In this paper, in order to overcome the defect of the firefly algorithm, for example, the slow
convergence rate, low accuracy and easily falling into the local optima in the global optimization search,
we propose a dynamic population firefly algorithm based on chaos. The stability between the fireflies is
proved, and the similar chaotic phenomenon in firefly algorithm can be simulated.
Research on Chaotic Firefly Algorithm and the Application in Optimal Reactive...TELKOMNIKA JOURNAL
Firefly algorithm (FA) is a newly proposed swarm intelligence optimization algorithm. Like many other general swarm intelligence optimization algorithms, the original version of FA is easy to trap into local optima. In order to overcome this drawback, the chaotic firefly algorithm (CFA) is proposed. The methods of chaos initialization, chaos population regeneration and linear decreasing inertia weight have been introduced into the original version of FA so as to increase its global search mobility for robust global optimization. The CFA is calculated in Matlab and is examined on six benchmark functions. In order to evaluate the engineering application of the algorithm, the reactive power optimization problem in IEEE 30 bus system is solved by CFA. The outcomes show that the CFA has better performance compared to the original version of FA and PSO.
Combining Neural Network and Firefly Algorithm to Predict Stock Price in Tehr...Editor IJCATR
In the present research, prediction of stock price index in Tehran stock exchange by using neural
networks and firefly algorithm in chaotic behavior of price index stock exchange are studied. Two data sets
are selected for neural network input. Various breaks of index and macro economic factors are considered
as independent variables. Also, firefly algorithm is used to [redict price index in next week. The results of
research show that combining neural networks and firefly optimization algorithm has better performance
than neural network to predict the price index. In addition, acceptable value of error-sequre means for
network error in test data show that there are chaotic mevements in behaviour of price index.
A Study of Firefly Algorithm and its Application in Non-Linear Dynamic Systemsijtsrd
Firefly Algorithm (FA) is a newly proposed computation technique with inherent parallelism, capable for local as well as global search, meta-heuristic and robust in computing process. In this paper, Firefly Algorithm for Dynamic System (FADS) is a proposed system to find instantaneous behavior of the dynamic system within a single framework based on the idealized behavior of the flashing characteristics of fireflies. Dynamic system where flows of mass and / or energy is cause of dynamicity is generally represented as a set of differential equations and Fourth Order Runge-Kutta (RK4) method is one of used tool for numerical measurement of instantaneous behaviours of dynamic system. In FADS, experimental results are demonstrating the existence of more accurate and effective RK4 technique for the study of dynamic system. Gautam Mahapatra | Srijita Mahapatra | Soumya Banerjee"A Study of Firefly Algorithm and its Application in Non-Linear Dynamic Systems" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018, URL: http://www.ijtsrd.com/papers/ijtsrd8393.pdf http://www.ijtsrd.com/computer-science/artificial-intelligence/8393/a-study-of-firefly-algorithm-and-its-application-in-non-linear-dynamic-systems/gautam-mahapatra
Research on Chaotic Firefly Algorithm and the Application in Optimal Reactive...TELKOMNIKA JOURNAL
Firefly algorithm (FA) is a newly proposed swarm intelligence optimization algorithm. Like many other general swarm intelligence optimization algorithms, the original version of FA is easy to trap into local optima. In order to overcome this drawback, the chaotic firefly algorithm (CFA) is proposed. The methods of chaos initialization, chaos population regeneration and linear decreasing inertia weight have been introduced into the original version of FA so as to increase its global search mobility for robust global optimization. The CFA is calculated in Matlab and is examined on six benchmark functions. In order to evaluate the engineering application of the algorithm, the reactive power optimization problem in IEEE 30 bus system is solved by CFA. The outcomes show that the CFA has better performance compared to the original version of FA and PSO.
Combining Neural Network and Firefly Algorithm to Predict Stock Price in Tehr...Editor IJCATR
In the present research, prediction of stock price index in Tehran stock exchange by using neural
networks and firefly algorithm in chaotic behavior of price index stock exchange are studied. Two data sets
are selected for neural network input. Various breaks of index and macro economic factors are considered
as independent variables. Also, firefly algorithm is used to [redict price index in next week. The results of
research show that combining neural networks and firefly optimization algorithm has better performance
than neural network to predict the price index. In addition, acceptable value of error-sequre means for
network error in test data show that there are chaotic mevements in behaviour of price index.
