The Efficiency of Clinical Departments in Medical Faculty Hospitals: A Case Study Based on Data Envelopment Analysis
Research Paper | Journal Paper
Vol.5 , Issue.7 , pp.1-8, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.18
Abstract
The debts of university hospitals have been increasing recently in Turkey. Thus, they should use their financial resources effectively. The aim of this study is to analyze the technical activities of departments at Adnan Menderes University, Training and Research Hospital, Aydın, Turkey. Data were obtained from the statistical records in 2014. Activities were evaluated with Data Envelopment Analysis (DEA), which is a nonparametric method that allows the use of more than one input and output at the same time. The study comprised three sections. In the first section, expenditure, package deficiencies, and Social Security Institution (SSI) deductions were defined as inputs and income was defined as the output. The Banker, Chames, and Cooper (BCC) model, which aims to minimize inputs, was used in this section. "Orthopedics" was found to be the most effective department. In the second section, faculty members, research assistants, room numbers of policlinics, and bed numbers in services were defined as the inputs; the total number of policlinic patients, total number of patients allocated bed, and income were defined as outputs. In this section, the outcome-focused Charnes, Cooper, and Rhodes (CCR) model, which aims to maximize outcomes, was used. "Emergency" and "Child and Adolescent Psychology" were found to be the most efficient departments. In the third section, faculty members, research assistants, room numbers of policlinics, and bed numbers in services were defined as the inputs; the total number of policlinic patients, total number of patients allocated beds, total operation numbers, and income were defined as outputs. In this section, the CCR model was again used. "Thoracic Surgery" was defined as the most efficient department. At the end of the analyses, reference rates were defined for the inefficient departments.
Key-Words / Index Term
Turkey, Adnan Menderes University, Clinical departments, Health information systems, Data envelopment analysis, Efficiency
References
[1] M. S. Gök, B. Sezen, “Analyzing the Ambiguous Relationship between Efficiency, Quality and Patient Satisfaction in Healthcare Services: The Case of Public Hospitals in Turkey”, Health Policy, Vol.111, pp.290-300, 2013.
[2] Ministry of Health, “Health Transformation Program”, Ministry of Health of the Turkish Republic, Ankara, Turkey, December 2003.
[3] M. Tatar, “Management of Diabetes and Diabetes Policies in Turkey”, Globalization and Health, Vol.9, Issue.16, pp.1-7, 2013.
[4] R. Atun et al., “Universal Health Coverage in Turkey: Enhancement of Equity”, The Lancet, Vol.382, Issue.9886, pp.65-99, July, 2013.
[5] K. Avcı, S. Çınaroğlu, “Clustering of the Ministry of Health Hospitals in Terms of Organizational and Financial Performance Indicators”, Hacettepe University Journal of Economics and Administrative Sciences, Vol.33, Issue.2, pp.1-23, 2015.
[6] S. Yükçü, İ. Yüksel, “Theory of Constraints Approach in Hospitals and A Case Study”, Atatürk University Journal of Economics and Administrative Sciences, Vol.29, Issue.3, pp.557-578, 2015.
[7] M. Mohammadi et al., “Assessment of Technical Efficiency of University Hospitals in Kermanshah Model Using Data Envelopment Analysis (DEA)”, Technical Journal of Engineering and Applied Sciences, Vol.5, Issue.1, pp.80-83, 2015.
[8] E. Sadqhiani, “Problems of Health and the Hospitals in Developing Countries”, Journal of Management, Vol.1, pp.59-78, 1997.
[9] H. Sherman, “Hospital Efficiency Measurement and Evaluation: Empirical Test of a New Technique”, Medical Care, Vol.22, Issue.10, pp.922-938, October 1984.
[10] S. Andes, L. M. Metzger, J. Kralewski, D. Gans, “Measuring Efficiency of Physician Practices Using Data Envelopment Analysis”, Managed Care, Vol.11, Issue.11, pp.48-56, November 2002.
[11] V. Capkun, M. Messner, C. Rissbacher, "Service Specialization and Operational Performance in Hospitals", International Journal of Operations & Production Management, Vol.32, Issue.4, pp.468-495, 2012.
[12] L. Poole, J. A. Davis, N. W. Gunby, “In a Niche of Time: Do Specialty Hospitals Outperform General Services Hospitals?”, The Health Care Manager, Vol.32, Issue.1, pp.13-22, March 2013.
[13] Y. Varabyova, J. Schreyögg, “International Comparisons of the Technical Efficiency of the Hospital Sector: Panel Data Analysis of OECD Countries Using Parametric and Non-Parametric Approaches”, Health Policy, Vol.112, pp.70-79, September 2013.
[14] V. Sikka, R. D. Luke, Y. Ozcan, “The Efficiency of Hospital-Based Clusters: Evaluating System Performance Using Data Envelopment Analysis”, Health Care Management Review, Vol.34, Issue.3, pp.251-261, 2009.
[15] İ. Şahin, “Comparative Technical Efficiency Analysis of the Ministry of Health General Hospitals and the Former SSK General Hospitals Transferred to the MoH”, Hacettepe Journal of Health Administration, Vol.11, Issue.1, pp.1-48, 2008.
[16] W. D. Cook, J. Zhu, “Modeling Performance Measurement: Applications and Implementation Issues in DEA”, Springer, New York, 2005.
[17] M. Luptacik, “Mathematical Optimization and Economic Analysis”, Springer, New York, 2010.
[18] W. Quanling, “Data Envelopment Analysis”, Chinese Science Bulletin, Vol.46, Issue.16, pp.1321-1332, 2001.
[19] W. W. Cooper, L. M. Seiford, K. Tone, “Introduction to Data Envelopment Analysis and Its Uses”, Springer, New York, 2006.
[20] Steering Committee for the Review of Commonwealth/State Service Provision, “Data Envelopment Analysis: A Technique for Measuring the Efficiency of Government Service Delivery”, Melbourne, Australia, 1997.
[21] T. Joro, P. J. Korhonen, “Extension of Data Envelopment Analysis with Preference Information”, Springer, New York, 2015.
