Search results for: HEURISTIC - Bridge of Knowledge

Search

Search results for: HEURISTIC

Search results for: HEURISTIC

  • Microphone placement through meta-heuristic algorithms

    Publication

    - Year 2019

    Full text to download in external service

  • Heuristic scheduling algorithms for uniform load of computer system

    Publication

    - Year 2006

    W pracy zaprezentowano opracowany heurystyczny algorytm szeregowania zadań UNILO (ang. UNIform LOad - jednakowe obciążenie), umożliwiający redukcję całkowitego zapotrzebowania na moc obliczeniową systemu komputerowego bez pogarszania jego wydajności. Algorytm ten realizuje takie przydzielenie zadań obliczeniowych do poszczególnych jednostek (procesorów), aby zapewnić ich jednakowe obciążenie. Opracowany algorytm został zweryfikowany...

  • A New Heuristic Algorithm for Effective Preemption in MPLS Networks

    Publication

    - Year 2006

    W artykule opisano nowy algorytm wywłaszczania przeznaczony dla sieci MPLS. Umożliwia on alokację zasobów sieci dla nowej ścieżki uwzględniając koszt usuniętych jednej lub wielu istniejących już ścieżek. Proponowany heurystyczny algorytm wybiera ścieżki do wywłaszczenia wykorzystując informację o topologii sieci. Używa funkcji optymalizacji minimalizującej stratę pasma na poziomie sieci. Przedstawiono i omówiono wyniki badań symulacyjnych...

  • Heuristic Minimization of Symmetric Index Generation Functions utilizing their Properties

    Publication

    - Journal of Software and Systems Development - Year 2021

    Full text to download in external service

  • Heuristic Method of Safe Manoeuvre Selection Based on Collision Threat Parameters Areas

    This paper is a continuation of papers dedicated to a radar-based CTPA (Collision Threat Parameters Area) display designed to support safe manoeuvre selection. The display visualizes all the ships in an encounter and presents situational overview from the own ship’s point of view. It calculates and displays information on unsafe or unrealistic own ship’s course & speed allowing a user to select a safe manoeuvre. So far only the...

    Full text available to download

  • Performance improvement of NN based RTLS by customization of NN structure - heuristic approach

    Publication

    - Year 2015

    The purpose of this research is to improve performance of the Hybrid Scene Analysis – Neural Network indoor localization algorithm applied in Real-time Locating System, RTLS. A properly customized structure of Neural Network and training algorithms for specific operating environment will enhance the system’s performance in terms of localization accuracy and precision. Due to nonlinearity and model complexity, a heuristic analysis...

    Full text to download in external service

  • Optimal Placement of Phasor Measurement Unit in Power System using Meta-Heuristic Algorithms

    Publication

    - Electrotehnica, Electronica, Automatica - Year 2019

    The phasor measurement units (PMUs) play an important and vital role in power system monitoring and controlling, since they provide the power system phasors stamped with a common real time reference through a global positioning system (GPS). Indeed, from economical point of view it is not possible to set PMUs in all system buses due to the high cost and the requirement of more complex communication...

    Full text to download in external service

  • A bisection‐based heuristic for rapid EM‐driven multiobjective design of compact impedance transformers

    Design of microwave structures is a multiobjective task where several conflicting requirements have to be considered at the same time. For contemporary circuits characterized by complex geometries, multiobjective optimization cannot be performed using standard population‐based algorithms due to high cost of electromagnetic (EM) evaluations. In this work, we propose a deterministic approach for fast EM‐driven multiobjective design...

    Full text to download in external service

  • ANYTIME POLYNOMIAL HEURISTIC ALGORITHM FOR PARTITIONING GROUPS OF DATA WITH PRESERVING CLASS PROPORTIONS FOR CROSS-VALIDATION

    Publication

    - Year 2014

    The article describes a problem of splitting data for k-fold cross-validation, where class proportions must be preserved, with additional constraint that data is divided into groups that cannot be split into different cross-validation sets. This problem often occurs in e.g. medical data processing, where data samples from one patient must be included in the same cross-validation set. As this problem is NP-complete, a heuristic...

  • Integration of electric vehicle into smart grid: a meta heuristic algorithm for energy management between V2G and G2V

    Publication
    • G. Srihari
    • R. S. R. Krishnam Naidu
    • P. Falkowski-Gilski
    • P. Bidare Divakarachari
    • R. K. Varma Penmatsa

    - Frontiers in Energy Research - Year 2024

    Recently, Electric Vehicles (EV) have been providing fast response and substantial progress in the power generation model. Further, EVs are exploited as adaptable Energy Storage Systems (ESSs) and show a promising performance in ancillary service markets to increase the demand of Smart Grid (SG) integration. The expansion of Vehicle-to-Grid concept has created an extra power source when renewable energy sources are not available....