A Study of Firefly Algorithm and its Application in Non-Linear Dynamic Systemsijtsrd
Firefly Algorithm (FA) is a newly proposed computation technique with inherent parallelism, capable for local as well as global search, meta-heuristic and robust in computing process. In this paper, Firefly Algorithm for Dynamic System (FADS) is a proposed system to find instantaneous behavior of the dynamic system within a single framework based on the idealized behavior of the flashing characteristics of fireflies. Dynamic system where flows of mass and / or energy is cause of dynamicity is generally represented as a set of differential equations and Fourth Order Runge-Kutta (RK4) method is one of used tool for numerical measurement of instantaneous behaviours of dynamic system. In FADS, experimental results are demonstrating the existence of more accurate and effective RK4 technique for the study of dynamic system. Gautam Mahapatra | Srijita Mahapatra | Soumya Banerjee"A Study of Firefly Algorithm and its Application in Non-Linear Dynamic Systems" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018, URL: http://www.ijtsrd.com/papers/ijtsrd8393.pdf http://www.ijtsrd.com/computer-science/artificial-intelligence/8393/a-study-of-firefly-algorithm-and-its-application-in-non-linear-dynamic-systems/gautam-mahapatra
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHMcscpconf
A quantum computation problem is discussed in this paper. Many new features that make quantum computation superior to classical computation can be attributed to quantum coherence
effect, which depends on the phase of quantum coherent state. Quantum Fourier transform algorithm, the most commonly used algorithm, is introduced. And one of its most important
applications, phase estimation of quantum state based on quantum Fourier transform, is presented in details. The flow of phase estimation algorithm and the quantum circuit model are
shown. And the error of the output phase value, as well as the probability of measurement, is analysed. The probability distribution of the measuring result of phase value is presented and the computational efficiency is discussed.
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHMcsitconf
A quantum computation problem is discussed in this paper. Many new features that make
quantum computation superior to classical computation can be attributed to quantum coherence
effect, which depends on the phase of quantum coherent state. Quantum Fourier transform
algorithm, the most commonly used algorithm, is introduced. And one of its most important
applications, phase estimation of quantum state based on quantum Fourier transform, is
presented in details. The flow of phase estimation algorithm and the quantum circuit model are
shown. And the error of the output phase value, as well as the probability of measurement, is
analysed. The probability distribution of the measuring result of phase value is presented and
the computational efficiency is discussed.
Improved Firefly Algorithm for Unconstrained Optimization ProblemsEditor IJCATR
in this paper, an improved firefly algorithm with chaos (IFCH) is presented for solving unconstrained optimization
problems. Several numerical simulation results show that the algorithm offers an efficient way to solve unconstrained optimization
problems, and has a high convergence rate, high accuracy and robustness.
Ill-posedness formulation of the emission source localization in the radio- d...Ahmed Ammar Rebai PhD
To contact the authors : tarek.salhi@gmail.com and ahmed.rebai2@gmail.com
In the field of radio detection in astroparticle physics, many studies have shown the strong dependence of the solution of the radio-transient sources localization problem (the radio-shower time of arrival on antennas) such solutions are purely numerical artifacts. Based on a detailed analysis of some already published results of radio-detection experiments like : CODALEMA 3 in France, AERA in Argentina and TREND in China, we demonstrate the ill-posed character of this problem in the sens of Hadamard. Two approaches have been used as the existence of solutions degeneration and the bad conditioning of the mathematical formulation problem. A comparison between experimental results and simulations have been made, to highlight the mathematical studies. Many properties of the non-linear least square function are discussed such as the configuration of the set of solutions and the bias.
α Nearness ant colony system with adaptive strategies for the traveling sales...ijfcstjournal
On account of ant colony algorithm easy to fall into local optimum, this paper presents an improved ant
colony optimization called α-AACS and reports its performance. At first, we provide an concise description
of the original ant colony system(ACS) and introduce α-nearness based on the minimum 1-tree for ACS’s
disadvantage, which better reflects the chances of a given link being a member of an optimal tour. Then, we
improve α-nearness by computing a lower bound and propose other adaptations for ACS. Finally, we
conduct a fair competition between our algorithm and others. The results clearly show that α-AACS has a
better global searching ability in finding the best solutions, which indicates that α-AACS is an effective
approach for solving the traveling salesman problem.
Time alignment techniques for experimental sensor dataIJCSES Journal
Experimental data is subject to data loss, which presents a challenge for representing the data with a
proper time scale. Additionally, data from separate measurement systems need to be aligned in order to
use the data cooperatively. Due to the need for accurate time alignment, various practical techniques are
presented along with an illustrative example detailing each step of the time alignment procedure for actual
experimental data from an Unmanned Aerial Vehicle (UAV). Some example MATLAB code is also
provided.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Estimation of global solar radiation by using machine learning methodsmehmet şahin
In this study, global solar radiation (GSR) was estimated based on 53 locations by using ELM, SVR, KNN, LR and NU-SVR methods. Methods were trained with a two-year data set and accuracy of the mentioned methods was tested with a one-year data set. The data set of each year was consisting of 12 months. Whereas the values of month, altitude, latitude, longitude, vapour pressure deficit and land surface temperature were used as input for developing models, GSR was obtained as output. Values of vapour pressure deficit and land surface temperature were taken from radiometry of NOAA-AVHRR satellite. Estimated solar radiation data were compared with actual data that were obtained from meteorological stations. According to statistical results, most successful method was NU-SVR method. The RMSE and MBE values of NU-SVR method were found to be 1,4972 MJ/m2 and 0,2652 MJ/m2, respectively. R value was 0,9728. Furthermore, worst prediction method was LR. For other methods, RMSE values were changing between 1,7746 MJ/m2 and 2,4546 MJ/m2. It can be seen from the statistical results that ELM, SVR, k-NN and NU-SVR methods can be used for estimation of GSR.