[22] R. J. Frankel, E. N. Wallen, H. H. Hyun, “How to Design and Evaluate Research in Education”, McGraw-Hill, New York, 2011.
[23] S. Erpolat, “Veri Zarflama Analizi”, Evrim, İstanbul, 2011.
[24] M. Çakmak, M. K. Öktem, U. Ö. Gönülşen, “The Efficiency Problem of Turkish Public Hospitals: The Measurement of Technical Efficiency of Maternity Hospitals by Data Envelopment Analysis”, Hacettepe Journal of Health Administration, Vol.12, Issue.1, pp.1-36, 2009.
[25] M. Erdoğan, B. Yıldız, “Measuring the Performance through Financial Ratios at Healthcare Establishments: A Practice in Use at Hospitals”, Kafkas University Economics and Administrative Sciences Faculty Journal, Vol.6, Issue.9, pp.129-148, 2015.
[26] N. Girginer, T. Köse, N. Uçkun, “Efficiency Analysis of Surgical Services by Combined Use of Data Envelopment Analysis and Gray Relational Analysis”, Journal of Medical Systems, Vol.39, Issue.5, pp.1-9, May 2015.
[27] M. J. Rezaee, A. Karimdadi, “Do Geographical Locations Affect in Hospitals Performance? A Multi-group Data Envelopment Analysis”, Journal of Medical Systems, Vol.39, Issue.9, pp.1-11, 2015.
Citation
Ozel Sebetci, Ibrahim Uysal, "The Efficiency of Clinical Departments in Medical Faculty Hospitals: A Case Study Based on Data Envelopment Analysis," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.1-8, 2017.
Cognitive Radio for Enhancing and Efficient Spectrum Sensing in Adhoc Networks
Research Paper | Journal Paper
Vol.5 , Issue.7 , pp.9-13, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.913
Abstract
The Spectrum sensing strategies in CR is exhibited in this paper. There are three Spectrum sensing strategies of CR, for example, helpful, non-agreeable and impedance based discovery. Helpful and non-agreeable procedures are only transmitter location and collector recognition separately. Non helpful spectrum sensing procedures is grouped in three systems like vitality recognition, coordinated channel discovery and cyclo stationary component location. The goal of the project is to achieve performance, increase reliability and efficiency and reduces the interference. In CRN the users are classified into Licensed Primary Users and Unlicensed Secondary Users and there is no dedicated channel to send data, sensors need to negotiate with the neighbors and select a channel for data communication in CR-WSNs. This is a very challenging issue, because there is no cooperation between the PUs and SUs. PUs may arrive on the channel any time. If the PU claims the channel, the SUs have to leave the channel immediately. PU is communicating with another user, that time SU cannot communicate to PU at particular time. Here Medium access Control (MAC) protocol is proposed to improve the spectrum efficiency. Our proposed CR method helps to automatically search the users those who are free to communicate in the network, at that time Unlicensed user is automatically will change as licensed user, then it communicate to particular person.
Key-Words / Index Term
CR, Wireless Sensor Network, Primary Spectrum, Specturm Sensing
References
[1] Q.Zhao and B.M.Sadler, “A survey of dynamic spectrum access: Signal processing, networking, and regulatory policy,” IEEE Signal Process. Mag., vol. 24, no. 3, pp. 79–89, May 2007.
[2] S.Haykin, “CR: Brain-empowered wireless communications,” IEEE J. Sel. Commun., vol. 23, no. 2, pp. 201–220, Feb. 2005.
[3] Goldsmith, S.Jafar, I.Maric, and S.Srinivasa, “Breaking spectrum gridlock with CRs: An information theoretic perspective,” Proc. IEEE, vol. 97, no. 5, pp. 894–914, May 2009.
[4] Y.-C.Liang, Y.Zeng, E.Peh, and A.T.Hoang, “Sensing-throughput tradeoff for CR networks,” IEEE Trans. Wireless Commun., vol. 7, no. 4, pp. 1326–1337, Apr. 2008.
[5] K.Viji and R.Mala, "Cross Layer Outline Approach in Remote Versatile ADHOC System Architecture", International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.302-309, 2015.
[6] L.Musavian and S.Aissa, “Fundamental capacity limits of CR in fading environments with imperfect channel information,” IEEE Trans. Commun., vol. 57, no. 11, pp. 3472–3480, Nov. 2009.
[7] J.Jia, Q.Zhang, and X.Shen, “HC-MAC: A hardware-constrained cognitive MAC for efficient spectrum management,” IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 106–117, Jan. 2008.
[8] Q.Zhao, L.Tong, A.Swami, and Y.Chen, “Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework,” IEEE J. Sel. Areas Commun., vol. 25, no. 3, pp. 589–600, 2007.
[9] Y.Wang, Y.Xu, L.Shen, C.Xu, and Y.Cheng, “Two-dimensional POMDP-based opportunistic spectrum access in time-varying environment with fading channels,” J. Commun. Netw., vol. 16, no. 2, pp. 217–226, Apr. 2014.
[10] Krikidis I, Charalambous T, Thompson JS. Buffer-aided relay selection for cooperative diversity systems without delay constraints. IEEE Transactions on Wireless Communications, Vol.11, Issue.55, pp.1957-67, 2012.
[11] V.Asghari and S.Aissa, “Adaptive rate and power transmission in spectrum-sharing systems,” IEEE Trans. Wireless Commun., vol. 9, no. 10, pp. 3272–3280, Oct. 2010.
[12] Bagayoko, I.Fijalkow, and P.Tortelier, “Power control of spectrum sharing in fading environment with partial channel state information,” IEEE Trans. Signal Process. vol. 59, no. 5, pp. 2244–2256, May 2011.
Citation
M. Emimal, D. Karthika, "Cognitive Radio for Enhancing and Efficient Spectrum Sensing in Adhoc Networks," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.9-13, 2017.
