PSO) and differential evolution (DE) have been introduced and particularly PSO has
received increased interest from the EC community. These techniques have shown
great promise in several real-world applications [4]-[7]. In this paper, we investigated
the performance of GA, DE, PSO for the optimization of SLL.
In the following part of the paper, the theory and formulation of the optimization
problem will be explained. After words, the details of the proposed ensemble based
Genetic Algorithms (GA), Particle Swarm Optimization (PSO) and Differential
Evolution (DE) algorithms will be given. Finally, the application of algorithms in the
optimization of SLL will be demonstrated for 20 element antenna array. The
corresponding results of three algorithms will be compared.
2. MICRO STRIP PATCH ANTENNA
Microstrip antennas are used not only as single element but are very popular in arrays.
Arrays are very versatile and are used to synthesize a required pattern that cannot be
achieved with a single element. Arrays increase the directivity, and perform various
other functions which would be difficult with any one single element.
For the microstrip antenna, the x-y plane (π/2, 0 π /2, 3 π /2 2 π) is the
principal E-plane. For this plane, the expression for the radiated fields is[8-9]
3. K. Karuna Kumari and Prof. P. V. Sridevi
http://www.iaeme.com/IJARET/index.asp 134 editor@iaeme.com
cos
2
sin
cos
2
cos
2
sin
0
0
0
Lk
hk
hk
E
2. DESIGN OF LINEAR ARRAY ANTENNAS
Consider a Linear array of 2N symmetric array elements uniformly spaced of distance
d between the elements in x-z plane. The array factor for the linear antenna array is
shown below [10].
Where k is the wave number, k=2ᴨ/λ, θ is the angle measured from the axis of the
array, θo is the steering angle, [ , ] is the excitation of the current for the
element on either side of the array midpoint to be controlled and d is the spacing
between elements. By the array factor, the fitness function is obtained. Here, the
fitness function is used to obtain the optimum weights and to achieve maximum SLL.
Assuming the linear array is symmetric about its center of the array.
Mathematically, the array factor of a 2N element linear array is given by [10]
)coscos()5.0(cos2 01
dnkeIAF nJN
n N
2
k
Where k is the wave number
Fig 1: Geometry of Linear Antenna Array
θ is the angle measured from the axis of the array, θo is the steering
angle,[ , ] is the excitation of the current for the element on either side of the
array midpoint to be controlled and d is the spacing between elements. The fitness
function associated with this array is the maximum SLL of its associated far-field
pattern to be minimized. The general form of the fitness function is given by
)(
))(log20( 10
AFMax
AFMax
Fitness
Where |AF(θ)|=|AF(θo)| 0 , θ
d
4. Pattern Synthesis of Non-Uniform Amplitude equally Spaced Microstrip Array Antenna
Using GA, PSO and DE Algorithms
http://www.iaeme.com/IJARET/index.asp 135 editor@iaeme.com
3. THE GENETIC ALGORITHM (GA)
The Genetic Algorithm (GA) is an optimization and global search technique based on
the mechanics of natural selection and natural genetics. A Genetic Algorithm allows a
population composed of many individuals to involve under specified selection rules to
a state that minimizes the cost function. This optimization algorithm is more powerful
for problems with more number of variables and local minima. GA is very efficient in
exploring the entire search space or the solution space, which is large and complex.
The Genetic algorithm is implemented using computer simulation [9]. Genetic
Algorithm may be represented as shown in Fig.3.
In computer algorithm, a chromosome is an array of genes, a number of
chromosomes make up one population. The chromosomes are generated randomly in
the selected space. Each chromosome has an associated fitness function, assigning a
relative merit to that chromosome. The algorithm begins with a large list of random
chromosomes.
