Encumbrance Collating in Cloud Data Center Using Modified Active Monitoring Load Balancer
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.72-76, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.7276
Abstract
Virtualization and automation is used to provide the user with self-service computing experience available at infinite scale at very low cost, with the tremendous growth of communications, connectivity and Internet technology cloud computing have become a principal reference of computing for IT industry. Major challenge for data centers is to streamline the requests, as cloud data centers and the users of the cloud-computing are globally situated, Present research provides environment that equally distributes workload across all the nodes. It also provides a way of achieving the proper utilization of resources and better user satisfaction. Current research is focused on the load-balancing algorithm, which distributes the incoming jobs among virtual machine optimally in cloud data centers. The proposed algorithm in this paper has been executed using Cloud Analyst Simulator and the performance of the suggested algorithm is compared with the three algorithms which are pre-exists based on response time. The experiment result shows that the recommended algorithm performs better than the existing algorithms.
Key-Words / Index Term
Virtual Machine, Load Balancing, Cloud Analyst, Cloud Data Center, Virtualization, User Base
References
[1] W. Bhathiya, “CloudAnalyst a CloudSim-based tool for modelling and analysis of large scale cloud computing environments”, MEDC Project, Cloud Computing and Distributed Systems Laboratory, University of Melbourne, Australia, pp. 1-44, June 2009.
[2] Domanal, S. G., & Reddy, G. R. M., “Load Balancing in Cloud Computing using Modified Throttled Algorithm” IEEE international conference on Cloud Computing in Emerging Market, pp. 1-5, October 2013.
[3] Prachi Verma et.al, “Enhancing Load Balancing in Cloud Computing by Ant Colony Optimization Method” International Journal of Computer Engineering In Research Trends, 4(6):pp:277-284 ,June-2017.
[4] Sundaram, C. R. M., & Narahari, Y., “Analysis Of Dynamic Load Balancing Strategies Using A Combination Of Stochastic Petri Nets And Queueing Networks” Springer Conference, Berlin Heidelberg, pp. 397-414, 1993.
[5] Mondal, B., Dasgupta, K., & Dutta, P., “Load Balancing In Cloud Computing Using Stochastic Hill Climbing-A Soft Computing Approach” Elsevier, Procedia
Technology, pp.783-789, 2012.
[6] M. Katyal et.al, “A Comparative Study of Load Balancing Algorithms in Cloud Computing Environment”, International Journal of Distributed and Cloud Computing Volume 1 Issue 2 December 2013
[7] Bhadani, A., & Chaudhary, S., “Performance Evaluation of Web Servers Using Central Load Balancing Policy Over Virtual Machines on Cloud”, ACM, Bangalore Conference, January 2010.
[8] W. Itani, A. Kayssi, and A. Chehab, “Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures,” 2009 8th IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009, pp. 711-716.
[9] B. Grobauer, T. Walloschek, and E. Stöcker, “Understanding Cloud Computing Vulnerabilities,” 2011 IEEE Security and Privacy, pp. 50-57, DOI= March/April 2011.
[10] W. A. Jansen, “Cloud Hooks: Security and Privacy Issues in Cloud Computing,” Proceedings of the 44th Hawaii International Conference on System Sciences, 2011.
[11] A. Sebastian, S. Sivagurunathan "A Survey on Load
Balancing Schemes in RPL based Internet of Things"
IJSRNSC Volume-6, Issue-3, June 2018.
[12] Vikas Mangotra, Richa Dogra "Cloud reliability
enhancement mechanisms: A Survey", International
Journal of Scientific Research in Computer Science
and Engineering Vol.6, Issue.3, pp.31-34 , June (2018)
Citation
Sanjay Khajure, Shubham Yelne, "Encumbrance Collating in Cloud Data Center Using Modified Active Monitoring Load Balancer," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.72-76, 2018.
A Case Study on The Automated Guided Vehicle System Through Reverse Engineering
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.77-87, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.7787
Abstract
In This study, AGV System (Automated Guided Vehicle) is considered as the most flexible equipment of MHS (Material Handling System) and one old. In the Indian context, few applications of AGV System have been started in automobile Industry. In this paper, studied the different parts of the AGV, different motions of the AGV driving wheels for carried out various motions, applied reverse engineering technique for developing the 3D CAD model of the existing AGV system, implemented necessary changes in the 3D CAD model for making the AGV suitable for carrying a payload of 50 Kg, analyze the developed model for stress and deflection under the payload, studied the power drive and control system of the existing AGV using Reverse Engineering technique, carried out testing of the different control features of the AGV motions including the sensors, tested the AGV for its basic motions by running test programs in personal computer etc.