Performance Analysis of a Gold extraction process system under Different Failure using Boolean algebra
Research Paper | Journal Paper
Vol.5 , Issue.7 , pp.14-19, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.1419
Abstract
This paper deals with the ensuring reliability and Availability of Gold extraction system is extremely complex and extends to all the stages of the service life of a system. The gold extraction system analyze a system with two type of failure. The rate of failure is exponential .The system resolved by Boolean algebra. Several measures of availability and MTTF of system are obtained .Some numerical examples, along with graph have been appended at the end to highlight the importance of the result.
Key-Words / Index Term
Gold Extraction System, weibull Distribution, Exponential Distribution , Boolean Algebra
References
[1] C.Gasparrini, “Gold and other precious metals:From ore to market”,Springer-Verlag,1993.
[2] Sánchez-Chacón A.E. and G.T. Lapidus, “Model for heap leaching of gold ores by cyanidation. Hydrometallurgy”,vol.44, pp.1-20,1997.
[3] Liu B,Cui L,Wen Y,Shen J,“A cold standby repairable system with working vacations and vacation interruption following Markovian arrival process”,Reliability Engineering and System Safety.vol.142:pp,1-8,2015.
[4] Gupta PP, Agarwal SC, “A Boolean Algebra Method For reliability Calculations (Published work style)”, Microelectronic Reliability;Vol 23: PP 863-865,1983.
[5] Gupta PP, Agarwal SC. “A Boolean algebra method for reliability calculations”, microelectron. Reliability; vol.23:PP 863-886 , 1983.
[6] Gupta PP, Kumar A., “Reliability and MTTF Analysis of a Power Plant Connected with Hundred Percent Reliable Cables by BF Technique Published work style”, Microelectronic Reliability,Vol.26: PP 825-834, 1986.
[7] Gupta PP, Kumar A. “Evaluation of Reliability and MTTF of a Power Plant with the Aid of Boolean Function Expansion Algorithm (Published Work style)”, Microelectronic Reliability; Vol.26: PP 821-824,1986
[8] Dhillon B.S., “Reliability Quality and Safety Engineers(Book Style)”,Taylo Francis,U.K.,(2004)
[9] Nakagava T , “Stochastic processes:with applications to reliability theory.Springer Series in Reliability Engineering.Springer,(2011)
[10] R.Othman, N.Baharun and S.Y.Pung,“Characterization and Gold Assaying Methods in the Assessment of Low Grade Gold Ore from Malaysia”, Advanced material Research, vol.858, pp.243-247,(2013)
Citation
A. Chandra , S.Gupta, "Performance Analysis of a Gold extraction process system under Different Failure using Boolean algebra," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.14-19, 2017.
SPMETS: Sequential Pattern Mining in Exceptional Text Streams using WEKA Tool
Review Paper | Journal Paper
Vol.5 , Issue.7 , pp.20-23, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.2023
Abstract
Checking and making sense of the rich and continuously refreshed document in an online medium can yield important data that allows users and association increase useful Information about progressing events and consequently make quick move. This calls for powerful ways to precisely screen break down and summarize the Important data present in an on the web. Customarily term-based and word-based approaches used for data sifting. Theme demonstrate has used for discovering unseen topics in a set of qualification. Term-based and Word-based approaches have disadvantage which are polysemous and synonymy. The animal of propensity mining procedure used in field of theme demonstrating generates show for discovering more significant and discriminative topics from accumulation of documents.
Key-Words / Index Term
Document Streams, Dynamic Programming, Pattern-Growth, Rare Event, Sequential Patterns, Web Mining
References
[1] R.V. Patil, S.S. Sannakki, V.S. Rajpurohit, "A Survey on Classification of Liver Diseases using Image Processing and Data Mining Techniques", International Journal of Computer Sciences and Engineering, Vol.5, Issue.3, pp.29-34, 2017.
[2] Nidhi Sethi and Pradeep Sharma, "Mining Frequent Pattern from Large Dynamic Database Using Compacting Data Sets", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.3, pp.31-34, 2013.
[3] S.Liu, J.Yin, X.Wang, W.Cui, K.Cao & J.Pei, “Online Visual Analytics of Text Streams”, IEEE Transactions on Visualization and Computer Graphics, Volume: 22, Issue: 11, Pages: 2451 – 2466, 2016.
[4] A. Sharma, RS Thakur, S. Jaloree, "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.
[5] V. Jain, "Frequent Navigation Pattern Mining from Web usage data", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.47-51, 2013.
[6] Haiqing Zhang; Daiwei Li; Tianrui Li; Xi Yu; Tao Wang; Abdelaziz Bouras, “A pattern-aware method for maximal fuzzy supplement frequent pattern mining”, (ICIVC), Pages: 173 – 179, 2017
[7] D. M. Blei and J. D. Lafferty, “Dynamic topic models,” in Proc. ACM Int. Conf. Mach. Learn., 2006, pp.113–120.
[8] D. Blei, A. Ng, and M. Jordan, “Latent dirichlet allocation,” J. Mach. Learn. Res., vol. 3, pp. 993–1022, 2003.
[9] J. Chae, D. Thom, H. Bosch, Y. Jang, R. Maciejewski, D. S. Ebert, and T. Ertl, “Spatiotemporal social media analytics for abnormal event detection and examination using seasonal-trend decomposition,” in Proc. IEEE Conf. Vis. Anal. Sci. Technol., 2012, pp. 143–152.
[10] K. Chen, L. Luesukprasert, and S. T. Chou, “Hot topic extraction based on timeline analysis and multidimensional sentence modeling,” IEEE Trans. Knowl. Data Eng., vol. 19, no. 8, pp. 1016–1025, Aug.2007.
[11] C. K. Chui and B. Kao, “A decremental approach for mining frequent itemsets from uncertain data,” in Proc. 12th Pacific-Asia Conf. Adv. Knowl. Discovery Data Mining, 2008, pp. 64–75.
[12] Vishakha D. Bhope and Sachin N. Deshmukh, "Comparative Study on Information Retrieval Approaches for Text Mining", International Journal of Computer Sciences and Engineering, Vol.3, Issue.3, pp.102-106, 2015.
[13] O.K.Alkan, P.Karagoz, “CRoM and HuspExt: Improving Efficiency of High Utility Sequential Pattern Extraction”, IEEE Transactions on Knowledge and Data Engineering, Volume: 27, Issue: 10, Pages: 2645 – 2657, 2015.