Approximation of Real Impulse Response Using IIR Structures a3labdsp
In this paper, we propose a new approach to the approximation and simulation of a real impulse response. Starting from a preliminary analysis of the mixing time, the impulse response is decomposed in the time domain considering the early and late reflections. Therefore, an IIR structure composed of a cascade of second-order sections and four all-pass filters is employed to synthesize the first part of the impulse response, using a parametric optimization process in the frequency domain. Then, a recursive structure composed of comb and all-pass filters is used to synthesize the late reflections, exploiting a minimization criterion in the cepstral domain. Several results are reported taking into consideration a real impulse response, confirming the validity of the proposed approach.
An improved ant colony algorithm based onIJCI JOURNAL
This paper presents an improved chaotic ant colony system algorithm (ICACS) for solving combinatorial
optimization problems. The existing algorithms still have some imperfections, we use a combination of two
different operators to improve the performance of algorithm in this work. First, 3-opt local search is used
as a framework for the implementation of the ACS to improve the solution quality; Furthermore, chaos is
proposed in the work to modify the method of pheromone update to avoid the algorithm from dropping into
local optimum, thereby finding the favorable solutions. From the experimental results, we can conclude
that ICACS has much higher quality solutions than the original ACS, and can jump over the region of the
local optimum, and escape from the trap of a local optimum successfully and achieve the best solutions.
Therefore, it’s better and more effective algorithm for TSP.
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHMcscpconf
A quantum computation problem is discussed in this paper. Many new features that make quantum computation superior to classical computation can be attributed to quantum coherence
effect, which depends on the phase of quantum coherent state. Quantum Fourier transform algorithm, the most commonly used algorithm, is introduced. And one of its most important
applications, phase estimation of quantum state based on quantum Fourier transform, is presented in details. The flow of phase estimation algorithm and the quantum circuit model are
shown. And the error of the output phase value, as well as the probability of measurement, is analysed. The probability distribution of the measuring result of phase value is presented and the computational efficiency is discussed.
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHMcsitconf
A quantum computation problem is discussed in this paper. Many new features that make
quantum computation superior to classical computation can be attributed to quantum coherence
effect, which depends on the phase of quantum coherent state. Quantum Fourier transform
algorithm, the most commonly used algorithm, is introduced. And one of its most important
applications, phase estimation of quantum state based on quantum Fourier transform, is
presented in details. The flow of phase estimation algorithm and the quantum circuit model are
shown. And the error of the output phase value, as well as the probability of measurement, is
analysed. The probability distribution of the measuring result of phase value is presented and
the computational efficiency is discussed.
Improved Firefly Algorithm for Unconstrained Optimization ProblemsEditor IJCATR
in this paper, an improved firefly algorithm with chaos (IFCH) is presented for solving unconstrained optimization
problems. Several numerical simulation results show that the algorithm offers an efficient way to solve unconstrained optimization
problems, and has a high convergence rate, high accuracy and robustness.
Ill-posedness formulation of the emission source localization in the radio- d...Ahmed Ammar Rebai PhD
To contact the authors : tarek.salhi@gmail.com and ahmed.rebai2@gmail.com
In the field of radio detection in astroparticle physics, many studies have shown the strong dependence of the solution of the radio-transient sources localization problem (the radio-shower time of arrival on antennas) such solutions are purely numerical artifacts. Based on a detailed analysis of some already published results of radio-detection experiments like : CODALEMA 3 in France, AERA in Argentina and TREND in China, we demonstrate the ill-posed character of this problem in the sens of Hadamard. Two approaches have been used as the existence of solutions degeneration and the bad conditioning of the mathematical formulation problem. A comparison between experimental results and simulations have been made, to highlight the mathematical studies. Many properties of the non-linear least square function are discussed such as the configuration of the set of solutions and the bias.
α Nearness ant colony system with adaptive strategies for the traveling sales...ijfcstjournal
On account of ant colony algorithm easy to fall into local optimum, this paper presents an improved ant
colony optimization called α-AACS and reports its performance. At first, we provide an concise description
of the original ant colony system(ACS) and introduce α-nearness based on the minimum 1-tree for ACS’s
disadvantage, which better reflects the chances of a given link being a member of an optimal tour. Then, we
improve α-nearness by computing a lower bound and propose other adaptations for ACS. Finally, we
conduct a fair competition between our algorithm and others. The results clearly show that α-AACS has a
better global searching ability in finding the best solutions, which indicates that α-AACS is an effective
approach for solving the traveling salesman problem.
