Search results for: HEURISTIC ALGORITHM
-
A New Heuristic Algorithm for Effective Preemption in MPLS Networks
PublicationW artykule opisano nowy algorytm wywłaszczania przeznaczony dla sieci MPLS. Umożliwia on alokację zasobów sieci dla nowej ścieżki uwzględniając koszt usuniętych jednej lub wielu istniejących już ścieżek. Proponowany heurystyczny algorytm wybiera ścieżki do wywłaszczenia wykorzystując informację o topologii sieci. Używa funkcji optymalizacji minimalizującej stratę pasma na poziomie sieci. Przedstawiono i omówiono wyniki badań symulacyjnych...
-
ANYTIME POLYNOMIAL HEURISTIC ALGORITHM FOR PARTITIONING GROUPS OF DATA WITH PRESERVING CLASS PROPORTIONS FOR CROSS-VALIDATION
PublicationThe article describes a problem of splitting data for k-fold cross-validation, where class proportions must be preserved, with additional constraint that data is divided into groups that cannot be split into different cross-validation sets. This problem often occurs in e.g. medical data processing, where data samples from one patient must be included in the same cross-validation set. As this problem is NP-complete, a heuristic...
-
Integration of electric vehicle into smart grid: a meta heuristic algorithm for energy management between V2G and G2V
PublicationRecently, Electric Vehicles (EV) have been providing fast response and substantial progress in the power generation model. Further, EVs are exploited as adaptable Energy Storage Systems (ESSs) and show a promising performance in ancillary service markets to increase the demand of Smart Grid (SG) integration. The expansion of Vehicle-to-Grid concept has created an extra power source when renewable energy sources are not available....
-
Microphone placement through meta-heuristic algorithms
Publication -
Optimal Placement of Phasor Measurement Unit in Power System using Meta-Heuristic Algorithms
PublicationThe phasor measurement units (PMUs) play an important and vital role in power system monitoring and controlling, since they provide the power system phasors stamped with a common real time reference through a global positioning system (GPS). Indeed, from economical point of view it is not possible to set PMUs in all system buses due to the high cost and the requirement of more complex communication...
-
Generating optimal paths in dynamic environments using RiverFormation Dynamics algorithm
PublicationThe paper presents a comparison of four optimisation algorithms implemented for the purpose of finding the shortest path in static and dynamic environments with obstacles. Two classical graph algorithms –the Dijkstra complete algorithm and A* heuristic algorithm – were compared with metaheuristic River Formation Dynamics swarm algorithm and its newly introduced modified version. Moreover, another swarm algorithm has been compared...
-
Heuristic scheduling algorithms for uniform load of computer system
PublicationW pracy zaprezentowano opracowany heurystyczny algorytm szeregowania zadań UNILO (ang. UNIform LOad - jednakowe obciążenie), umożliwiający redukcję całkowitego zapotrzebowania na moc obliczeniową systemu komputerowego bez pogarszania jego wydajności. Algorytm ten realizuje takie przydzielenie zadań obliczeniowych do poszczególnych jednostek (procesorów), aby zapewnić ich jednakowe obciążenie. Opracowany algorytm został zweryfikowany...
-
Selection of optimal location and rated power of capacitor banks in distribution network using genetic algorithm
PublicationIn this paper, the problem of placement and rated power of capacitor banks in the Distribution Network (DN) is considered. We try to suggest the best places for installing capacitor banks and define their reactive power. The considered formulation requires the optimization of the cost of two different objectives. Therefore the use of properly multiobjective heuristic optimization methods is desirable. To solve this problem we use...
-
Using River Formation Dynamics Algorithm in Mobile Robot Navigation
PublicationRiver Formation Dynamics is a heuristic optimization algorithm based on the manner, in which drops of water form the river bed. The idea is to imitate the movement of drops on the edges between given nodes thus performing a search based on their height, which is modified through the mechanism of soil erosion and sediment deposition. In this way decreasing gradients are constructed, and these are followed by subsequent drops to...