[14] Eric.H.Chan Lu, V.S.Tseng, P.S.Yu, “Mining Cluster-Based Temporal Mobile Sequential Patterns in Location-Based Service Environments”, IEEE Transactions on Knowledge and Data Engineering, Volume: 23, Issue: 6, Pages: 914 – 927, 2015.
Citation
U. Saranya, S. Padmavathi, "SPMETS: Sequential Pattern Mining in Exceptional Text Streams using WEKA Tool," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.20-23, 2017.
Wireless Networks Past, Present and Future: A Technical Review
Research Paper | Journal Paper
Vol.5 , Issue.7 , pp.24-27, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.2427
Abstract
Wireless Network provides transmission of information over miles of distance without requiring wires, coaxial cables and fibres etc. It focuses on establishment of communication among devices. Such type of communication can be done through Single hop or Multi hop basis. In this attempt, brief introduction of wireless network is presented. In this paper, classification of wireless network is also discussed based on different features and its types. Further, presented work also highlights Mobile Adhoc Networks along with its specialized new concept known as FANETs (Flying Adhoc Networks). In this attempt, design issues for MAC protocol and comparison between MANETs & FANETs is also discussed. This attempt is very much beneficial for beginners of this domain.
Key-Words / Index Term
Wireless Networks,Classifications, WMN,WSN,MANETs, FANETs
References
[1] S.B. Kolla, B.B.K. Prasad, "A Survey of Source Routing Protocols, Vulnerabilities and Security In Wireless Ad-hoc Networks", International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.20-25, 2014.
[2] David Moursund, Introduction to Information and Communication Technology in Education, 2005.
[3] Pranay Kujur and Kiran Gautam, "Smart Interaction of Object on Internet of Things", International Journal of Computer Sciences and Engineering, Vol.3, Issue.2, pp.15-19, 2015.
[4] Pradeep Sharma, Shivlal Mewada and Aruna Bilavariya, "Group Rekeying Management Scheme for Mobile Ad-hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.5, pp.5-12, 2013.
[5] Umang, Reddy B.V.R and Hoda M.N., “Study of Mobile Management Schemes in Mobile Adhoc Networks”, International Journal of Computer Applications, March 2011, Vol. 17, Iss. 7, pp. 42-47, ISSN-0975-8887, DOI: 10.5120/2236-2605.
[6] Pradeep Kumar Sharma, Shivlal Mewada and Pratiksha Nigam, "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.4, pp.8-11, 2013.
[7] İ. Bekmezci, O. K. Sahingoz, and Ş. Temel, “Flying Ad-Hoc Networks (FANETs): A survey,” Ad Hoc Networks, vol. 11, no. 3, pp. 1254–1270, May 2013.
Citation
Umang, "Wireless Networks Past, Present and Future: A Technical Review," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.24-27, 2017.
Selfish Node Detection in Wireless Networks
Research Paper | Journal Paper
Vol.5 , Issue.7 , pp.28-31, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.2831
Abstract
Mobile ad-hoc networks (MANETs) relies on upon network participation plans to work legitimately. It expects that mobile node deliberate participate so as to work appropriately. By and by, if nodes have a selfish conduct and are unwilling to participate, the general network execution could be genuinely degraded. The proposed framework builds up a homomorphic straight Authenticator based upon examining design that enables the identifier to confirm the honesty of the bundle misfortune data detailed with nodes. In this manner, by recognizing the correlations between lost bundles, one can choose whether the parcel misfortune is absolutely because of normal connection blunders, or is a consolidated impact of connection mistake and selfish node. In our project we have proposed an efficient method for detecting a selfish node which takes into account the various factors like the battery capacity of a node, power consumption in transmitting packets and to overcome the presence of selfish nodes. In this framework consists of degree of intrinsic selfishness (DeIS) and the degree of extrinsic selfishness (DeES). Under the distributed node-selfishness management, a path selection criterion is designed to select the most reliable and shortest path in terms of RNs’. The theoretical analysis and results show that the proposed model has better probability and efficiency.
Key-Words / Index Term
MANETs, Selfish Node, Node Misbehavior, Detection
References
[1] B. Swetha, D.B. Rao, P.N. Rao, "Intelligent Anti-Theft Finding Scheme Towards Itrust Establishment in Delay Tolerant Networks Using VANET", International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.50-56, 2014.
[2] J.Li, Q.Yang, and K.S.Kwak, “Neural-network based optimal dynamic control of delivering packets in selfish wireless networks,” IEEE Commun. Lett. vol.19, no.12, pp.2246–2249, Dec.2015.
[3] H.Jiang and W.Zhuang, “Cross-layer resource allocation for integrated voice/data traffic in wireless cellular networks,” IEEE Trans. Wireless Commun., vol.5, no.2, pp.457–468, Feb.2006.
[4] F.Bao, I.Chen, M.Chang, and J.Cho, “Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection,” IEEE Trans. Netw. Serv. Manage., vol.9, no.2, pp.169–183, Jun.2012.
[5] Shanmugapriya R. “Parallel Networks For Enhancing And Efficient Delay Bounds Based Trust Management”, International Journal of Applied Engineering and Technical Research-IJAETR. Vol.1, Issue.1,pp.1-9, 2017.
[6] S. Jain, "Black Hole Attack in Delay Tolerant Networks: A Survey", International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.172-175, 2014.
[7] H. Zhu, X. Lin, and R. Lu, “SMART: A secure multilayer credit based incentive scheme for delay-tolerant networks,” IEEE Trans. Veh. Technol., vol.58, no.8, pp.4628–4639, Oct.2009.
[8] P.Kyasanur and N.F.Vaidya, “Selfish MAC layer misbehavior in wireless networks,” IEEE Trans. Mobile Comput., vol.4, no.5, pp.502–516, Sep.2005.
[9] Z.Ji and K.J.R.Liu, “Multi-stage pricing game for collusion-resistant dynamic spectrum allocation” IEEE J.Sel.Areas Commun., vol.26, no.1, pp.182–191, Jan.2008.