Key-Words / Index Term
AGVS, Automated Guided Vehicle, FMS, MHS, Reverse Engineering.
References
[1] S. H. Y. Lni and Su-Hna Hsieh, “Design of AGV Travel Mechanism”, Computer and Industrial Engineering, Volume 23, Issues 1–4, Pages 181-185,November 1992.
[2] V. R. Milacic and G. D. Putnik, “Steering Rules for AGV Based on Primitive Function and Elementary Movement Control’, Robotics and Computer-Integrated Manufacturing, Volume 5, Issues 2–3, Pages 249-254, 1989.
[3] K. R. S. Kodagoda, W. S. Wijesoma and E. K. Teoh, “Fuzzy Speed and Steering Control of an AGV”, IEEE Transactions on Control Systems Technology, VOL. 10, NO. 1, January 2002.
[4] M. Sharma, “Control Classification of Automated Guided Vehicle Systems”, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-2, Issue-1, October 2012.
[5] G. Klancar, A. Zdesar, S. Blazic and L. Skrjanc, “Wheeled Mobile Robotics”, Butterworth-Heinemann, UK, pp 387-418, 2017, ISBN No 9780128042045.
[6] S. Butdee, F. Vignat, A. Suebsomran and P. KDV Yarlagadda, “Electrical and Software Based Design of Automated Guided Vehicle using Sensor”, International Journal of Mechanical Engineering & Technology, ISSN: 0976-6359, Volume-3, Issue-2, pp 150-161, August 2012.
[7] Q. li, A. C. Andriaansen and J. T. Udding, “Design and Control of an Automated Guided Vehicle Systems: A Case Study”, IFAC, Volume 44, Issue 1, pp 13852-13857, January 2011.
[8] G. A. Kumar and S. Sivasubhramaniam, “Automated Guided Vehicle for Physically Handicapped People –A Cost Effective Approach”, IOP Conference Series: Materials Science and Engineering, Volume 282, Conference 1, pp 0-8, doi:10.1088/1757-899X/282/1/012017, 2017.
[9] K. H. Kim, S. M. Jeon and K. R. Ryu, “Deadlock prevention for automated guided vehicles in automated container terminals”, Container Terminals and Cargo System, Springer, Berlin, pp. 243-263, 2007.
[10] C. Wuwei, K. Mills and S. Wenwu, “A new navigation method for an automatic guided vehicle”, Journal of Robotic System, volume- 21, Issue-3, pp.129-139, 21(3):129–139. doi:10.1002/rob.20004, 2004.
[11] Alves and Junior, “Mobile ultra sonic sensing in mobile robot” In: IECON 02 28th Annual Conference of Industrial Electronics Society, Spain, 2002.
[12] P. S. N. Priyanka, J.S.S. Rositha, K. SriNavya and N. Priyanka, “DTMF based home Automation without using Microcontroller”, International Journal of Scientific Research in Computer Sciences and Engineering, Volume- 6, Issue-2, pp. 1-4, April 2018.
Citation
S. Hossain, J. Saha, "A Case Study on The Automated Guided Vehicle System Through Reverse Engineering," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.77-87, 2018.
Moving Object Tracking System Using Morphological Image Processing
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.88-93, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.8893
Abstract
Image processing is a classical domain of research and development. A number of different applications in medical sciences, education and engineering the techniques of image processing are frequently used. The image processing techniques are used for discovering the objects, contents or images and lightening effects in digital images and video frames. In this presented work an application of image processing technique for recognizing the image objects is proposed for design and implement. More specifically it is tried to track and identify the moving objects. Therefore the video based object recognition technique is proposed to work. In order to design such technique video processing techniques and morphological image processing technique is used. The morphological image processing is a technique of image processing on which the pixel level structures are analysed and tracked. In addition of that for identifying the objects a threshold based technique is implemented. That technique computes the area of covered object and based on the count of pixel coverage and threshold the moving object in camera frame is detected and identified. The implementation of the proposed object detection technique is performed on MATLAB technology. Additionally the experiments on this technique are performed for finding efficiency and accuracy of the proposed system. The experiments based results demonstrate the proposed technique efficient and accurate for object tracking.
Key-Words / Index Term
Vehicle Detection, Image Processing, Digital Image, Video Frame, Morphological
References
[1] Tang, Yong, Congzhe Zhang, Renshu Gu, Peng Li, and Bin Yang, "Vehicle detection and recognition for intelligent traffic surveillance system", Multimedia tools and applications 76, no. 4 (2017): 5817-5832.