Figure 2 Genetic Algorithm for optimization of side lobe level
yes
yes
No
No
New Chromosomes= parents+ new offspring
Select best SLL
Stop
SLL≤ SLL_ Max
SLL≤SLL_Max
Cross over and mutation to generate new
chromosome as child
Evaluate SLL for each chromosome
Chromosomes having best SLL as parent
Create initial population
5. K. Karuna Kumari and Prof. P. V. Sridevi
http://www.iaeme.com/IJARET/index.asp 136 editor@iaeme.com
Fitness functions are evaluated for each chromosome. The chromosomes are
ranked from the best-fit to the least-fit, according to their respective fitness functions.
Unacceptable chromosomes are discarded, leaving a superior species-subset of an
original list, which is the process of selection. Genes that survive become parents, by
crossing over some of their genetic material to produce two new offspring. The
parents reproduce enough to offset the discarded chromosomes. Thus, the total
number of chromosomes remains constant after every iteration. Mutations cause small
random changes in a chromosome. Fitness functions are evaluated for the offspring
and mutated chromosome, and the process is repeated. The algorithm stops after a set
number of iterations, or when an acceptable solution is obtained.
In the genetic algorithm, initial chromosomes are combination of random
chromosome and amplitude excitations of linear array instead of all random
chromosomes. The halves of the chromosome are discarded and new half of
chromosomes are generated from parents chromosome which are best fits to fitness
function. The cost function is the maximum side lobe level for the antenna pattern.
4. PRACTICAL SWARM OPTIMIZATION ALGORITHM
Practical swarm optimization (PSO) is a population-based self-adaptive search
optimization technique first introduced by Kennedy and Eberhart [11]. The PSO
method is becoming very popular due to its simplicity of implementation and ability
to quickly converge to a reasonably good solution. In the practical swarm algorithm,
the trajectory of each individual in the search space is adjusted by dynamically
altering the velocity of each particle, according to its own flying particles in the D-
dimensional search space can be represented as and
respectively.
6. Pattern Synthesis of Non-Uniform Amplitude equally Spaced Microstrip Array Antenna
Using GA, PSO and DE Algorithms
http://www.iaeme.com/IJARET/index.asp 137 editor@iaeme.com
Fig 3.PSO Algorithm for optimization of side lobe level
DE ALGORITHM
To update the velocity matrix at each iteration K, every particle should now its
personal best and global best position vectors in addition to the neighbor best position.
The personal best position vector defines the position at which each particle attained
its best fitness value up to the present iteration. The personal best position of the
particle is represented as the global best
position vector defines the position in the solution space at which the best fitness
value was achieved by all particles, and is defined by
[12]
Initialize particles with random position&
Velocity Vectors
Calculate fitness values for each particle
Is current fitness value
better than pBest
Assign current fitness as new pBest Keep previous pBest
Use each particle’s velocity value to update
its data values
Calculate velocity for each particle
Assign best particle’s p Best value to g Best
Target or maximum
epochs reached
NO
YES
NO
YES
sss
Ss
ss
St
ar
t
END
Start
7. K. Karuna Kumari and Prof. P. V. Sridevi
http://www.iaeme.com/IJARET/index.asp 138 editor@iaeme.com
The particles are manipulated according to the following equations:
(2)
(3)
In 1995, Price and Storn commenced the Differential Evolution (DE) algorithm
[10] which is based upon differential mutation operator. Practically there are many
problems with different types of objective functions such as non-linear, noisy, flat,
non-differentiable, non-continuous, and multi-dimensional or have many local
minima which are difficult to solve analytically. DE is a robust statistical method for
cost function minimization which does not make use of a single nominal parameter
vector but instead it uses a population of equally important vectors and is very
advantageous to find the most approximate solution to any type of problems.
Differential evolution is a simple, efficient and robust evolutionary algorithm, and
is usually mark as DE/x/y/z, where x denotes how the differential mutation base is
chosen , y denotes the number of vectors differences added to the base vector and z
indicates the crossover method. It has been successfully applied to the array synthesis
problems, electromagnetic inverse problems and many other scientific and
engineering problems. Although it has been reported that differential evolution
performs better than many other algorithms, it is still a dream for differential
evolution users to have a strategy perfectly balancing exploration and exploitation, or
equivalently, reliability and efficiency.