[10] Y.Rebahi, V.E.Mujica-V, and D.Sisalem, “A reputation-based trust mechanism for ad hoc networks,” in Proc. IEEE Symp. Comput. Commun. Jun.2005, pp.37–42.
[11] C.E.Perkins, E.M.Royer, S.R.Das, and M.K.Marina, “Performance comparison of two on-demand routing protocols for ad hoc networks,” IEEE Pers. Commun., vol.8, no.1, pp.16–28, Feb.2001.
[12] Y.Xiao and H.Li, “Voice and video transmissions with global data parameter control for the IEEE 802.11e enhance distributed channel access”, in IEEE, vol.15, issue.11, pp.1041–1053, Nov.2004.
[13] M.v.d. Schaar, Y.Andreopoulos, and Z.Hu, “Optimized scalable video steaming over IEEE 802.11a/e HCCA wireless networks under delay constraints”, in IEEE, vol.5, issue.6, pp.755–768, Jun 2006.
[14] R.Dai, P.Wang, and I.F.Akyildiz, “Correlation-aware QoS routing with differential coding for wireless video sensor networks”, in IEEE, vol.14, issue.5, pp.1469–1479, Oct.2012.
Citation
D. Nivetha, D. Karthika, "Selfish Node Detection in Wireless Networks," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.28-31, 2017.
Spatial Domain Edge Detection of Image in Rainy Weather
Research Paper | Journal Paper
Vol.5 , Issue.7 , pp.32-38, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.3238
Abstract
Edges are the set of curved line segments where brightness level of image changes sharply. It is one of the most important information of an image which can helps to detect object boundary, its relative position within target area and many other useful information. In edge detection process, edges are retrieved from an image by spotting high intensity variations of the pixels. Edge detection of an image minimizes the amount of processed data effectively and discards information that is less important, keeping the important structural properties of an image. This paper presents a different approach to apply Gradient and LoG operator to get more continuous edges than the conventional one using MATLAB. Their results are compared using peak signal to noise ratio (PSNR). Two images in rainy weather are taken by my camera for case study. It can be used in many applications such as in object tracking, in data compression, in image analysis and medical imaging.
Key-Words / Index Term
Gradient and LoG; Peak signal-to-noise ratio; Intensity level; Edge detection
References
[1] G.T.Shrivakshan & Dr. C. Chandrasekhar, “A comparison of various edge detection techniques used in image processing” IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 5, No. 1, pp. 269-276, September 2012.
[2] Mohamed A. El-Sayed, “A new algorithm based Entropic threshold for edge detection in images” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No. 1, pp. 71-78, September 2011.
[3] Kumar & Sukhwinder Singh, “Edge detection and denoising medical images using Morphology” International Journal of Engineering Sciences & Emerging Technologies, Vol. 2, Issue 2, pp. 66-72, June 2012.
[4] Rashmi Dubey, Rajendra Prasad Singh, Dr. Sarika Jain & Dr. Rakesh Singh Jadon “Quantum methodology for edge detection: A compelling approach to enhance edge detection in Digital image processing” In the proceeding of the 2014 5th International Conference- Confluence The Next Generation Information Technology Summit, pp. 631-636, 2014.
[5] Sasmita Mishra, “Edge detection of images: A novel approach” International Journal of Advanced Research in Computer Science and Software Engineering 5(3), Vol. 5, Issue 3, pp. 1213-1215, March 2015.
[6] Swetha.M & Jyoshna.C, “Boundary detection in medical images using edge field vector based on Law’s texture and Canny method” International Journal of Engineering Trends and Technology (IJETT) Vol. 4, Issue 5, pp. 1912-1917, May 2013.
[7] Ballado, A.H.Jr., Dela Cruz, J.C., Avendaño, G. O., Echano, N. M., Ella, J. E., Medina, M.E.M., Paquiz,B.K.C.“Philippine currency paper bill counterfeit detection through image processing using Canny edge technology” 8th IEEE International Conference Humanoid, Nanotechnology, Information Technology Communication and Control, Environment and Management (HNICEM) The Institute of Electrical and Electronics Engineers Inc. (IEEE) – Philippine Section, Philippines, December 2015.
[8] Bo Lia, Aleksandar Jevticb, Ulrik Söderströma, Shafiq Ur Réhmana, Haibo Li “Fast edge detection by center of mass” Proceedings of the 1st IEEE/IIAE International Conference on Intelligent Systems and Image Processing pp. 103-110, Japan, 2013.
[9] Y. Ramadevi, T. Sridevi, B. Poornima, B. Kalyani “Segmentation and object recognition using edge detection techniques” International Journal of Computer Science & Information Technology (IJCSIT), Vol. 2, No. 6, pp. 153-161, December 2010.
[10] Sunanda Gupta, Charu Gupta & S.K.Chakarvarty “Image edge detection: A review” International journal of advance research in computer science and technology (IJARCET) Vol. 2, Issue 7, pp. 2246-2251, July 2013.
[11] Veena Dohare, Prof. M.P. Parsai, “A review of speed performance evaluation of various edge detection methods of images”, Indian journal of computer science and engineering, Vol.8, No. 2, pp: 128-138, Apr-May 2017.
[12] K. Rajalakshmi, K. Nirmala, “Heart disease analysis using support vector machine and Sobel edge detection” International Journal of Computer sciences and engineering, Vol. 5, Issue 4, pp. 5-13, Apr 2017.
Citation
Veena Dohare, M.P. Parsai, "Spatial Domain Edge Detection of Image in Rainy Weather," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.32-38, 2017.
A Review on Bat Algorithm
Review Paper | Journal Paper
Vol.5 , Issue.7 , pp.39-43, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.3943
Abstract
Complications of cracking real world glitches with their promising difficulties forced computer technologist to search for more skillful problem solving approaches. Meta-heuristic procedures are outstanding models of these methods and out of these the bat algorithm (BA) is a good example. BAT algorithm is found very efficient in solving difficult problems. This algorithm has been advanced hurriedly and has been practical in different optimization jobs. The literature has extended substantially since last seven years. This paper offers appropriate study of the various modifications of BAT algorithm.