    Full text available to download

  • JOURNAL OF HEURISTICS

    Journals

    ISSN: 1381-1231 , eISSN: 1572-9397

  • Optimizing Construction Engineering Management Using Metaheuristic Methods and Bayesian Networks

    Publication

    The construction of buildings invariably involves time and costs, and disruptions impact ongoing construction projects. Crisis situations in management strategies, structural confusion, and finan-cial miscalculations often arise due to misguided decision-making. This article proposes a method that combines the learning of Bayesian Networks and heuristic techniques to optimize deci-sion-making processes in construction scheduling....

    Full text available to download

  • Service-based Resilience via Shared Protection in Mission-critical Embedded Networks

    Publication

    - IEEE Transactions on Network and Service Management - Year 2021

    Mission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...

    Full text available to download

  • Selection of optimal location and rated power of capacitor banks in distribution network using genetic algorithm

    Publication

    In this paper, the problem of placement and rated power of capacitor banks in the Distribution Network (DN) is considered. We try to suggest the best places for installing capacitor banks and define their reactive power. The considered formulation requires the optimization of the cost of two different objectives. Therefore the use of properly multiobjective heuristic optimization methods is desirable. To solve this problem we use...

    Full text to download in external service

  • Ahmed Lakhdar Kouzou

    People

    Phd Student at Faculty of Electrical and Control Engineering, Gdansk University of Technology . His main areas of research and interests include he application of meta-heuristic optimization algorithms in electric power systems. He served as temporary researsh assitant at Texas A&M University at Qatar. He received his Bachalor’s degree in Electrical and Electronic Engineering in 2017 from the Institute of Electrical &...

  • Cost-Efficient Optical Fronthaul Architectures for 5G and Future 6G Networks

    Publication

    - Year 2022

    Fifth-generation and Beyond (5GB) wireless networks have introduced new centralized architectures such as cloud radio access network (CRAN), which necessitate extremely high-capacity low latency Fronthaul (FH). CRAN has many advantageous features in terms of cost reduction, performance enhancement, ease of deployment, and centralization of network management. Nevertheless, designing and deploying a cost-efficient FH is still a...

    Full text to download in external service

  • Parallel tabu search for graph coloring problem

    Publication

    - Year 2006

    Tabu search is a simple, yet powerful meta-heuristic based on local search that has been often used to solve combinatorial optimization problems like the graph coloring problem. This paper presents current taxonomy of patallel tabu search algorithms and compares three parallelization techniques applied to Tabucol, a sequential TS algorithm for graph coloring. The experimental results are based on graphs available from the DIMACS...

  • Mobile devices and computing cloud resources allocation for interactive applications

    Using mobile devices such as smartphones or iPads for various interactive applications is currently very common. In the case of complex applications, e.g. chess games, the capabilities of these devices are insufficient to run the application in real time. One of the solutions is to use cloud computing. However, there is an optimization problem of mobile device and cloud resources allocation. An iterative heuristic algorithm for...

    Full text available to download

  • METHOD OF ROUTING SHIPS SAILING IN DEDICATED ENVIRONMENT

    Publication

    The method for determining the suboptimal route of sailing vessels operating in a restricted area of the sea are proposed in the paper. The dynamics of the environment including weather conditions and speed characteristics of ships sailing are considered. As optimiza-tion criterion, measure sailing time T, and the number of maneuvers performed ω, are taken into account. An heuristic algorithm, and the appropriate application routing...

    Full text available to download

  • eFRADIR: An Enhanced FRAmework for DIsaster Resilience

    Publication
    • A. Pasic
    • R. Girao-Silva
    • F. Mogyorosi
    • B. Vass
    • T. Gomes
    • P. Babarczi
    • P. Revisnyei
    • J. Tapolcai
    • J. Rak

    - IEEE Access - Year 2021

    This paper focuses on how to increase the availability of a backbone network with minimal cost. In particular, the new framework focuses on resilience against natural disasters and is an evolution of the FRADIR/FRADIR-II framework. It targets three different directions, namely: network planning, failure modeling, and survivable routing. The steady state network planning is tackled by upgrading a sub-network (a set of links termed...