[2] Gonzalez, Richard Woods, “Digital Image Processing”, Pearson Publications, 2002.
[3] Navjeet Kaur, ShvetaChadda and Rajni Thakur, “A Survey of Image De-noising Filters”, IJCST Vol. 3, Issue 1, Jan. - March 2012.
[4] Vinod Sharma and Deepika Bansal, “A review on digital image enhancement by noise removal”, IJIRSET, vol.4, may 2015.
[5] Introduction to Image Processing, online available at: http://www.engineersgarage.com/articles/image-processing-tutorial-applications?page=2
[6] Ruye Wang, “Introduction - The Big Picture”, available online at: http://fourier.eng.hmc.edu/e161/lectures/introduction/index.html
[7] A. K. Jain “Fundamentals of digital image processing”. Prentice-Hall, 1989
[8] Shailendra Kumar Dewangan, “Importance & Applications of Digital Image Processing”, International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 7 No. 07 Jul 2016
[9] “Image Processing and Related Fields”, available online at: http://fourier.eng.hmc.edu/e161/lectures/e161ch1.pdf
[10] Alper Yilmaz, Omar Javed, and Mubarak Shah. Object tracking: A survey. Acm Computing Surveys (CSUR), 38(4):13, 2006
[11] Alan J Lipton, Hironobu Fujiyoshi, and Raju S Patil. Moving target classification and tracking from real-time video, In Applications of Computer Vision, 1998, WACV’98, Proceedings, Fourth IEEE Workshop on, pages 8–14. IEEE, 1998
[12] Cucchiara, Rita, Massimo Piccardi, and Paola Mello, "Image analysis and rule-based reasoning for a traffic monitoring system", IEEE Transactions on Intelligent Transportation Systems 1, no. 2 (2000): 119-130
[13] Newlin Rajkumar , Ranjani , and Venkatesa Kumar ,” Toll Gate Vehicle Monitoring System” International Journal of Computer Sciences and Engineering, Vol. 5, Issue 2, feb 2017
[14] Jitendra Oza , Zunnun Narmawala , Sudeep Tanwar, Pradeep Kr Singh ”Public Transport Tracking and its Issues”, International Journal of Computer Sciences and Engineering, Vol. 5, Issue 11, nov 2017
Citation
Anshul Vishwakarma, Amit Khare, "Moving Object Tracking System Using Morphological Image Processing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.88-93, 2018.
Analysis of Radio Resource Energy Consumption Pattern in Cellular Network
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.94-102, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.94102
Abstract
In the wireless communication especially in cellular network, energy efficiency is a major concern among other issues, specifically in high-speed data network i.e. 3G/4G. A Smartphone is a widely used handheld device to surf data in 3G/4G. Unfortunately, one of the constraints of Smartphone is having limited battery backup, which always makes the user inconvenience. Increasing of battery backup is not merely a solution to increase the user experience, because the growth of mobile technology is 25% per year but at the same time battery capacity increases 10% per year; it’s not a balanced. So that the researchers essentially focus on energy efficient development to extend battery life. This paper analyzes various factors influences of power consumption and their characteristics (like RRC state transitions, inactivity timer setup and screen On/Off) and the paper also reviews the proposals of energy-aware developments through real-time measurements.
Key-Words / Index Term
RRC State Transition, Inactivity Timers, Keep-Alive Messages, Energy Efficient Strategies, Energy aware 3G/4G
References
[1] Perala, P., Barbuzzi, A., Boggia, G., & Pentikousis, K.. “Theory and Practice of RRC State Transitions in UMTS Networks.” 2009 IEEE Globecom Workshops, pp.1-6, 2009.
[2] Perrucci, G.P., Fitzek, F.H., & Widmer, J. “Survey on Energy Consumption Entities on the Smartphone Platform”. 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring), pp.1-6. 2011.
[3] Li, D., Hao, S., Gui, J., & Halfond, W.G. “An Empirical Study of the Energy Consumption of Android Applications”. 2014 IEEE International Conference on Software Maintenance and Evolution, 121-130, 2014.
[4] Qian, F., Wang, Z., Gao, Y., Huang, J., Gerber, A., Mao, Z.M., Sen, S., & Spatscheck, O. “Periodic transfers in mobile applications: network-wide origin, impact, and optimization”. WWW, 2012.