-
Electronic nose algorithm design using classical system identification for odour intensity detection
PublicationThe two elements considered crucial for constructing an efficient environmental odour intensity monitoring systems are sensors and algorithms typically addressed to as electronic nose sensor (e-nose). Due to operational complexity of biochemical sensors developed in human bodies algorithms based on computational methods of artificial intelligence are typically considered superior to classical model based approaches in development...
-
Performance improvement of NN based RTLS by customization of NN structure - heuristic approach
PublicationThe purpose of this research is to improve performance of the Hybrid Scene Analysis – Neural Network indoor localization algorithm applied in Real-time Locating System, RTLS. A properly customized structure of Neural Network and training algorithms for specific operating environment will enhance the system’s performance in terms of localization accuracy and precision. Due to nonlinearity and model complexity, a heuristic analysis...
-
Mobile devices and computing cloud resources allocation for interactive applications
PublicationUsing mobile devices such as smartphones or iPads for various interactive applications is currently very common. In the case of complex applications, e.g. chess games, the capabilities of these devices are insufficient to run the application in real time. One of the solutions is to use cloud computing. However, there is an optimization problem of mobile device and cloud resources allocation. An iterative heuristic algorithm for...
-
METHOD OF ROUTING SHIPS SAILING IN DEDICATED ENVIRONMENT
PublicationThe method for determining the suboptimal route of sailing vessels operating in a restricted area of the sea are proposed in the paper. The dynamics of the environment including weather conditions and speed characteristics of ships sailing are considered. As optimiza-tion criterion, measure sailing time T, and the number of maneuvers performed ω, are taken into account. An heuristic algorithm, and the appropriate application routing...
-
Parallel tabu search for graph coloring problem
PublicationTabu search is a simple, yet powerful meta-heuristic based on local search that has been often used to solve combinatorial optimization problems like the graph coloring problem. This paper presents current taxonomy of patallel tabu search algorithms and compares three parallelization techniques applied to Tabucol, a sequential TS algorithm for graph coloring. The experimental results are based on graphs available from the DIMACS...
-
eFRADIR: An Enhanced FRAmework for DIsaster Resilience
PublicationThis paper focuses on how to increase the availability of a backbone network with minimal cost. In particular, the new framework focuses on resilience against natural disasters and is an evolution of the FRADIR/FRADIR-II framework. It targets three different directions, namely: network planning, failure modeling, and survivable routing. The steady state network planning is tackled by upgrading a sub-network (a set of links termed...
-
Multimodal Particle Swarm Optimization with Phase Analysis to Solve Complex Equations of Electromagnetic Analysis
PublicationIn this paper, a new meta-heuristic method of finding roots and poles of a complex function of a complex variable is presented. The algorithm combines an efficient space exploration provided by the particle swarm optimization (PSO) and the classification of root and pole occurrences based on the phase analysis of the complex function. The method initially generates two uniformly distributed populations of particles on the complex...
-
Efektywna metoda wyznaczania trasy statków żaglowych
PublicationZaproponowano metodę wyznaczania suboptymalnej trasy statków żaglowych poruszających się w ograniczonym akwenie morskim. Uwzględniono przy tym dynamikę tego środowiska w tym warunki pogodowe oraz charakterystyki prędkościowe statków żaglowych. Jako kryterium optymalizacji przyjęto czas żeglugi T oraz liczbę wykonanych manewrów ω. Zaprojektowano heurystyczny algorytm oraz odpowiednią aplikację wyznaczania trasy dla ustalonych punktów...
-
Easy recipes for cooperative smoothing
PublicationIn this paper we suggest how several competing signal smoothers, differing in design parameters, or even in design principles, can be combined together to yield a better and more reliable smoothing algorithm. The proposed heuristic, but statistically well motivated, fusion mechanism allows one to combine practically all kinds of smoothers, from simple local averaging or order statistic filters, to parametric smoothers designed...