    Full text available to download

  • Supervisory fuzzy control system for biological processes in sequencing wastewater batch reactor

    Publication

    The paper proposes the design of the supervisory heuristic fuzzy control system applied to a Sequencing Batch Reactor (SBR) in the Wastewater Treatment Plant (WWTP). Based on real data records and the biological process and aeration system models, a control system for biological processes has been designed. The supervisory control system performs management of the reactor work cycle, determines the phase length, controls the sludge...

    Full text to download in external service

  • Easy recipes for cooperative smoothing

    Publication

    - AUTOMATICA - Year 2010

    In this paper we suggest how several competing signal smoothers, differing in design parameters, or even in design principles, can be combined together to yield a better and more reliable smoothing algorithm. The proposed heuristic, but statistically well motivated, fusion mechanism allows one to combine practically all kinds of smoothers, from simple local averaging or order statistic filters, to parametric smoothers designed...

    Full text available to download

  • Performance Evaluation of Preemption Algorithms in MPLS Networks

    Preemption is a traffic engineering technique in Multiprotocol Switching Networks that enables creation of high priority paths when there is not enough free bandwidth left on the route. Challenging part of any preemption method is to select the best set of paths for removal. Several heuristic methods are available but no wider comparison had been published before. In this paper, we discuss the dilemmas in implementing preemption...

    Full text available to download

  • Nonlinear resultant theory of shells accounting for thermodiffusion

    Publication

    - CONTINUUM MECHANICS AND THERMODYNAMICS - Year 2021

    The complete nonlinear resultant 2D model of shell thermodiffusion is developed. All 2D balance laws and the entropy imbalance are formulated by direct through-the-thickness integration of respective 3D laws of continuum thermodiffusion. This leads to a more rich thermodynamic structure of our 2D model with several additional 2D fields not present in the 3D parent model. Constitutive equations of elastic thermodiffusive shells...

    Full text available to download

  • Design of Cost-Efficient Optical Fronthaul for 5G/6G Networks: An Optimization Perspective

    Publication

    - SENSORS - Year 2022

    Currently, 5G and the forthcoming 6G mobile communication systems are the most promising cellular generations expected to beat the growing hunger for bandwidth and enable the fully connected world presented by the Internet of Everything (IoE). The cloud radio access network (CRAN) has been proposed as a promising architecture for meeting the needs and goals of 5G/6G (5G and beyond) networks. Nevertheless, the provisioning of cost-efficient...

    Full text available to download

  • Efektywna metoda wyznaczania trasy statków żaglowych

    Publication

    - Year 2016

    Zaproponowano metodę wyznaczania suboptymalnej trasy statków żaglowych poruszających się w ograniczonym akwenie morskim. Uwzględniono przy tym dynamikę tego środowiska w tym warunki pogodowe oraz charakterystyki prędkościowe statków żaglowych. Jako kryterium optymalizacji przyjęto czas żeglugi T oraz liczbę wykonanych manewrów ω. Zaprojektowano heurystyczny algorytm oraz odpowiednią aplikację wyznaczania trasy dla ustalonych punktów...

    Full text available to download

  • Artificial Neural Network based fatigue life assessment of riveted joints in AA2024 aluminum alloy plates and optimization of riveted joints parameters

    Publication
    • R. Masoudi Nejad
    • N. Sina
    • W. Ma
    • W. Song
    • S. Zhu
    • R. Branco
    • W. Macek
    • A. Gholami

    - INTERNATIONAL JOURNAL OF FATIGUE - Year 2024

    The objective of this paper is to provide the fatigue life of riveted joints in AA2024 aluminum alloy plates and optimization of riveted joints parameters. At first, the fatigue life of the riveted joints in AA2024 aluminum alloy plates is obtained by experimental tests. Then, an artificial neural network is applied to estimate the fatigue life of riveted lap joints based on the number of lateral and longitudinal holes, punch pressure,...

    Full text to download in external service

  • Construction of phylogenetic trees with topological constraints

    This paper proposes a method of reconstruction of phylogenetic trees based on heuristic search with topological constraints. Using topological constraints it is possible to reduce the set of solutions as well as to enforce that the result is consistent with a given hypothesis about the evolution process within some group of species. Along with this work a number of algorithms used for phylogenetic analysis were implemented. Those...

  • Algorithms for testing security in graphs

    In this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...

    Full text available to download

  • Application of genetic algorithms in graph searching problem

    Graph searching is a common approach to solving a problem of capturing a hostile intruder by a group of mobile agents. We assume that this task is performed in environment which we are able to model as a graph G. The question asked is how many agents are needed to capture an arbitrary fast, invisible and smart intruder. This number is called the (edge) search number of G. The strategy which must be performed by agents is called...