[5] Kononen, V., & Paakkonen, P. Optimizing power consumption of always-on applications based on timer alignment. 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011), pp. 1-8, 2011.
[6] Haverinen, H., Siren, J., & Eronen, P. Energy Consumption of Always-On Applications in WCDMA Networks. 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring, pp. 964-968, 2007.
[7] GSMA, “Fast Dormancy Best Practices”, GSMA Official Document TS.18, 2011.
[8] Huang J, F. Qian, A. Gerber, Z. M. Mao, S. Sen, and O. Spatscheck. “A Close Examination of Performance and Power Characteristics of 4G LTE Networks”. In MobiSys’12. pp. 225-238, 2012.
[9] Qualcomm Engineering Services Group, “System Parameter Recommendations to Optimize PS Data User Experience and UE Battery Life”, Technical Document, 2007.
[10] Wang, Z, Qian, F., Gerber, A., Mao, Z.M., Sen, S., & Spatscheck, O. “TOP: Tail Optimization Protocol for Cellular Radio Resource Allocation”. The 18th IEEE International Conference on Network Protocols, pp. 285-294, 2010.
[11] Pandikumar, S, and Sumathi, M. “Analysis of Energy Profilers in Smartphone Environment”, International Journal of Advanced Research in Science and Engineering, Vol.06 Issue 02, pp. 20-29, 2017.
[12] Qian, F., Wang, Z., Gerber, A., Mao, Z.M., Sen, S., & Spatscheck, O. “Characterizing radio resource allocation for 3G networks”. Internet Measurement Conference. pp. 137-150, 2010.
Citation
S.Pandikumar, G.Sujatha, M.Sumathi, "Analysis of Radio Resource Energy Consumption Pattern in Cellular Network," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.94-102, 2018.
Assessment of Apple Quality based on Scaled Conjugate Gradient Technique, using Artificial Neural Network Model
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.103-108, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.103108
Abstract
This paper describes a new machine vision system and Artificial Neural Networks based system for quality assessment of apple in real time, attending to external quality features of the fruits as size, color symmetry, weight and external defects. Based on external features, apple is correctly classified in this finding. The ANN model is developed using BP-ANN with a single hidden layer and sigmoid activation functions in MATLAB. The output variable is the quality of the apple. The modeling results showed that there was an excellent agreement between the experimental data and predicted values, with very good performance, fewer parameters and shorter calculation time. The model might be an alternative method for quality assessment of apple and provide consumers with a safer food supply.
Key-Words / Index Term
Machine Vision; Real-Time Fruit Quality; Scaled Conjugate Gradient; Multilayer Perceptron; Back-Propagation Artificial Neural Network; Mean Square Error
References
[1] Tao, Y.; Morrow, C.T.; Heinemann, P.H.; Sommer, J.H.; “Automated machine vision inspection of potatoes”. ASAE Paper No. 90-3531, St. Joseph, MI, 1990.
[2] Zulhadi Zakaria, Nor Ashidi Mat Isa and Shahrel A. Suandi, “A Study on Neural Network Training Algorithm for Multiface Detection in Static Images”, World Academy of Science, Engineering and Technology 62-66, 2010.
[3] Okamura, N.K.; Delwiche, M.J.; Thompson, J.F.; “Raising grading by machine vision”. ASAE Paper No. 91-7011. St. Joseph, MI, 1991.
[4] Sarkar, N.; Wolfe, R.R.; “Feature extraction techniques for sorting tomatoes by computer vision”. TASAE Vol. 28(3): 970-974, 1985.
[5] Guyer, D.E.; Miles, G.E.; Gaultney, L.D.; Schereiber, M.M.; “Application of machine vision to shape analysis in leaf and plant identification”. 1993. TASAE Vol. 36(1): 163-171, 1993.
[6] Dickson, M.A.; Bausch, W.C.; Howarth, M.S.; “Classification of a broadleaf weed, a grassy weed, and corn using image processing techniques”. SPIE Vol. 2345: 297-305, 1994.
[7] Ruiz, L.A.; Moltó, E.; Juste, F.; Aleixos, N.; “Aplicación de métodos ópticos para la inspección automática de productos hortofrutícolas”. VI Congreso de la Sociedad Española de Ciencias Hortícolas, 25-28 de Abril de, Barcelona, 1995.
[8] YudongZhanga, ShuihuaWanga, Genlin Jib, PreethaPhillipsc,
“Fruit classification using computer vision and feedforward neural network”, Journal of Food Engineering, pp 167–177, 2014.