-
Design of Cost-Efficient Optical Fronthaul for 5G/6G Networks: An Optimization Perspective
PublicationCurrently, 5G and the forthcoming 6G mobile communication systems are the most promising cellular generations expected to beat the growing hunger for bandwidth and enable the fully connected world presented by the Internet of Everything (IoE). The cloud radio access network (CRAN) has been proposed as a promising architecture for meeting the needs and goals of 5G/6G (5G and beyond) networks. Nevertheless, the provisioning of cost-efficient...
-
Multiclass AdaBoost Classifier Parameter Adaptation for Pattern Recognition
PublicationThe article presents the problem of parameter value selection of the multiclass ``one against all'' approach of an AdaBoost algorithm in tasks of object recognition based on two-dimensional graphical images. AdaBoost classifier with Haar features is still used in mobile devices due to the processing speed in contrast to other methods like deep learning or SVM but its main drawback is the need to assembly the results of binary...
-
Artificial Neural Network based fatigue life assessment of riveted joints in AA2024 aluminum alloy plates and optimization of riveted joints parameters
PublicationThe objective of this paper is to provide the fatigue life of riveted joints in AA2024 aluminum alloy plates and optimization of riveted joints parameters. At first, the fatigue life of the riveted joints in AA2024 aluminum alloy plates is obtained by experimental tests. Then, an artificial neural network is applied to estimate the fatigue life of riveted lap joints based on the number of lateral and longitudinal holes, punch pressure,...
-
Testing Stability of Digital Filters Using Multimodal Particle Swarm Optimization with Phase Analysis
PublicationIn this paper, a novel meta-heuristic method for evaluation of digital filter stability is presented. The proposed method is very general because it allows one to evaluate stability of systems whose characteristic equations are not based on polynomials. The method combines an efficient evolutionary algorithm represented by the particle swarm optimization and the phase analysis of a complex function in the characteristic equation....
-
Marine and Cosmic Inspirations for AI Algorithms
PublicationArtificial Intelligence (AI) is a scientific area that currently sees an enormous growth. Various new algorithms and methods are developed and many of them meets practical, successful applications. Authors of new algorithms draw different inspirations. Probably the most common one is the nature. For example, Artificial Neural Networks were inspired by the structure of human brain and nervous system while the classic Genetic Algorithm...
-
Parallel implementation of a Sailing Assistance Application in a Cloud Environment
PublicationSailboat weather routing is a highly complex problem in terms of both the computational time and memory. The reason for this is a large search resulting in a multitude of possible routes and a variety of user preferences. Analysing all possible routes is only feasible for small sailing regions, low-resolution maps, or sailboat movements on a grid. Therefore, various heuristic approaches are often applied, which can find solutions...
-
Evolutionary Algorithms in MPLS network designing
PublicationMPLS technology become more and more popular especially in core networks giving great flexibility and compatibility with existing Internet protocols. There is a need to optimal design such networks and optimal bandwidth allocation. Linear Programming is not time efficient and does not solve nonlinear problems. Heuristic algorithms are believed to deal with these disadvantages and the most promising of them are Evolutionary Algorithms....
-
Generalized regression neural network and fitness dependent optimization: Application to energy harvesting of centralized TEG systems
PublicationThe thermoelectric generator (TEG) system has attracted extensive attention because of its applications in centralized solar heat utilization and recoverable heat energy. The operating efficiency of the TEG system is highly affected by operating conditions. In a series-parallel structure, due to diverse temperature differences, the TEG modules show non-linear performance. Due to the non-uniform temperature distribution (NUTD) condition,...
-
Optimization of Division and Reconfiguration Locations of the Medium-Voltage Power Grid Based on Forecasting the Level of Load and Generation from Renewable Energy Sources
PublicationThe article addresses challenges in optimizing the operation of medium voltage networks, emphasizing optimizing network division points and selecting the best network configuration for minimizing power and energy losses. It critically reviews recent research on the issue of network configuration optimization. The optimization of the medium voltage power grid reconfiguration process was carried out using known optimization tools....