Time alignment techniques for experimental sensor dataIJCSES Journal
Experimental data is subject to data loss, which presents a challenge for representing the data with a
proper time scale. Additionally, data from separate measurement systems need to be aligned in order to
use the data cooperatively. Due to the need for accurate time alignment, various practical techniques are
presented along with an illustrative example detailing each step of the time alignment procedure for actual
experimental data from an Unmanned Aerial Vehicle (UAV). Some example MATLAB code is also
provided.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Estimation of global solar radiation by using machine learning methodsmehmet şahin
In this study, global solar radiation (GSR) was estimated based on 53 locations by using ELM, SVR, KNN, LR and NU-SVR methods. Methods were trained with a two-year data set and accuracy of the mentioned methods was tested with a one-year data set. The data set of each year was consisting of 12 months. Whereas the values of month, altitude, latitude, longitude, vapour pressure deficit and land surface temperature were used as input for developing models, GSR was obtained as output. Values of vapour pressure deficit and land surface temperature were taken from radiometry of NOAA-AVHRR satellite. Estimated solar radiation data were compared with actual data that were obtained from meteorological stations. According to statistical results, most successful method was NU-SVR method. The RMSE and MBE values of NU-SVR method were found to be 1,4972 MJ/m2 and 0,2652 MJ/m2, respectively. R value was 0,9728. Furthermore, worst prediction method was LR. For other methods, RMSE values were changing between 1,7746 MJ/m2 and 2,4546 MJ/m2. It can be seen from the statistical results that ELM, SVR, k-NN and NU-SVR methods can be used for estimation of GSR.
Approximation of Real Impulse Response Using IIR Structures a3labdsp
In this paper, we propose a new approach to the approximation and simulation of a real impulse response. Starting from a preliminary analysis of the mixing time, the impulse response is decomposed in the time domain considering the early and late reflections. Therefore, an IIR structure composed of a cascade of second-order sections and four all-pass filters is employed to synthesize the first part of the impulse response, using a parametric optimization process in the frequency domain. Then, a recursive structure composed of comb and all-pass filters is used to synthesize the late reflections, exploiting a minimization criterion in the cepstral domain. Several results are reported taking into consideration a real impulse response, confirming the validity of the proposed approach.
An improved ant colony algorithm based onIJCI JOURNAL
This paper presents an improved chaotic ant colony system algorithm (ICACS) for solving combinatorial
optimization problems. The existing algorithms still have some imperfections, we use a combination of two
different operators to improve the performance of algorithm in this work. First, 3-opt local search is used
as a framework for the implementation of the ACS to improve the solution quality; Furthermore, chaos is
proposed in the work to modify the method of pheromone update to avoid the algorithm from dropping into
local optimum, thereby finding the favorable solutions. From the experimental results, we can conclude
that ICACS has much higher quality solutions than the original ACS, and can jump over the region of the
local optimum, and escape from the trap of a local optimum successfully and achieve the best solutions.
Therefore, it’s better and more effective algorithm for TSP.
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...irjes
Firefly algorithm is one of the emerging evolutionary approaches for complex and non-linear
optimization problems. It is inspired by natural firefly‟s behavior such as movement of fireflies based on
brightness and by overcoming the constraints such as light absorption, obstacles, distance, etc. In this research,
firefly‟s movement had been simulated computationally to identify the best parameters for spur gear pair by
considering the design and manufacturing constraints. The proposed algorithm was tested with the traditional
design parameters and found the results are at par in less computational time by satisfying the constraints.
Fire-LEACH: A Novel Clustering Protocol for Wireless Sensor Networks based on...ijcsta
Clustering protocols have proven to increase the network throughput, reduce delay in packet transfer and save
energy. Hence, in this work, we propose a novel clustering protocol that uses firefly algorithm inspired approach
towards improving the existing basic LEACH protocol for reduction in steady-state energy consumption, aiming to
enhance the network lifetime. The simulated results prove that implanting these kinds of computational intelligence
into the pre-existing protocols considerably improves its performance.