[9] Growe, T.G.; Delwiche, M.J.; “A system for fruit defect detection in real-time”. AGENG 96, Paper No. 96F-023, 1996.
[10]Ashutosh Kumar Bhatt, Durgesh Pant and Richa Singh, AI &
SOCIETY, Knowledge Culture and Communication, An analysis of the performance of Artificial Neural Network technique for apple classification, ISSN 0951-5666, AI & Soc DOI 10.1007/s00146-012-0425-z Volume 24, Number 1 August 2009.
[11]Moltó, E.; Aleixos, N.; Ruiz, L.A.; Vázquez, J.; Juste, F.; “An artificial vision system for fruit quality assessment”. AGENG 96, Madrid, Paper No. 96F-078, 1996.
[12]McCulloch, W., and W. Pitts , “A Logical Calculus of the Ideas Immanent in Nervous Activity”, Bulletin of Mathematical Biophysics, Vol. 5, pp.115–133. 1996.
[13]Zweiri, Y.H., Whidborne, J.F. and Sceviratne, L.D. A Three-term Backpropagation Algorithm. Neurocomputing. 50: 305-318, 2002.
[14]C.M. Bishop. Neural Networks for Pattern Recognition. Oxford University Press.Chapter 7, pp.253-294. 1995.
[15]A.K. Bhatt & D Pant, AI & SOCIETY, Knowledge Culture and Communication, Automatic apple grading model development based on back propagation neural network and machine vision, and its performance evaluation, ISSN 0951-5666, AI & Soc DOI 10.1007/s00146-012-0425-z Volume 30, Number 1 Feb, pp 45-56, 2015.
[16]Praveen Tripathi et. al., “ Efficiency Comparisons of Various Ann-Based and Svm-Based Techniques for Classification Problems: A Review”, International Journal of Scientific & Engineering Research Volume 8, Issue 10, October 2017, ISSN 2229-5518 pp 90-95, 2017.
Citation
Praveen Tripathi, R. Belwal, A.K.Bhatt, "Assessment of Apple Quality based on Scaled Conjugate Gradient Technique, using Artificial Neural Network Model," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.103-108, 2018.
Relevant Keyword Search for Building Service-Based System
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.109-114, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.109114
Abstract
Software engineering has witnessing rapid changes from time to time. One such change of late is to have Service Oriented Architecture – based applications that can provide a comprehensive service to end users. Due to the emergence of web services technology with distributed, scalable, and interoperable computing capabilities, they are widely used to have service oriented applications. Such applications are known as Service Based Systems (SBSs). It is important to have automatic selection of composition of services at runtime to have dynamic integration of services. The problem with existing approaches is that they expect SOA techniques from software engineers and thus the quality of SBS depends on the expertise of the engineers. To overcome this problem, in this paper, introduced and implemented a framework that guides users to have certain keywords to search and build new SBS that improves Quality of Service (QoS) of generated SBSs. The service discovery and service composition are evaluated with a prototype application built to demonstrate proof of the concept. The experimental results revealed the usefulness of the proposed architecture which supports relevant keyword search for building SBS.
Key-Words / Index Term
Keyword Search, Service Based System, Web Service, Service Discovery, Service Composition
References
[1] M. Alrifai, D. Skoutas, and T. Risse, "Selecting Skyline Services for QoS-based Web Service Composition," Proc of 19th International Conference on World Wide Web (WWW 2010), Raleigh, North Carolina, USA, pp. 11-20, 2010.
[2] L. Baresi and S. Guinea, "Self-Supervising BPEL Processes," IEEE Transactions on Software Engineering, vol. 37, no. 2, pp. 247-263, 2011.
[3] D. Benslimane, S. Dustdar, and A. Sheth, "Services Mashups: The New Generation of Web Applications," IEEE Internet Computing, vol. 12, no. 5, pp. 13-15, 2008.
[4] A. Brogi, S. Corfini, and R. Popescu, "Semantics-Based Composition-Oriented Discovery of Web Services," ACM Transactions on Internet Technology, vol. 8, no. 4, pp. 19:1-19:39, 2008.
[5] V. Cardellini, E. Casalicchio, V. Grassi, S. Lannucci, F. Lo Presti, and R. Mirandola, "MOSES: A Framework for QoS Driven Runtime Adaptation of Service-Oriented Systems," IEEE Transactions on Software Engineering, vol. 38, no. 5, pp. 1138-1159, 2012.