It has been well known that the critical idea behind the success of Differential
Evolution is the creative invention of differential mutation [13-15]. Different
differential mutation strategies balance exploration and exploitation differently. For
example, DE/Best/*/* generally converges faster due to the guidance by the best
individual but may be locally trapped because of loss of directivity, while
DE/Rand/*/* gains directivity at the cost of efficiency. In order to simultaneously,
provide both diversity and guidance so that exploration and exploitation can be more
efficiently balanced. Synthesis capability, reliability and efficiency of DE/Rand/*/*
are tested. The simulation results show that DE/Rand/*/* is able to achieve lower
peak side lobe levels and converge reliably and efficiently.
In DE algorithm the objective function is sampled by a set of initial points which
are chosen randomly from the entire search space. Then in the next step the algorithm
adds the weighted difference between the two randomly selected population vectors to
the third random population vector to generate a new parameter vector. This process
of generating the new parameter vector is called mutation. Now this parameter vector
is further mixed with the predefined parameters to produce the trial vector and this
process is called crossover. Then in the last step, called selection in which trial vector
is replaced by the target vector if the trial vector reduces the values of the cost
function then that obtained due to the target vector.
To realize the algorithm let the problem is function of D number of independent
parameters. In this work for N element array, the number of independent parameters
is 2N in which the first N parameters are the normalized amplitude coefficient of the
N array elements and remaining N parameters are to represent the static phase of each
element. Hence, if NP be the population size then the parameter vectors are
represented as
8. Pattern Synthesis of Non-Uniform Amplitude equally Spaced Microstrip Array Antenna
Using GA, PSO and DE Algorithms
http://www.iaeme.com/IJARET/index.asp 139 editor@iaeme.com
The target vector compared with the trial vector and the minimum value is
admitted to the next generation. The above steps are continued until the predefined
number of generations reached or the desired value of the cost function is obtained.
The entire process of DE for solving problem is shown in flowchart in Fig 4.
Fig4: DE Algorithm for optimization of SLL
C
R
O
S
S
O
V
E
R
S
E
L
E
C
T
I
O
N
M
U
T
A
T
I
O
N
Yes
Yes
No
Yes
No
No
Start Set G=0 and randomly initiate
Compute
i=1
Save the result and stop
+F( )
f (
G
f(
i=i+1
i=NP
G=G+1
9. K. Karuna Kumari and Prof. P. V. Sridevi
http://www.iaeme.com/IJARET/index.asp 140 editor@iaeme.com
6. RESUITS AND DISCUSSIONS
In this paper, the Non-Uniform linear antenna array is synthesized using global
optimizing techniques called GA, PSO and DE algorithms. The Non-Uniform array is
symmetric array of 2N elements towards the center of the array. The array having
progressive phase and uniform spacing between the elements is 0.5λ.The radiation
pattern of linear antenna array with N=20 elements at scan angles and deg are
given for GA, PSO and DE. In this paper, the array factor is the objective function for
optimizing the fitness /cost function called SLL. By using this evaluation techniques
the est weights are obtained for linear antenna arrays to reduce the SLL.