Modified Discrete Firefly Algorithm Combining Genetic Algorithm for Traveling...TELKOMNIKA JOURNAL
The Firefly Algorithm (FA) has a few disadvantages in solving the constrained global optimization
problem, including that it is difficult to produce initial population, the size of relative attractiveness has
nothing to do with the absolute brightness of fireflies, the inertia weight does not take full advantage of the
information of objective function, and it cannot better control and constrain the mobile distance of firefly. In
this paper, we propose a novel method based on discrete firefly algorithm combining genetic algorithm for
traveling salesman problem. We redefine the distance of firefly algorithm by introducing swap operator and
swap sequence to avoid algorithm easily falling into local solution and accelerate convergence speed. In
addition, we adopt dynamic mechanism based on neighborhood search algorithm. Finally, the comparison
experiment results show that the novel algorithm can search perfect solution within a short time, and
greatly improve the effectiveness of solving the traveling salesman problem, it also significantly improves
computing speed and reduces iteration number.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Development of Nonlinear Optical Microscope and ScannerRohan Sharma
For my internship at the Femtosecond Spectroscopy & Nonlinear Optics Lab at IIT Delhi, I worked on the development of nonlinear optical microscope and scanner for 10 weeks.During the internship, I developed a multimodal nonlinear optical microscope employing white light and femtosecond laser to record the optical imaging, transmission imaging as well as the second harmonic generation (SHG) imaging of a sample.
Numerical Investigation of Multilayer Fractal FSSIJMER
Numerical investigations are presented for a multilayer frequency selective surface with Koch
fractal (levels 1 and 2) conducting patch elements. The structure investigated is obtained using two FSS
screens separated by an air gap layer. For the proposed investigation were used three different values an
air gap height. The results obtained using the numerical method were compared with other technique and
using the commercial software Ansoft DesignerTM. A good agreement was observed in terms of the
bandwidth.
Sub-windowed laser speckle image velocimetry by fast fourier transform technique
Abstract
In this work, laser speckle velocimetry, a unique optical method for velocity measurement of fluid flow has been described. A laser sheet is developed and is illuminated on microscopic seeded particles to produce the speckle pattern at the recording plane. Double frame- single-exposure speckle images are captured in such a way that the second speckle image is shifted exactly in a known direction. The auto-correlation method has the ambiguity of direction of flow. To rectify this, spatial shift of the second image has been premeditated. Cross-correlation of sub interrogation areas is obtained by Fast Fourier Transform technique. Four sub-windows processed to obtain the velocity information with vector map analysis precisely.
Towards the identification of the primary particle nature by the radiodetecti...Ahmed Ammar Rebai PhD
Radio signal from extensive air showers EAS studied by the CODALEMA experiment have been detected by means of the classic short fat antennas array working in a slave trigger mode by a particle scintillator array. It is shown that the radio shower wavefront is curved with respect to the plane wavefront hypothesis. Then a new tting model (parabolic model) is proposed to fit the radio signal time delay distributions in an event-by-event basis. This model take
into account this wavefront property and several shower geometry parameters such as: the existence of an apparent localised radio-emission source located at a distance Rc from the antenna array of and the radio shower core on the
ground. Comparison of the outputs from this model and other reconstruction models used in the same experiment show:
1)- That the radio shower core is shifted from the particle shower core in a statistic analysis approach.
2)- The capability of the radiodetection method to reconstruct the curvature radius with a statistical error less than 50 g.cm−2 .
Finally a preliminary study of the primary particle nature has been performed based on a comparison between data and Xmax distribution from Aires Monte-Carlo simulations for the same set of events.
Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...IOSR Journals
Abstract : Node localization is important parameter in WSN. Node localization is required to report origin of
events which makes it one of the important challenges in WSN. Received signal strength (RSS) is used to
calculate distance between mobile node and reference node. The position of the mobile node is calculated using
multilateration algorithm (MA). Extended Kalman filter (EKF) is utilized to estimate the actual position. In this
paper, the implementation and enhancement of a tracking system based on RSS indicator with the aid of an
Extended Kalman Filter (EKF) is described and an adaptive filter is derived.
Keywords - Extended Kalman filter (EKF), mobile node tracking, multilateration algorithm (MA), received
signal strength (RSS), Wireless sensor networks (WSN)
Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...IOSR Journals
Node localization is important parameter in WSN. Node localization is required to report origin of
events which makes it one of the important challenges in WSN. Received signal strength (RSS) is used to
calculate distance between mobile node and reference node. The position of the mobile node is calculated using
multilateration algorithm (MA). Extended Kalman filter (EKF) is utilized to estimate the actual position. In this
paper, the implementation and enhancement of a tracking system based on RSS indicator with the aid of an
Extended Kalman Filter (EKF) is described and an adaptive filter is derived.