[6] C. Carpineto and G. Romano, "A Survey of Automatic Query Expansion in Information Retrieval," ACM Computing Surveys, vol. 44, no. 1, pp. 1-50, 2012
[7] G. Cassar, P. Barnaghi, and K. Moessner, "Probabilistic Matchmaking Methods for Automated Service Discovery," IEEE Transactions on Services Computing (TSC), vol. 7, no. 4, pp. 654-666, 2014.
[8] A. Klein, F. Ishikawa, and S. Honiden, "Towards Network-Aware Service Composition in the Cloud," Proc of 21st World Wide Web Conference (WWW 2012), Lyon, France, pp. 959-968, 2012.
[9] K. Golenberg, B. Kimelfeld, and Y. Sagiv, "Keyword Proximity Search in Complex Data Graphs," Proc of 28th ACM SIGMOD International Conference on Management of Data (SIGMOD 2008), pp. 927-940, 2008.
[10] Q. He, J. Han, Y. Yang, H. Jin, J.-G. Schneider, and S. Versteeg, "Formulating Cost-Effective Monitoring Strategies for Services-based Systems," IEEE Transactions on Software Engineering, vol. 40, no. 5, pp. 461-482, 2014.
[11] X. Liu, Y. Ma, G. Huang, J. Zhao, H. Mei, and Y. Liu, "Data-Driven Composition for Service-Oriented Situational Web Applications," IEEE Transactions on Services Computing (TSC), vol. 8, no. 1, pp. 2-16, 2015
[12] E. Al-Masri and Q. H. Mahmoud, "Investigating Web Services on the World Wide Web," Proc of 17th International Conference on World Wide Web (WWW 2008), Beijing, China, pp. 795-804, 2008.
[13] V. Hristidis and Y. Papakonstantinou, "DISCOVERY: Keyword Search in Relational Databases," Proc of 28th International Conference on Very Large Data Bases (VLDB 2002), Hong Kong, China, pp. 670-681, 2002.
[14] Ramya Swetha, Ananda Rao. A, Radhika Raju. P, Ramesh. G “Automation of Test Knowledge Reconfiguration for Web Services”, South Asain Journal of Engineering and Technology, Vol. 2, No. 28(2016) 1-4.
[15] M. Jiang, A. W.-C. Fu, and R. C.-W. Wong, "Exact Top-k Nearest Keyword Search in Large Networks," Proc of 36th ACM SIGMOD International Conference on Management of Data (SIGMOD 2015), pp. 393-404, 2015.
[16] A. V. Riabov, E. Boillet, M. D. Feblowitz, Z. Liu, and A. Ranganathan, "Wishful Search: Interactive Composition of Data Mashups," Proc of 17th International Conference on World Wide Web (WWW 2008), Beijing, China, pp. 775-784, 2008.
[17] D. Ardagna and B. Pernici, "Adaptive Service Composition in Flexible Processes," IEEE Transactions on Software Engineering (TSE), vol. 33, no. 6, pp. 369-384, 2007.
[18] F. Wagner, B. Klöpper, F. Ishikawa, and S. Honiden, "Towards Robust Service Compositions in the Context of Functionally Diverse Services," Proc of 21st International World Wide Web Conference (WWW 2012), Lyon, France, pp. 969-978, 2012.
[19] Y. Ni, Y. Fan, W. Tan, K. Huang, J. Bi, "NCSR: Negative-connection-aware service recommendation for large sparse service network", IEEE Trans. Autom. Sci. Eng., vol. 13, no. 2, pp. 579-590, Apr. 2016.
[20] He et al., "Keyword Search for Building Service-Based Systems," in IEEE Transactions on Software Engineering, vol. 43, no. 7, pp. 658-674, 2017. doi:10.1109/TSE.2016.2624293
[21] Comi A., Fotia L., Messina F., Rosaci D., Sarné G.M.L. A partnership-based approach to improve QoS on federated computing infrastructures. Inf. Sci. 2016;367:246–258. doi: 10.1016/j.ins.2016.05.051.
[22] XWARE—A customizable interoperability framework for pervasive computing systems. Pervasive and Mobile Computing 47, 13-30. Online publication date: 1-Jul-2018.
[23] Enhance Trust Management in Composite Services with Indirect Ratings. The Computer Journal 60:11, 1619-1632. Online publication date: 1-Nov-2017.
[24] Towards a Reuse Strategic Decision Pattern Framework – from Theories to Practices. Information Systems Frontiers 13. Online publication date: 9-May-2018.