  • Parallel implementation of a Sailing Assistance Application in a Cloud Environment

    Sailboat weather routing is a highly complex problem in terms of both the computational time and memory. The reason for this is a large search resulting in a multitude of possible routes and a variety of user preferences. Analysing all possible routes is only feasible for small sailing regions, low-resolution maps, or sailboat movements on a grid. Therefore, various heuristic approaches are often applied, which can find solutions...

    Full text available to download

  • Evolutionary Algorithms in MPLS network designing

    Publication

    - Year 2008

    MPLS technology become more and more popular especially in core networks giving great flexibility and compatibility with existing Internet protocols. There is a need to optimal design such networks and optimal bandwidth allocation. Linear Programming is not time efficient and does not solve nonlinear problems. Heuristic algorithms are believed to deal with these disadvantages and the most promising of them are Evolutionary Algorithms....

    Full text to download in external service

  • Multiclass AdaBoost Classifier Parameter Adaptation for Pattern Recognition

    The article presents the problem of parameter value selection of the multiclass ``one against all'' approach of an AdaBoost algorithm in tasks of object recognition based on two-dimensional graphical images. AdaBoost classifier with Haar features is still used in mobile devices due to the processing speed in contrast to other methods like deep learning or SVM but its main drawback is the need to assembly the results of binary...

    Full text to download in external service

  • Weighted Clustering for Bees Detection on Video Images

    Publication

    This work describes a bee detection system to monitor bee colony conditions. The detection process on video images has been divided into 3 stages: determining the regions of interest (ROI) for a given frame, scanning the frame in ROI areas using the DNN-CNN classifier, in order to obtain a confidence of bee occurrence in each window in any position and any scale, and form one detection window from a cloud of windows provided by...

    Full text available to download

  • Optimization of Division and Reconfiguration Locations of the Medium-Voltage Power Grid Based on Forecasting the Level of Load and Generation from Renewable Energy Sources

    Publication

    - ENERGIES - Year 2024

    The article addresses challenges in optimizing the operation of medium voltage networks, emphasizing optimizing network division points and selecting the best network configuration for minimizing power and energy losses. It critically reviews recent research on the issue of network configuration optimization. The optimization of the medium voltage power grid reconfiguration process was carried out using known optimization tools....

    Full text to download in external service

  • Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network

    Publication

    - Year 2017

    In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...

    Full text available to download

  • Multimodal Particle Swarm Optimization with Phase Analysis to Solve Complex Equations of Electromagnetic Analysis

    Publication

    - Year 2020

    In this paper, a new meta-heuristic method of finding roots and poles of a complex function of a complex variable is presented. The algorithm combines an efficient space exploration provided by the particle swarm optimization (PSO) and the classification of root and pole occurrences based on the phase analysis of the complex function. The method initially generates two uniformly distributed populations of particles on the complex...

    Full text available to download

  • Reliable routing and resource allocation scheme for hybrid RF/FSO networks

    Publication

    - Year 2014

    Significant success of wireless networks in the last decade has changed the paradigms of communication networks design. In particular, the growing interest in wireless mesh networks (WMNs) is observed. WMNs offer an attractive alternative to conventional cable infrastructures, especially in urban areas, where the cost of new installations is almost prohibitive. Unfortunately, the performance of WMNs is often limited by the cluttered...

    Full text to download in external service

  • Using River Formation Dynamics Algorithm in Mobile Robot Navigation

    River Formation Dynamics is a heuristic optimization algorithm based on the manner, in which drops of water form the river bed. The idea is to imitate the movement of drops on the edges between given nodes thus performing a search based on their height, which is modified through the mechanism of soil erosion and sediment deposition. In this way decreasing gradients are constructed, and these are followed by subsequent drops to...

    Full text to download in external service

  • Deformation mitigation and twisting moment control in space frames

    Publication

    - Structures - Year 2024

    Over the last five decades, space frames have centered on the modernization of touristic zones in view of architectural attractions. Although attempts to control joint movement and minimize axial force and bending moment in such structures were made sufficiently, twisting moments in space frames have been underestimated so far. In space frames, external load or restoring the misshapen shape may cause twisting in members. We herein...

    Full text available to download

  • Generating optimal paths in dynamic environments using RiverFormation Dynamics algorithm

    The paper presents a comparison of four optimisation algorithms implemented for the purpose of finding the shortest path in static and dynamic environments with obstacles. Two classical graph algorithms –the Dijkstra complete algorithm and A* heuristic algorithm – were compared with metaheuristic River Formation Dynamics swarm algorithm and its newly introduced modified version. Moreover, another swarm algorithm has been compared...