-
Reliable routing and resource allocation scheme for hybrid RF/FSO networks
PublicationSignificant success of wireless networks in the last decade has changed the paradigms of communication networks design. In particular, the growing interest in wireless mesh networks (WMNs) is observed. WMNs offer an attractive alternative to conventional cable infrastructures, especially in urban areas, where the cost of new installations is almost prohibitive. Unfortunately, the performance of WMNs is often limited by the cluttered...
-
Deformation mitigation and twisting moment control in space frames
PublicationOver the last five decades, space frames have centered on the modernization of touristic zones in view of architectural attractions. Although attempts to control joint movement and minimize axial force and bending moment in such structures were made sufficiently, twisting moments in space frames have been underestimated so far. In space frames, external load or restoring the misshapen shape may cause twisting in members. We herein...
-
High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks
PublicationThis work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...
-
A bisection‐based heuristic for rapid EM‐driven multiobjective design of compact impedance transformers
PublicationDesign of microwave structures is a multiobjective task where several conflicting requirements have to be considered at the same time. For contemporary circuits characterized by complex geometries, multiobjective optimization cannot be performed using standard population‐based algorithms due to high cost of electromagnetic (EM) evaluations. In this work, we propose a deterministic approach for fast EM‐driven multiobjective design...
-
Metaheuristic algorithms for optimization of resilient overlay computing systems
PublicationThe idea of distributed computing systems has been gaining much interest in recent years owing to the growing amount of data to be processed for both industrial and academic purposes. However, similar to other systems, also distributed computing systems are vulnerable to failures. Due to strict QoS requirements, survivability guarantees are necessary for provisioning of uninterrupted service. In this article, we focus on reliability...
-
Cost-Efficient Optical Fronthaul Architectures for 5G and Future 6G Networks
PublicationFifth-generation and Beyond (5GB) wireless networks have introduced new centralized architectures such as cloud radio access network (CRAN), which necessitate extremely high-capacity low latency Fronthaul (FH). CRAN has many advantageous features in terms of cost reduction, performance enhancement, ease of deployment, and centralization of network management. Nevertheless, designing and deploying a cost-efficient FH is still a...
-
5G/6G optical fronthaul modeling: cost and energy consumption assessment
PublicationIn fifth generation (5G) and the future beyond 5G (6G) radio access networks (RANs), the cost of fronthaul deployment is a main challenge for mobile network operators. Depending on different constraints, there are various solutions to deploy an efficient fronthaul. Fiber-optic-based fronthaul offers long-term support with regard to a rapid increase in capacity demands. When fiber connections, either point-to-point (P2P) or point-to-multipoint...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublicationCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
Optimizing Construction Engineering Management Using Metaheuristic Methods and Bayesian Networks
PublicationThe construction of buildings invariably involves time and costs, and disruptions impact ongoing construction projects. Crisis situations in management strategies, structural confusion, and finan-cial miscalculations often arise due to misguided decision-making. This article proposes a method that combines the learning of Bayesian Networks and heuristic techniques to optimize deci-sion-making processes in construction scheduling....
-
Service-based Resilience via Shared Protection in Mission-critical Embedded Networks
PublicationMission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...
-
Heuristic Method of Safe Manoeuvre Selection Based on Collision Threat Parameters Areas
PublicationThis paper is a continuation of papers dedicated to a radar-based CTPA (Collision Threat Parameters Area) display designed to support safe manoeuvre selection. The display visualizes all the ships in an encounter and presents situational overview from the own ship’s point of view. It calculates and displays information on unsafe or unrealistic own ship’s course & speed allowing a user to select a safe manoeuvre. So far only the...
-
Supervisory fuzzy control system for biological processes in sequencing wastewater batch reactor
PublicationThe paper proposes the design of the supervisory heuristic fuzzy control system applied to a Sequencing Batch Reactor (SBR) in the Wastewater Treatment Plant (WWTP). Based on real data records and the biological process and aeration system models, a control system for biological processes has been designed. The supervisory control system performs management of the reactor work cycle, determines the phase length, controls the sludge...