[25] P. Radhika Raju, Prof. A. Ananda Rao,, “Optimization of Program Invariants.”, ACM SIGSOFT Software Engineering Notes, Vol. 39, Issue 1,Jan 2014.
[26] Imprecise Matching of Requirements Specifications for Software Services Using Fuzzy Logic. IEEE Transactions on Software Engineering 43:8, 739-759. Online publication date: 1-Aug-2017.
[27] Towards a Reuse Strategic Decision Pattern Framework – from Theories to Practices. Information Systems Frontiers 13. Online publication date: 9-May-2018.
[28] Dr. P. Radhika Raju, Prof. A. Ananda Rao, B. Swarna Jyothi, “Development of Service Oriented Situational Web Applications Using Knowledge Discovery.”, International Journal of Advances Research in Computer Sciences and Software Engineering, Vol. 6-9, no.02, 2017.
[29] .Web services datasets. Retrieved from https://github.com/wsdream/wsdream-dataset. Accessed on 10 March 2018.
Citation
G.B. Sai Preethi, P. Radhika Raju, A. Ananda Rao, "Relevant Keyword Search for Building Service-Based System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.109-114, 2018.
Energy Efficient Industrial Application Using IOT
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.115-118, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.115118
Abstract
In this paper security based and energy efficient system is developed for the intelligent industrial automation. The system works on a solar energy. Raspberry Pi 3 used in this system. Gas leakage and temperature information are sensed by sensors. And this information is sent to the android phone and a laptop via WiFi. The gas leakage and temperature in the industries automatically detect which controls solenoid valve and fan, which is connected to the Raspberry Pi 3. The solenoid valve is use of this system for the purpose of gas leakage valve close and exhaust fan use for cooling purpose. Automatically alert about critical situation in the industry via an alarm. The main two parts of this system; detection of gas and temperature, live video streaming and whole this information is sent to the laptop and mobile. Camera used in this system sends live video to the laptop. The aim of the proposed system is managing the power utilizes and control the critical situation in the industries.
Key-Words / Index Term
Gas Sensor, Temperature Sensor, Raspberry Pi 3, Solar Panel, Camera
References
[1]. Subhashini.M, A.et.al “Internet Based Sensor Networking & Home Automation Using Cortex Processor On Linux Platform (Raspberry Pi2)” IEEE International conference on Signal Processing, Communication, Power and Embedded Systems (SCOPES) -2016
[2]. Dr. V. Ramya.et.al “Raspberry Pi Based Energy Efficient Industrial Automation System” International Journal of Innovative Research in Computer Science and Engineering (IJIRCSE) vol. 2,issue- 1.january 2016.
[3]. CheahWai Zhao. Et.al “Exploring IOT application using raspberry pi”, International Journal of Computer Networks and Applications, Vol. 2, Issue 1, pp. 27-34, February 2015.
[4].S.Thenmozhi,et.al “Greenhouse Management Using Embedded System and Zigbee Technology”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (An ISO 3297: 2007 Certified Organization), Vol. 3, Issue 2, ISSN (Print) : 2320 – 3765,ISSN (Online): 2278 – 8875,pp7382-7389, February 2014.
[5]. Ron Oommen Thomas, K. Rajasekaran, “Remote control of robotic arm using raspberry pi”,International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353, Vol. 8, Issue 1,pp186-189, April 2014.
[6]. A.chawane. et.al “ Industrial automation using raspberry pi” international jouranal of interdisciplinary reserarch(IJIR) vol 2,issue-5,2016.
[7]. A. Velankar “Wireless Electronic Nose for Gas Identification”2nd International Conference on Inventive Computation Technologies ( ICICT 2017).
[8]. K.Bhosale et.al. “Industrial Automation using IOT” international research journal of engg. and technology. Val 04 Issue:06,June 2016.
[9]. D.Patel et.al “Gas and Temperature Dectection System using Microcontroller” journal of control & Instrumentation.vol.4, Issue 2, 2013.
[10]. L. Bendale et.al “Study of Various Routing Protocols in Mobile Ad-Hoc Networks” International Journal of Scientific Research in Network Security and Communication.Vol 6, Issue-1, Jan 2018.
[11]. V.S. Varnika “Cloud Computing Advantages and Challenges for Developing Nations” International Journal of Scientific Research in Computer Science and Engineering Vol.6, Issue.3, pp.51-55 , June (2018).
Citation
P.A.Wange, S. M. Rajbhoj, "Energy Efficient Industrial Application Using IOT," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.115-118, 2018.