Figure 5 Radiation pattern of 20 element microstrip array antenna using GA
Figure 6 Cost function graph for 500 iterations
-1.5 -1 -0.5 0 0.5 1 1.5
-50
-45
-40
-35
-30
-25
-20
-15
-10
-5
0
Theta in (Radians)
NormalizedAmplitude(dB)
Optimized Radiation pattern of microstrip array using GA
0 50 100 150 200 250 300 350 400 450 500
-24
-23
-22
-21
-20
-19
-18
-17
-16
-15
No.of generation
costfunction
10. Pattern Synthesis of Non-Uniform Amplitude equally Spaced Microstrip Array Antenna
Using GA, PSO and DE Algorithms
http://www.iaeme.com/IJARET/index.asp 141 editor@iaeme.com
Figure 7 Radiation pattern of 20 element microstrip array antenna using GA
Figure 8 Cost function graph for 500 iterations
-1.5 -1 -0.5 0 0.5 1 1.5
-50
-45
-40
-35
-30
-25
-20
-15
-10
-5
0
Theta in (Radians)
NormalizedAmplitude(dB)
Optimized Radiation pattern of microstrip array using PSO
0 50 100 150 200 250 300 350 400 450 500
-21
-20.5
-20
-19.5
-19
-18.5
-18
No.generation
Costfunction
11. K. Karuna Kumari and Prof. P. V. Sridevi
http://www.iaeme.com/IJARET/index.asp 142 editor@iaeme.com
Figure 9 Radiation pattern of 20 element microstrip array antenna using GA
Figure 10 Cost function graph for 500 iterations
-1.5 -1 -0.5 0 0.5 1 1.5
-50
-45
-40
-35
-30
-25
-20
-15
-10
-5
0
Theta in (Radians)
NormalizedAmplitude(dB)
Optimized Radiation pattern of microstrip array using DE
0 50 100 150 200 250 300 350 400 450 500
-34
-32
-30
-28
-26
-24
-22
-20
-18
-16
No.of generations
costfunction
12. Pattern Synthesis of Non-Uniform Amplitude equally Spaced Microstrip Array Antenna
Using GA, PSO and DE Algorithms
http://www.iaeme.com/IJARET/index.asp 143 editor@iaeme.com
Figure 11 Radiation Pattern of Linear antenna array of 20 elements using GA, PSO and DE at
θ= (deg)
Figure 13 Radiation Pattern of Linear antenna array of 20 elements using GA, PSO and DE at
θ= (deg)
-1.5 -1 -0.5 0 0.5 1 1.5
-50
-45
-40
-35
-30
-25
-20
-15
-10
-5
0
Theta in (Radians)
NormalizedAmplitude(dB)
Optimized Radiation pattern of microstrip array using GA,PSO,DE
GA
PSO
DE
-1.5 -1 -0.5 0 0.5 1 1.5
-50
-45
-40
-35
-30
-25
-20
-15
-10
-5
0
Theta in Radians
NormalizedAmplitude(dB)
Optimized Radiation pattern of microstrip array using GA,PSO,DE
GA
PSO
DE
13. K. Karuna Kumari and Prof. P. V. Sridevi
http://www.iaeme.com/IJARET/index.asp 144 editor@iaeme.com
Table 1 Best weights for GA, PSO and DE Algorithms with 200 iterations
Table 2 SLL for GA, PSO and DE Algorithms with 200 iterations
S.No
Optimized weights
using
GA(N=20)
Optimized weights
using
PSO (N=20)
Optimized weights
using
DE (N=20)
1 0.12379 1 0.1795
2 0.27239 1 0.2314
3 0.58451 0.71775 0.2507
4 0.36378 -0 0.2329
5 0.29836 1 0.3088
6 0.50807 1 0.3644
7 0.40648 -0 0.3992
8 0.6828 -0 0.6065
9 0.63655 1 0.5111
10 0.63238 0.27016 0.6688
11 0.66836 1 0.7699
12 0.50739 1 0.7218
13 0.86033 0.33163 0.7597
14 0.58251 1 0.7547
15 0.94851 1 1.0864
16 0.91995 1 0.8410
17 0.98516 1 0.9401
18 0.71477 1 1.0661
19 0.986 1 0.9943
20 0.92949 1 1.0953
GENETIC ALGORITHM
PARTICLE SWARM
ALGORITHM
DIFFERENTIAL
EVOLUTION
ALGORITHM
No.of
element
s
Side lobe
level(dB)
Converging
time (sec)
Side lobe
level(dB)
Converging
time (sec)
Side lobe
level(dB)
Converging
time (sec)