    Full text to download in external service

  • High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks

    Publication
    • G. Savva
    • K. Manousakis
    • J. Rak
    • I. Tomkos
    • G. Ellinas

    - IEEE Access - Year 2021

    This work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...

    Full text available to download

  • Enhancing Availability for Critical Services

    Publication
    • T. Gomes
    • L. Martins
    • R. Girão-Silva
    • D. Tipper
    • A. Pašić
    • B. Vass
    • L. Garrote
    • U. J. Nunes
    • M. Zachariasen
    • J. Rak

    - Year 2020

    Traditional approaches to provide classes of resilient service take the physical network availability as an input and then deploy redundancy and restoration techniques at various layers, often without full knowledge of mappings between layers. This makes it hard (and often inefficient) to ensure the high availability required by critical services which are typically a small fraction of the total traffic. Here, the innovative technique...

    Full text to download in external service

  • Defending against Fake VIP in Scant-Transparency Information Systems with QoS Differentiation

    Publication

    In client-server information systems with quality of service (QoS) differentiation, Client may deplete Server’s resources by demanding unduly high QoS level. Such QoS abuse has eluded systematic treatment; known defenses using Client authorization, payments, or service request inspection prior to QoS assignment, are heuristic and environment-specific. We offer a game-theoretic approach on the premise that a service request is occasionally...

    Full text available to download

  • Modelowanie podziału zadań przewozowych w obszarach zurbanizowanych

    Publication

    - Year 2018

    Niniejsza rozprawa doktorska dotyczy problematyki modelowania podziału zadań przewozowych w procesie modelowania podróży. Wykonane analizy wykazały zasadność zastosowania dodatkowych czynników w modelowaniu wyboru środka transportu z uwagi na ich istotny wpływ na jakość modelu dla wybranych motywacji podróży. W pracy zawarto przykładowe modele uwzględniające każdy z analizowanych czynników. Z wykorzystaniem badań heurystycznych...

  • Electronic nose algorithm design using classical system identification for odour intensity detection

    The two elements considered crucial for constructing an efficient environmental odour intensity monitoring systems are sensors and algorithms typically addressed to as electronic nose sensor (e-nose). Due to operational complexity of biochemical sensors developed in human bodies algorithms based on computational methods of artificial intelligence are typically considered superior to classical model based approaches in development...

    Full text to download in external service

  • Testing Stability of Digital Filters Using Multimodal Particle Swarm Optimization with Phase Analysis

    Publication

    - Year 2020

    In this paper, a novel meta-heuristic method for evaluation of digital filter stability is presented. The proposed method is very general because it allows one to evaluate stability of systems whose characteristic equations are not based on polynomials. The method combines an efficient evolutionary algorithm represented by the particle swarm optimization and the phase analysis of a complex function in the characteristic equation....

    Full text to download in external service

  • Metaheuristic algorithms for optimization of resilient overlay computing systems

    Publication
    • K. Walkowiak
    • W. Charewicz
    • M. Donajski
    • J. Rak

    - Logic journal of the IGPL - Year 2014

    The idea of distributed computing systems has been gaining much interest in recent years owing to the growing amount of data to be processed for both industrial and academic purposes. However, similar to other systems, also distributed computing systems are vulnerable to failures. Due to strict QoS requirements, survivability guarantees are necessary for provisioning of uninterrupted service. In this article, we focus on reliability...

    Full text to download in external service

  • Integracja bezprzewodowych heterogenicznych sieci IP dla poprawy efektywności transmisji danych na morzu

    Publication

    - Year 2023

    Wraz ze wzrostem istotności środowiska morskiego w naszym codziennym życiu np. w postaci zwiększonego wolumenu transportu realizowanego drogą morską. czy zintensyfikowanych prac dotyczących obserwacji i monitoringu środowiska morskiego, wzrasta również potrzeba opracowania efektywnych systemów komunikacyjnych dedykowanych dla tego środowiska. Heterogeniczne systemy łączności bezprzewodowej integrowane na poziomie warstwy sieciowej...

    Full text available to download

  • 5G/6G optical fronthaul modeling: cost and energy consumption assessment

    In fifth generation (5G) and the future beyond 5G (6G) radio access networks (RANs), the cost of fronthaul deployment is a main challenge for mobile network operators. Depending on different constraints, there are various solutions to deploy an efficient fronthaul. Fiber-optic-based fronthaul offers long-term support with regard to a rapid increase in capacity demands. When fiber connections, either point-to-point (P2P) or point-to-multipoint...

    Full text available to download