Key-Words / Index Term
Artificial Bee Colony, Ant Colony Optimization, Bat Algorithm, Cuckoo Search Algorithm
References
[1] X. Yang, “A New Metaheuristic Bat-Inspired Algorithm”, Proceedings of Nature Inspired Cooperative Strategies for Optimization (NICSO 2010), 65–74, 2010.
[2] B. Kumar, D. Kumar, “A Review on Artifical Bee Colony Algorithm”, International Journal of Engineering and Technology. Vol. 2, Issue 3, pp. 175-186, 2013.
[3] J. Kennedy and R. Eberhart, “Particle Swarm Optimization”, Proceedings of IEEE International Conference on Neural Networks, pp. 1942–1948, 1995.
[4] M. Dorigo, M. Birattari and T. Stiitzle, “Ant Colony Optimization”, IEEE Computational Intelligence Magazine, pp. 28–39, 2006.
[5] R. Hedayatzadeh and A. Salmassi, “Termite Colony Optimization : A Novel Approach for Optimizing Continuous Problems”, Proceedings of Iranian Conference on Electrical Engineering (ICEE 2010), pp. 553-558, 2010.
[6] S. Chu, P. Tsai and J. Pan, “Cat Swarm Optimization”, Proceedings of Pacific Rim International Conference on Artificial Intelligence, pp. 854-858, 2006.
[7] W. Metzner, “Echolocation Behaviour in Bats”, Progress Edin-burgh, vol. 75, Issue 298, pp. 453-465, 1991.
[8] H. Schnitzler and E. Kalko, “Echolcation by insect eating bats”, Bioscience, vol. 51, Issue 7, pp. 557-569, 2001.
[9] K. Nikov, A. Nikov and A. Sahai, “A Fuzzy Bat Clustering Method for Ergonomic Screening of Office Workplaces”, Proceedings of Third International Conference on Software, Services and Semantic Technologies S3T, pp. 59-66, 2011.
[10] B. Mallikarjuna, K. Reddy and O. Hemakesaavulu, “Economic load dispatch problem with valve-point effect using a binary bat algorithm”, ACEEE International Journal of Elecrtical and Power Engineering, vol. 4, Issue 3, pp. 33-38, 2013.
[11] R. Nakamura, L. Pereira, K. Costa, D. Rodrigues, J. Papa and X. Yang, “BBA: A Binary Bat Algorithm for Feature Selection”, Proceedings of XXV SIBGRAPI Conference on Graphics, Patterns and Images, pp. 291-297, 2012.
[12] S. Sabba and S. Chikhi, “A discrete binary version of bat algorithm for multidimensional knapsack problem”, Int. J. Bio-Inspired Computation, vol. 6, Issue 2, pp. 140-152, 2014.
[13] J. Zhang and G. Wang, “Image Matching Using a Bat Algorithm with Mutation”, Applied Mechanics and Materials, vol. 203, Issue 2012, pp. 65-74, 2012.
[14] I. Fister, D. Fister and X. Yang, “A hybrid bat algorithm”, Elektrotehniski vestnik, in press, 2013.
[15] S. Saha, R. Kar, D. Mandal and S. Ghoshal, “A new design method using opposition-based BAT algorithm for IIR system identification problem”, International Journal of Bio-Inspired Computation, vol. 5, Issue 2, pp. 99-132, 2013.
[16] J. Xie, Y. Zhou and H. Chen, “A Novel Bat Algorithm Based on Differential Operator and Lévy Flights Trajectory”, Computational Intelligence and Neuroscience, pp. 1-13, 2013.
[17] H. Afrabandpey, M. Ghaffari, A. Mirzaei and M. Safayani, “A novel bat algorithm based on chaos for optimization tasks”, Proceedings of Intelligent Systems (ICIS), Iranian Conference, pp. 1-6, 2014.
[18] A. Gandomi and X. Yang, “Chaotic bat algorithm”, Journal of Computational Science, vol. 5, Issue 2, pp. 224-232, 2014.
[19] S. Yilmaz, E. Kucuksille and Y. Cengiz, “Modified Bat Algorithm”, Elektronika IR Elektrotechnika, vol. 20, Issue 2, pp. 71-78, 2014.
[20] L. Li and Y. Zhou, “A novel complex-valued bat algorithm”, Neural Computing and Applications, vol. 25, Issue 6, pp. 1369-1381, 2014.
[21] X. Cai, L. Wang, Q. Kang and Q. Wu, “Bat algorithm with Gaussian walk”, International Journal of Bio-Inspired Computation, vol. 6, Issue 3, pp. 166-174, 2014.
[22] Y. Zhou, J. Xie, L. Li, M. Ma, “Cloud Model Bat Algorithm”, The Scientific World Journal, pp. 1-11, 2014.
[23] D. Li, C. Liu and W. Gan, “Proof of the heavy-tailed property of normal cloud model”, Engineer and Science of China, vol. 13, Issue 4, pp. 20-23, 2011.
[24] T. Dao, J. Pan, T. Nguyen, S. Chu and C. Shieh, “Compact Bat Algorithm”, In: Intelligent Data analysis and its Applications. Volume II, Springer International Publishing: Cham, pp. 57-68, 2014.
[25] I. Fister, S. Fong, J. Brest and I. Fister, “Towards the Self-Adaption of the Bat Algorithm”, Proceddings of the IASTED International Conference Artificial Intelligence and Applications (AIA 2014), pp. 400-406, 2014.
[26] I. Fister, S. Fong, J. Brest and I. Fister, “A Novel Hybrid Self-Adaptive Bat Algorithm”, The Scientific World Journal, pp. 1-12,2014.
[27] S. Yilmaz and E. Küçüksille, “A new modification approach on bat algorithm for solving optimization problems”, Applied Soft Computing, vol. 28, pp. 259-275, 2015.
[28] A. Mehrabian and C. Lucas, “A novel numerical optimization algorithm inspired from weed colonization”, Ecol. Inform., vol. 1, Issue 4, pp. 355-366, 2006.