10 -27.99 37.62441 -27.808 29.252831 -38.8 14.43
20 -23.97 65.20003 -20.745 51.378521 -32.58 23.99
30 -22.70 93.89461 -20.726 74.199701 -28.12 32.49
40 -21.06 123.4181 -20.708 97.361576 -27.76 42.35
50 20.733 154.0718 -20.658 121.027607 -27.35 51.16
60 -20.645 187.3938 -20.574 144.979070 -27.06 59.89
70 -20.681 216.5338 -20.550 170.463793 -27.168 71.30
80 -20.68 248.7792 -20.393 195.657447 -25.198 83.39
90 -20.6 281.5972 -20.307 220.838639 -24.514 97.67
100 -20.572 281.5972 -20.214 247.091233 -23.625 114.02
14. Pattern Synthesis of Non-Uniform Amplitude equally Spaced Microstrip Array Antenna
Using GA, PSO and DE Algorithms
http://www.iaeme.com/IJARET/index.asp 145 editor@iaeme.com
Figure 14 Maximum Side lobe level with the number of elements
Figure 15 No. of elements verse Elapse time
10 20 30 40 50 60 70 80 90 100
-40
-38
-36
-34
-32
-30
-28
-26
-24
-22
-20
No.of Elements(N)
NormalisedAmplitude(dB)
No.of elements verse Normalised Amplitude(dB)
GA
PSO
DE
10 20 30 40 50 60 70 80 90 100
0
50
100
150
200
250
300
350
No.of Elements(N)
ElapseTime(seconds)
No.of elements verse Elapse Time(seconds)
GA
PSO
DE
15. K. Karuna Kumari and Prof. P. V. Sridevi
http://www.iaeme.com/IJARET/index.asp 146 editor@iaeme.com
In three algorithms N=20 elements are used. The radiation pattern of Linear
antenna array of 20 elements using GA, PSO algorithm and DE algorithm at
θ= (deg) and at θ= (deg) are represented. The radiation pattern of Linear antenna
array of 20 elements using GA, PSO and DE algorithms at θ= (deg) ,the SLL is -
23.97 dB , -20.45dB and -32.58 dB obtained respectively. The cost functions of
GA,PSO and DE algorithms of 200 iterations are represented. All the three algorithms
produced best results than normal linear antenna array having -13.6dB and
comparatively DE Algorithm produces maximum SLL than PSO and GA. All the
simulation results are obtained using MATLAB software
7. CONCLUSION
In this paper the optimization of 20 elements linear arrays in terms of side level using
genetic algorithm ,particle swarm optimization algorithm ,Differential Evaluations are
given. The side level for GA is -23.97 dB, PSO is - -20.45 dB and for DE is -32.58 for
20 element arrays. All three optimization techniques gives the good results for given
problem, however the elapsed time or converging time for genetic algorithm is more
when compared with PSO algorithm and DE algorithm. The number of generations
/iterations required to get best fitness value for DE is more compared with GA and
PSO.
REFERENCES
[1] Rahmat-Samii, Y., and Michielssen, E.: Electromagnetic Optimization by
Genetic Algorithms. (New York: Wiley-Interscience, 1999)
[2] Robinson, J., and Rahmat-Samii, Y.: Particle swarm optimization in
electromagnetics. IEEE Transactions on Antennas and Propagation, 2004, 52,
pp. 397–407.
[3] Storn, R. and K. Price, Differential evolution—A simple and efficient
heuristic for global optimization over continuous spaces, Journal of Global
Optimization, 11(4), pp. 341–359, 1997.
[4] M. M. Khodier and C. G. Christodoulou, Linear array geometry synthesis
with minimum side lobe level and null control using particle swarm
optimization, IEEE Transactions on Antennas and Propagation, 53(8),
August 2005.