THE ROLE OF HIGH ORDER TERMS IN LANDAU THEORY TOWARD LANDAU-KHALATNIKOV EQUAT...AM Publications
We present the numerical analysis of the high order terms in the polynomial series of the Landau density energy. We compare the profiles and hysteresis of three series of Landau equations. First series is up to the only fourth order, the second and the third series are up to the sixth and eighth terms. The polarisation profile curves are obtained by minimizing the Landau equation and solved it using root finding technique while the hysteresis is obtained by solving Landau-Khalatnikov equation. It is found that those three series of Landau model possese similar polarisation profiles and also similar hysteresis when the system is set near Curie temperature, around 40K to 50 K for the Tc of 50 K. If the temperature of the system is decreased further away from the Curie temperature, we have to consider the high order terms in Landau free energy expression
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
In this paper, snake optimization algorithm (SOA) is used to find the optimal gains of an enhanced controller for controlling congestion problem in computer networks. M-file and Simulink platform is adopted to evaluate the response of the active queue management (AQM) system, a comparison with two classical controllers is done, all tuned gains of controllers are obtained using SOA method and the fitness function chose to monitor the system performance is the integral time absolute error (ITAE). Transient analysis and robust analysis is used to show the proposed controller performance, two robustness tests are applied to the AQM system, one is done by varying the size of queue value in different period and the other test is done by changing the number of transmission control protocol (TCP) sessions with a value of ± 20% from its original value. The simulation results reflect a stable and robust behavior and best performance is appeared clearly to achieve the desired queue size without any noise or any transmission problems.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
2. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 4, December 2017 : 1733~1740
1734
2. The firefly algorithm and chaos
In this section, some involved theories will be introduced in brief.
2.1. Firefly algorithm (FA)
Firefly algorithm (FA), proposed by scholar Yang, is inspired by the phenomenon that
the fireflies flash and attract each other in nature[9]. It is one kind of colony searching
technology, which simulates the flashing and communication behavior of fireflies. The
brightness of a firefly indicates the location is good or bad.
Parameters of firefly algorithm are showed in details:
Definition2.1: The relative intensity of fireflies:
ijr
oI I e
(1)
Where 0I is the biggest fluorescence brightness of firefly.
is light intensity absorbed
coefficient and it is constant. It is characteristics of the weak that under the influence of the
fireflies emit light in the distance and medium by light intensity absorbed coefficient. For two
fireflies and , the distance is calculated:
(2)
Equation (2.2) is the distance between any two fireflies and at and , respectively.
Definition2. 2: The attractiveness of firefly is:
(3)
Where o is the attractiveness at 0r
Definition2.3: In every iteration, the fireflies could move to nearby ones with more
brightness as determined by Equation (2.4):
(4)
Where
ix t
and
1ix t
are the locations of the i -th firefly in last iteration and in this
iteration, respectively, so does
jx t
. And is step factor belonging to [0, 1]; Rand is uniformly
distributed random factors belonging to [0, 1].
The process of optimization is followed:
Step 1: Initialize the parameters of the algorithm. Define the number of fireflies m , the
biggest attraction o , the light intensity absorbed coefficient
, the step length factor , the
maximum number of generations maxT and the search accuracy , respectively.
Step 2: Calculate the fitness value of every firefly regarded as the respective maximum
fluorescence brightness.
Step 3: Calculate used (3).
Step 4: Update the locations of fireflies according to (4) and random disturb the firefly in
the optimum location.
Step 5: Update the fluorescence intensity and attraction after position.
Step 6: If the results meet the requirements, break to step 7; else, the number of
iterations plus one, back to step 3.
Step 7: Output the global extreme point and the optimal individual values. is time
complexity of algorithm .
i j ijr
2
, ,1
d
ij i k j kk
r x x
2
ijr
o e
1 0.5i i j ix t x t x x rand
2
( )O m
3. TELKOMNIKA ISSN: 1693-6930
The Chaos and Stability of Firefly Algorithm Adjacent Individual (WenXin Yu)
1735
2.2. Chaotic Map (CP)
The chaotic phenomenon refers to a seemingly random irregular movement that occurs
in a deterministic system. A system of deterministic theory describes the behavior of the system
as unpredictable and unpredictable[10]. In 1975, the word chaos was first used by Li and Yorke
in [11].This phenomenon is usually considered as a part of dynamical systems that changed
over the time. In this paper, there are some well-known chaotic maps introduced briefly.
1. Sinusodial map
This chaotic map was formally defined by the following equations [12]:
1 sin( ), (0,1)n n nx x x (5)
2. Logistic map
In 1976 , Robert May introduced Logistic map13], and he pointed out that the map led
to chaotic dynamics. This map was formally defined by the equations (6):
1 (1 )n n nx x x (6)
Where [0,1]nx , [0,4] , 0,1,2....n
3. Tinkerbell map
The Tinkerbell map was a discrete-time dynamical system given by [14]:
(7)
Some commonly used values of a, b, c, and d are:
4. Henon map
As a two-dimensional map, the Henon map is the simplest non-linear map in the high-
dimensional map, which was proposed by French astronomer Michel Henon in 1976. The
Henon map takes a point ( nx , ny )n the plane and maps it to a new point. It can defined as
followed [15]:
(8)
(a). Sinusodial map (b). Logistic map
2 2
1
1 2
n n n n n
n n n n n
x x y ax by
y x y cx dy
0.9, 0.6013, 2.0, 0.5
0.3, 0.6000, 2.0, 0.27
a b c d
a b c d
2
1
1
1n n n
n n
x ax y
y bx
4. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 4, December 2017 : 1733~1740
1736
(c). Tinkerbell map (d). Henon map
Figure 1. Chaotic map
Figure 1 are respectively the chaotic phenomena of Sinusodial map, Logistic map,
Tinkerbell map, Henon map and so on. The Sinusodial chaotic map with 251 iterations is
showed in Figure 1a, and here the initial point of variable is . Figure 1.b. is the result of
Logistic map. As we can see, the chaotic phenomenon can be obtained at the point of
when to increase the value of gradually. For Tinkerbell chaotic map, two sets of parameters
could be used to realize it: 0.9, 0.6013, 2.0, 0.5a b c d and 0.3a , 0.6000b ,
2.0, 0.27c d .In this paper, the former set of parameter has been used to do it, which is
showed in Figure 1.c. Like all chaotic maps, the Tinkerbell Map has also been shown to have
periods. After a certain number of mapping iterations, every given point showed in the map to
the right will find itself once again at its starting location. The chaotic curve of Henon map with
10000 iterations is showed in Figure 1.d, and the initial parameters are: 1.4a , 0.3b ,
1 1 0.4x y .