[29] Jun L, Liheng L, and Xianyi W. A double-subpopulation variant of the bat algorithm. Applied Mathematics and Computation. 2015; 263:361-377.
[30] X. Meng, X. Gao, Y. Liu and H. Zhang, “A novel bat algorithm with habitat selection and Doppler effect in echoes for optimization”, Expert Systems with Applications, vol. 42, Issue 17-18, pp. 6350-6364, 2015.
[31] G. Wang, H. Chu and S. Mirjalili, “Three-dimensional path planning for UCAV using an improved bat algorithm”, Aerospace Science and Technology, vol. 49, pp. 231-238, 2016.
[32] Y. Zhou, Q. Luo, J. Xie and H. Zheng, “A Hybrid Bat Algorithm with Path Relinking for the Capacitated Vehicle Routing Problem”, In: Metaheuristics and Optimization in Civil Engineering, Vol. 7, pp. 255-276, 2016.
[33] X. Cai, X. Gao and Y. Xue, “Improved bat algorithm with optimal forage strategy and random disturbance strategy”, International Journal of Bio-Inspired Computation, vol. 8, Issue 4, pp. 205-214,2016.
[34] B. Zhu, W. Zhu, Z. Liu, Q. Duan, and L. Cao, “A Novel Quantum-Behaved Bat Algorithm with Mean Best Position Directed for Numerical Optimization”, Computational Intelligence and Neuroscience, pp. 1-17, 2016.
[35] C. Yammani, S. Maheswarapu, and S. Matam, “A Multi-objective Shuffled Bat algorithm for optimal placement and sizing of multi distributed generations with different load models”, International Journal of Electrical Power & Energy Systems, vol. 79, pp. 120-131, 2016.
[36] M. Eusuff, K. Lansey and F. Pasha, “Shuffled frog-leaping algorithm : A Memetic Meta-Heuristic for Discrete Optimization”, Eng. Optim., vol. 38, Issue 2, pp. 129–154, 2005.
Citation
S.L. Yadav, M. Phogat, "A Review on Bat Algorithm," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.39-43, 2017.
Enhancing Classification Accuracy using Feature Subset Selection in Intrusion Detection System (IDS)
Research Paper | Journal Paper
Vol.5 , Issue.7 , pp.44-50, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.4450
Abstract
Intrusion detection system (IDS) look into field has developed immensely in the previous decade. Enhancing the detection rate of client to root (C2R) assault class is an open research issue. Current IDS utilizes all information elements to recognize intrusions. A portion of the elements might be excess to the detection procedure. The reason for this experimental examination is to distinguish the vital elements to enhance the detection rate and diminish the false detection rate. The researched highlight subset choice strategies enhance the general exactness, detection rate of C2R assault class and furthermore diminish the computational cost. The exact outcomes have demonstrated a recognizable change in detection rate of C2R assault class with include subset determination methods.
Key-Words / Index Term
Feature subset selection; classification; preprocessing; Intrusion detection system
References
[1] Feng Yang, K. Z. Mao, Gary Kee Khoon Lee, Wenyin Tang, “Emphasizing Minority Class in LDA for Feature Subset Selection on High-Dimensional Small-Sized Problems”, IEEE Transactions on Knowledge and Data Engineering, Vol.27, Issue.1, PP.88 – 101, 2015.
[2] Qinbao Song, Jingjie Ni, Guangtao Wang, “A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data”, IEEE Transactions on Knowledge and Data Engineering, Vol.25, Issue.1, PP.1 – 14, 2013.
[3] Yong Liu, Feng Tang, Zhiyong Zeng, “Feature Selection Based on Dependency Margin”, IEEE Transactions on Cybernetics, Vol.45, Issue.6, PP.1209 – 1221, 2015.
[4] D. Asir Antony Gnana Singh, S. Appavu Alias Balamurugan, E. Jebamalar Leavline, “An empirical study on dimensionality reduction and improvement of classification accuracy using feature subset selection and ranking”, (INCOSET), PP.102 – 108, 2012.
[5] Chieng-Yi Chang, “Dynamic Programming as Applied to Feature Subset Selection in a Pattern Recognition System”, IEEE Transactions on Systems, Man, and Cybernetics, Vol.SMC-3, Issue.2, PP.166 – 171, 1973.
[6] Surya S. Durbha, Roger L. King, Nicolas H. Younan, “Wrapper-Based Feature Subset Selection for Rapid Image Information Mining”, IEEE Geoscience and Remote Sensing Letters, Vol.7, Issue.1, PP.43 – 47, 2010.
[7] A. Dastanpour, S. Ibrahim, R. Mashinchi, "Effect of Genetic Algorithm on Artificial Neural Network for Intrusion Detection System", International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.10-18, 2016.
[8] L. Boroczky, L. Zhao, K. P. Lee, “Feature Subset Selection for Improving the Performance of False Positive Reduction in Lung Nodule CAD”, IEEE Transactions on Information Technology in Biomedicine, Vol.10, Issue.3, PP.504 – 511, 2006.
[9] J. Yang, V. Honavar, “Feature subset selection using a genetic algorithm”, IEEE Intelligent Systems and their Applications, Vol.13, Issue.2, PP.44 – 49, 1998.
[10] Kashif Javed, Haroon A. Babri, Mehreen Saeed, “Feature Selection Based on Class-Dependent Densities for High-Dimensional Binary Data”, IEEE Transactions on Knowledge and Data Engineering, Vol.24, Issue.3, PP.465 – 477, 2012.
[11] Yongxuan Zhu, Xin Shan, Jun Guo, “Modified genetic algorithm based feature subset selection in intrusion detection system”, ISCIT 2005, Vol.1, PP.10 – 13, 2005.
[12] Prachi Tembhare, Neeraj Shukla, "An Integrated and Improved Scheme for Efficient Intrusion Detection in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.74-78, 2017.
Citation
S.A. Margaret, S. Padmavathi, "Enhancing Classification Accuracy using Feature Subset Selection in Intrusion Detection System (IDS)," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.44-50, 2017.