-
Nonlinear resultant theory of shells accounting for thermodiffusion
PublicationThe complete nonlinear resultant 2D model of shell thermodiffusion is developed. All 2D balance laws and the entropy imbalance are formulated by direct through-the-thickness integration of respective 3D laws of continuum thermodiffusion. This leads to a more rich thermodynamic structure of our 2D model with several additional 2D fields not present in the 3D parent model. Constitutive equations of elastic thermodiffusive shells...
-
Performance Evaluation of Preemption Algorithms in MPLS Networks
PublicationPreemption is a traffic engineering technique in Multiprotocol Switching Networks that enables creation of high priority paths when there is not enough free bandwidth left on the route. Challenging part of any preemption method is to select the best set of paths for removal. Several heuristic methods are available but no wider comparison had been published before. In this paper, we discuss the dilemmas in implementing preemption...
-
Construction of phylogenetic trees with topological constraints
PublicationThis paper proposes a method of reconstruction of phylogenetic trees based on heuristic search with topological constraints. Using topological constraints it is possible to reduce the set of solutions as well as to enforce that the result is consistent with a given hypothesis about the evolution process within some group of species. Along with this work a number of algorithms used for phylogenetic analysis were implemented. Those...
-
Algorithms for testing security in graphs
PublicationIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
Application of genetic algorithms in graph searching problem
PublicationGraph searching is a common approach to solving a problem of capturing a hostile intruder by a group of mobile agents. We assume that this task is performed in environment which we are able to model as a graph G. The question asked is how many agents are needed to capture an arbitrary fast, invisible and smart intruder. This number is called the (edge) search number of G. The strategy which must be performed by agents is called...
-
Weighted Clustering for Bees Detection on Video Images
PublicationThis work describes a bee detection system to monitor bee colony conditions. The detection process on video images has been divided into 3 stages: determining the regions of interest (ROI) for a given frame, scanning the frame in ROI areas using the DNN-CNN classifier, in order to obtain a confidence of bee occurrence in each window in any position and any scale, and form one detection window from a cloud of windows provided by...
-
Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
PublicationIn multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...
-
Enhancing Availability for Critical Services
PublicationTraditional approaches to provide classes of resilient service take the physical network availability as an input and then deploy redundancy and restoration techniques at various layers, often without full knowledge of mappings between layers. This makes it hard (and often inefficient) to ensure the high availability required by critical services which are typically a small fraction of the total traffic. Here, the innovative technique...
-
Defending against Fake VIP in Scant-Transparency Information Systems with QoS Differentiation
PublicationIn client-server information systems with quality of service (QoS) differentiation, Client may deplete Server’s resources by demanding unduly high QoS level. Such QoS abuse has eluded systematic treatment; known defenses using Client authorization, payments, or service request inspection prior to QoS assignment, are heuristic and environment-specific. We offer a game-theoretic approach on the premise that a service request is occasionally...
-
Estimation of Stresses in a Dry Sand Layer Tested on Shaking Table
PublicationTheoretical analysis of shaking table experiments, simulating earthquake response of a dry sand layer, is presented. The aim of such experiments is to study seismic-induced compaction of soil and resulting settlements. In order to determine the soil compaction, the cyclic stresses and strains should be calculated first. These stresses are caused by the cyclic horizontal acceleration at the base of soil layer, so it is important...
-
5G Millimeter Wave Network Optimization: Dual Connectivity and Power Allocation Strategy
PublicationThe fifth generation (5G) of mobile networks utilizing millimeter Wave (mmWave) bands can be considered the leading player in meeting the continuously increasing hunger of the end user demands in the near future. However, 5G networks are characterized by high power consumption, which poses a significant challenge to the efficient management of base stations (BSs) and user association. Implementing new power consumption and user...