[5] S. Yang, Y. B. Gan, and A. Qing, Sideband suppression in time modulated
linear arrays by the differential evolution algorithm, IEEE Antennas Wireless
Propagat. Lett., 1, pp. 173–175, 2002.
[6] D. Gies and Y. Rahmat-Samii, Particle swarm optimization for
reconfigurable phased-differentiated array design, Microw. Opt. Tech. Lett.,
38(3), pp. 168–175, Aug. 2003.
[7] Kurup, D., Himdi, M., and Rydberg, A.: Synthesis of uniform amplitude
unequally spaced antenna arrays using the differential algorithm, IEEE Trans.
Antennas Propagation, 2003, 51, pp. 2210–2217.
[8] K. Karuna Kumari, Dr.P.V.Sridevi Performance Evaluation of Circular
Microstrip Patch Array with Difference Dielectric Substrate Materials,
International Journal of Electronics and communication Engineering &
Technology 4(1) 2013,pp236–249
[9] K.Karuna Kumari, Dr.P.V.Sridevi, Side lobe level optimization of circular
Microstrip array antenna using Genetic Algorithm, IJECIERD 4(1) January-
Feb-2014pp 9–18
16. Pattern Synthesis of Non-Uniform Amplitude equally Spaced Microstrip Array Antenna
Using GA, PSO and DE Algorithms
http://www.iaeme.com/IJARET/index.asp 147 editor@iaeme.com
[10] F. Soltankarimi1, J. Nourinia and Ch. Ghobadi, Side Lobe Level
Optimization in Phased Array Antennas Using Genetic Algorithm, ISSST
A2004, Sydney, Australia, 30 Aug, 2 Sep 2004.
[11] J. Kennedy, R. Eberhart, Particle Swarm Optimization, IEEE Int. Conf.
Neural Networks (Perth, Australia), 4, 1995, pp.1942–1948.
[12] J.Robinson, Y.Rahmat-Samii, ParticleSwarm Optimization (PSO) in
Electromagnetics, IEEE Trans. Antennas Propagation, 52(2), February 2004,
pp. 397-407.
[13] S. Das, P. N. Suganthan, Differential Evolution: A survey of the State of- the-
Art, IEEE Transactions on Evolutionary Computation, 15(1), pp. 4–31, 2011
[14] Y. Wang, Z. Cai, and Q. Zhang, Differential evolution with composite trial
vector generation strategies and control parameters, IEEE Transactions on
Evolutionary Computation, 15(1), pp. 55–66, 2011.
[15] J.Robinson, Y.Rahmat-Samii, ParticleSwarm Optimization (PSO) in
Electromagnetics, IEEE Trans. Antennas Propagation, 52(2), February 2004,
pp. 397–407.
[16] Balanis, C.: Antenna Theory-Analysis and Design. (2nd Edition New York:
Wiley, 1997)
[17] Dr. Nagraj Kulkarni and Dr. S. N. Mulgi. A Novel Design and Development
of Superimposed Square Slot Two Element Rectangular Microstrip Array
Antenna for Wide Bandwidth and Intensified Gain. International Journal of
Advanced Research in Engineering and Technology, 5(1), 2014, pp. 187–
194.
[18] Gangadhar P Maddani, Sameena N Mahagavin, Shivasharanappa N Mulgi.
Design and Development of Microstrip Array Antenna for Wide Dual Band
Operation. International Journal of Electronics and communication
Engineering & Technology, 1(1), 2010, pp. 107–116.
[19] Gangadhar P Maddani, Sameena N Mahagavin, Shivasharanappa N Mulgi,
Rectangular Microstrip Array Antennas For Wide Triple Band Operation.
International Journal of Electronics and communication Engineering &
Technology, 1(1), 2010, pp. 53–61.
[20] James Blondin, Particle Swarm Optimization: A Tutorial September4, 2009.