A survey of Meta-heuristics Approaches for application in Genomic data
Survey Paper | Journal Paper
Vol.5 , Issue.7 , pp.51-55, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.5155
Abstract
the present era is the revolutionary time in genomic applications. In recent years, genomes of various species have been sequenced; genes and proteins have been mapped and learned. Structures of genes and proteins have been implied and their behavior is being understood. Over the past two decades, there is a viable interest in to analysis of gene sequence and microarray data with the help of metaheuristics techniques. Therefore this survey intended to give some nature inspired methods to analyze genomic data such as sequence analysis of various genes, microarray analysis and multiple sequence alignment. The survey later on is followed by the types of main nature inspired algorithms both population and single solution based methods. These are followed by their different application in genomic data and their merits to address specific task.
Key-Words / Index Term
Metaheuristics, Microarray, genome, genetic algorithm
References
[1] Michael K. K. Leung, Andrew Delong, Babak Alipanahi, and Brendan J. Frey,”Machine Learning in Genomic Medicine: A Review of Computational Problems and Data Sets”, Proceedings of the IEEE, Vol.104, No.1, January 2016.
[2] E. de Klerk and P. A. C.’t Hoen, ‘‘Alternative mRNA transcription, processing, and translation: Insights from RNA sequencing,’’ Trends Gen., vol. 31, no. 3, pp. 128–139, 2015.
[3] J. Harrow et al., ‘‘GENCODE: The reference human genome annotation for the ENCODE project,’’ Genome Research., vol. 22, no. 9, pp. 1760–1774, 2012.
[4] V. Marx, ‘‘Biology: The big challenges of big data,’’ Nature, vol. 498, no. 7453, pp. 255–260, 2013.
[5] K. Y. Yip, C. Cheng, and M. Gerstein, ‘‘Machine learning and genome annotation: A match meant to be?’’, Genome Biology, vol. 14, no. 5, pp. 205, 2013.
[6] Fred W. Glover and Gary A. Kochenberger, “Handbook of Metaheuristics (International Series in Operations Research & Management Science)”, Springer, January 2003.
[7] Blum C, Roli A, “Metaheuristics in combinatorial optimization: Overview and conceptual comparison”, ACM Computing Survey, vol. 35, no.3, pp.268-308, September 2003.
[8] Glover, F “Future paths for integer programming and links to artificial intelligence”, Computer Operation Research, Vol. 13, pp.533–549, 1986.
[9] Kirkpatrick, S., Gelatt, C., Vecchi, M., “Optimization by simulated annealing”, Science, New Series, vol. 220, No. 4598, pp.671–680, May 1983.
[10] Mladenovic.M, Hansen.P, “Variable neighborhood search”, Computer Operation Research,. Vol.24, pp.1097–1100, 1997.
[11] James Kennedy, Russell Eberhart, “Particle Swarm Optimization”, IEEE International Conference on Neural Networks, Vol. 4, pp. 1942-1948, December 1995.
[12] He, S., Wu, Q.H., Saunders, J.R, “Group search optimizer–an optimization algorithm inspired by animal searching behaviour”, IEEE Transactions on Evolutionary Computer, vol. 13, no.5, pp.973–990, October 2009.
[13] Ajit Kumar, Dharmender Kumar and S.K. Jarial, “A novel hybrid K-means and artificial bee colony algorithm approach for data clustering”, Decision Science Letters, vol. 7, pp. 65-76, April 2017.
[14] Ajit Kumar, Dharmender Kumar and S.K. Jarial, “A Comparative Analysis of Selection Schemes in the Artificial Bee Colony Algorithm”, Computación y Sistemas, vol.20, No.1, pp. 55-66, 2016.
[15] Holland.J.H, “Adaptation in Natural and Artificial Systems”, University of Michigan Press, Ann Arbor, 1975.
[16] Shen, Q.,Wei-Min, S.,Wei, K, “Hybrid particle swarm optimization and tabu search approach for selecting genes for tumor classification using gene expression data”, Computational Biology and Chemistry, vol. 32, pp. 53–60, 2008.
[17] Neelam Goel, Shailendra Singh and Trilok Chand Aseri, “A comparative analysis of soft computing techniques for gene prediction”, Analytical Biochemistry, vol.438, pp.14-21, March 2013.
[18] Sina Tabakhi, Ali Najafi, Reza Ranjbar and Parham Moradi,” Gene selection for microarray data classification using a novel ant colony optimization”, Neurocomputing, Vol. 168, Issue.C, pp. 1024-1036, May 2015.
[19] C. Gondro, B.P. Kinghorn,” A simple genetic algorithm for multiple sequence alignment”, Genetic and Molecular research. Vol.6, no.5, pp. 964-982, October 2007.
[20] Rasmussen TK and Krink T, “Improved hidden Markov model training for multiple sequence alignment by a particle swarm optimization- evolutionary algorithm hybrid”, Bio systems, vol. 72, pp. 5-17, 2003.
[21] Kamil Kwarciak, Piotr Formanowicz, “Tabu search algorithm for DNA sequencing by hybridization with multiplicity information available”, Elsevier, Computers & Operation Research, Vol.47, pp. 1-10, January2014.
[22] Neethling M and Engelbrecht AP, “Determining RNA Secondary Structure using Set-based Particle Swarm Optimization”, Proc. Of congress on Evolutionary Computation (CEC), IEEE press, USA, 2006.
[23] J.H. Holland,” Adaptation in Natural and Artificial Systems”, the University of Michigan Press, Ann Arbor, Michigan, 1975.
[24] F. Glover, M. Laguna, and R. Marti,” Fundamentals of scatter search and path relinking”, Control and Cybernetics, Vol.39, no.5, pp. 653–684, 2000.
[25] S. Kirkpatrick, C.D. Gelatt, and M.P. Vecchi, “Optimization by simulated annealing. Science”, Science, Vol. 220, no.4598, pp.671–680, 1983.
Citation
Manu Phogat, Dharmender Kumar, "A survey of Meta-heuristics Approaches for application in Genomic data," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.51-55, 2017.