2.3. Chaotic-FA (CFA)
In this section, we have used four chaotic maps mentioned above to tune the FA
parameters and improve the performance, which will lead to a set of Firefly algorithm, or
different variants of the chaotic Firefly algorithm. The flowchart of a schematic chaotic- FA
(CFA)[5] is presented in Table 1. The following method describes how parameters can be
tuned.
Table 1. Pseudo Code of a Chaotic Firefly Algorithm
Objective function of optimization problem
Generate initial population of fireflies
Dedined search space
Light intensity at is determined by
random number
Tuning of parameters using chaotic maps
For
For
If
Move firefly towards in d-dimension
1 0.2x
3.6
1 2, , , ,
T
df x x x x x L
1,2, ,ix i n L
iI ix if x
0C a
1k
/ kC
1: .i no firefiles
1: .j no firefiles
j iI I
i j
5. TELKOMNIKA ISSN: 1693-6930
The Chaos and Stability of Firefly Algorithm Adjacent Individual (WenXin Yu)
1737
End if
Attractiveness varies with distance via Evaluate new solutions and update light intensity
End for
End for
Rank the fireflies and find the current best
If
Iteration continues
If not
Post Process the results
3. The stability and Quasi-chaos of firefly algorithm
3.1. The stability of firefly algorithm
In this section, the stability and chaos of firefly algorithm will be proved in details.
In the process of evolution, brightness is the matter to attract each other, and other
fireflies will move towards the brightest one, it will lead to a stabilization of individuals. So we get
the following theorem.
Theorem 3.1
If the dynamic behavior of fireflies are stable, it must meet the following conditions:
(9)
Where
Proof:
The expressions for updating the position of fireflies are:
(10)
(11)
Assuming and ,Equations (3.2-3.3 ) can be represented
as
(12)
Where
Suppose are the eigenvalue of ,Then there is an inverse matrix , such that
(13)
Solve the eigenvalue of M,we can get
(14)
According to the theory of stability, the necessary and sufficient condition for the
dynamic behavior of fireflies is , Therefore, the optimal stability condition is .
r
j
i
1k k
k MaximumGeneration
5
4
0.5rand
1 0.5i i j i j ix t x t x x rand x x
1 0.5i i ixbest t xbest t rand xbest t
1 i iz x t xbest 2 jz x t
1 1
2 2
Z z
M
Z z
1
, 0.5
1 0
M rand
1 2, M P
11
2
0
0
P MP
2 2 2
1,2
5 6 2 2 11
2 2
1,2 1
5
4
6. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 4, December 2017 : 1733~1740
1738
3.2. Quasi-chaos of firefly algorithm
In the process of iterations, distances will be convergent and fireflies will tend to be
stable after a number of iterations or evolutions. Under a certain circumstances, a kind of be
similar to chaotic phenomenon will become true, we define it as a Quasi-chaos phenomenon in
the paper.
So for firefly ,we have (15)
Similarly, for firefly (16)
After iterations, we get the propinquity Quasi-chaotic attractor of this map as shown in
Figure 2. The simulation is under of circumstance that: For Figure. 2.1, the initial locations of
adjacent fireflies are 0.01 and 0.09, the attractiveness of them are 0.001 and 0.08, respectively.
However, when these parameters change, the graphics will change greatly. For example, As
Figureure 2.2. We changed these parameters separately:0.1,0.1 and 0.00001, 0.00001.
(a) (b)
Figure.2 The resemblance Quasi-chaotic phenomenon of firefly algorithm
4. Experiment and results
In this section, three complicated functions will be tested using CFA, which the global
optimal point can be found simultaneously. And the space locations of adjacent firefly will be
simulated to prove the chaotic Algorithm
Table 2. Test Function
ID Name Formula Dimensions
F1 Sphere 10
F2 Rastrigin 10
F3 Griewank 10
i 1 0.5i i j ix t x t x x rand
j 1 0.5j j i jx t x t x x rand
2
1
1
n
i
i
F x
2
2
1
10cos 2 10
5.2
n
i i
i
i
F x x
x
2
3
11
1
1 cos
4000
n n
i
i
ii
x
F x
i
7. TELKOMNIKA ISSN: 1693-6930
The Chaos and Stability of Firefly Algorithm Adjacent Individual (WenXin Yu)
1739
Figure 3.1 Sphere function Figure 3.2 Rastrigin function
Figure 3.3 Griewank function
The minimum solution of the Sphere function, Rastrigin function, and Griewank function
are located at point x = (0, 0, 0, . . . , 0, 0, 0) with an objective function valued equal to F(x)=0.0.
When applied the CFA algorithm to the function, the algorithm finds the optimal solution after
approximately 38, 15, 9 iterations, respectively (Figure 4.1, Figure 4.2, Figure4.3).
By testing the four typical chaotic maps in these three complex functions, we are
supposed to find that CFA can overcome the defect of the firefly algorithm which slow
convergence rate and easily falling into the local optima in the global optimization search,but it
still exist the low precision.
Figure 4.1. Convergence history of Sphere
function
Figure 4.2. Convergence history of Rastrigin
function
8. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 4, December 2017 : 1733~1740
1740
Figure 4.3. Convergence history of Griewank function
5. Conclusion
This paper has focused on the chaos and stability of adjacent fireflies in firefly
algorithm. The main contribution is that the chaotic performance and behavior are proved and
tested by using theory of stability in firefly algorithm. Through the above experiments and
results, CFA can overcome the defect of the firefly algorithm which slow convergence rate and
easily falling into the local optima in the global optimization search.
Acknowledgment
This work was supported by HuNan University of Science and Technology Doctor Startup Fund
Grant No.E51664,Hunan Provincial Department of Education Science Research Project Grant
No.16C0639.
References
[1] Cui Z, Cai X, Zeng J, et al. Particle swarm optimization with fuss and rws for high dimensional
functions. Applied Mathematics & Computation, 2008; 205(1): 98-108.
[2] M. Gnana Sundari, M. Rajaram, Sujatha Balaraman. Application of improved firefly algorithm for
programmed PWM in multilevel inverter with adjustable DC sources, Applied Soft Computing; 2016;
41(April): 169-179.
[3] Baykasoğlu A, Ozsoydan F B. An improved firefly algorithm for solving dynamic multidimensional
knapsack problems, Expert Systems with Applications, 2014; 41(8):3712-3725.
[4] Dos, Santos Coelho, L., A. B. D. L. De, and V. C. Mariani. A chaotic firefly algorithm applied to
reliability–redundancy optimization, IEEE Congress on Evolutionary Computation (CEC), IEEE. 2011:
517–521.
[5] Gandomi A H, Yang X S, Talatahari S, et al. Firefly algorithm with chaos, Commun. Nonlinear Sci.
Numer. Simul. .2013; 18 (1): 89–98.
[6] Fister I, Yang X S, et al. On the randomized firefly algorithm in Cuckoo Search and Firefly Algorithm,
Springer. 2014; pp.27–48.
[7] Yang X S. Analysis of firefly algorithms and automatic parameter tuning, in: Emerging Research on
Swarm Intelligence and Algorithm Optimization, IGI Global, 2015; 36–49.
[8] Yu W X, Sui Y, Wang J. The Faults Diagnostic Analysis for Analog Circuit Based on FA-TM-ELM.
Journal of Electronic Testing, 2016; 1-7.
[9] Yang X S. Firefly algorithms for multimodal optimization, in: Stochastic Algorithms: Foundations and
Applications, Springer, 2009; 169–178.
[10] Feldman D P. Chaos and Fractals: An Elementary Introduction, OUP Oxford. 2012.
[11] Li T Y, Yorke J A. Period three implies chaos, Am. Math. Mon. 1975; 82 (10): 985–992.
[12] El-Henawy I, Abdel-Raouf O, Abdel-Baset M. Chaotic firefly algorithm for solving definite integral, Int.
J. Computer Science and Information Technologies. 2014; 6: 19–24.
[13] Yuan X, Zhao J, Yang Y, et al. Hybrid parallel chaos optimization algorithm with harmony search
algorithm, Applied Soft Computing, 2014; 17: 12-22.
[14] Coelho L D S, Mariani V C. Firefly algorithm approach based on chaotic Tinkerbell map applied to
multivariable PID controller tuning, Comput. Math. Appl. 2012; 64 (8): 2371-2382.
[15] Arai Z. On loops in the hyperbolic locus of the complex Hénon map and their monodromies, Physica
D: Nonlinear Phenomena, 2016. http://dx.doi.org/10.1016/j.physd.2016.02.006.rnal.