Design and Development of A Novel Algorithm For Quality of Jpeg Compressed Images
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.119-125, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.119125
Abstract
Image based surveillance is increasingly gaining importance both in martial and private applications. Development of advanced image compression algorithms which achieve higher CR than what is available now will greatly help in transmission of video or set of images with less delay in the time required for transmission in sensitive applications. Thus it is proposed to study image compression algorithms with a view to applying them in various applications so that a set or large number of images can be transmitted at the same time consuming lesser file size or storage space required. Hence there is a need to design and develop an efficient algorithm. To transmit the images or videos in large numbers, it takes more time for transmission due to the size of the files, also higher the size, higher the storage space required. Hence there is a need to design and develop an efficient algorithm which can reduce the size of the images to compress set of images for compression ratios higher than the present technologies 3-D, considering 64 frames at a time.
Key-Words / Index Term
Image coding, Transform coding, data compression, JPEG compression, 3D-Discrete Cosine Transform, Discrete Wavelet Transform, Set Partitioning in Hierarchical Trees
References
[1] R.C.Gonzalez and R.E.Woods, “Digital Image Processing,” Academic, Pearson Education,2004
[2] A.Skodras, C.Christopoulos, T.Ebrahimi, “The JPEG 2000 Still Image Compression Standard,” IEEE Signal Processing Magazine, Proc., Sept 2001, Page 36-58
[3] CK Chui, “Wavelets: A Tutorial in Theory and Applications,” Academic Press, NY, 1992
[4] Y.Tanaka, M.Hasegawa, S.Kato, M.Ikehara and T.Q.Nguyen, “Adaptive Directional Wavelet Transform Based on Directional Prefiltering,” IEEE Transactions on Image Processing, Vol.19, No.4, Apr 2010, Page 934-945
[5] X.Wu, X.Zhang and X.Wang, “Low Bit-Rate Compression via Adaptive Down Sampling and Constrained Least Squares Upconversion,” IEEE Transactions on Image Processing, Vol.18, No.3, March 2009, Page 552-561
[6] W.Ding, F.Wu, X.Wu, S.Li and H.Li, “Adaptive Directional Lifting- Based Wavelet Transform for Image Coding,” IEEE Transactions on Image Processing, Vol.16, No.2, Feb 2007, Page 416-427
[7] M.B.Wakin, J.K.Romberg, H.Choi and R.G.Baraniuk, “Wavelet-Domain Approximation and Compression of Piecewise Smooth Images,” IEEE Transactions on Image Processing, Vol.15, No.5, May 2006 , Page 1071-1087
[8] B.Zeng and A.N.Venetsanopoulos, “A JPEG-Based Interpolative Image Coding
Scheme,” Proc. IEEE ICASSP, Vol. V, 1993, Page 393–396
[9] I.Firoiu, C.Nafronita, J.M.Boucher and A.Isar, “Searching Appropriate Mother Wavelets for Hyperanalytic denoising,” Developed in framework of grant funded by Romanian Research Council (CNCSIS), 2010 ( Advances in Electrical and Computer Engineering)
[10] I.Firoiu, C.Nafornita, J.M.Boucher and A.Isar,” Image Denoising Using a New Implementation of the Hyperanalytic Wavelet Transform,” IEEE Transactions on Instrumentation and Measurement, Vol.58, Issue 8, Aug 2009, Page 2410-2416
[11] I.Firoiu, A.Isar and D.Isar, “A Maximum A Posteriori Approach of Hyperanalytic Wavelet Based Image Denoising in a Multi-Wavelet Context,” Proceedings of the 9th WSEAS International Conference on Signal Processing, 2009, Page 113-119
[12] S.C.Olhede, “Hyperanalytic Denoising,” IEEE Transactions on Image Processing, Vol.16, No.6, Jun 2007, Page 1522-1537
[13] M.Unser and T.Blu, “Mathematical Properties of The JPEG 2000 Wavelet Filters,” IEEE Trans. Image Process., Vol. 12, No. 9, Sep 2003, Page 1080–1090
[14] M.Vetterli, J.Kovacevic and V.K.Goyal, “The World of Fourier and Wavelets- Theory, Algorithms and Applications,” Academic (Copyright), April 2007
[15] V.Velisavljeric, B.B.Lozano, M.Vetterli and P.L.Dragotti, “Discrete Multi- Directional Wavelet Bases,” IEEE Int. Conf. Image Processing, Vol. 1, Sep 2003, Page 1025–1028
[16] M.Vetterli, “Wavelets, Approximation and Compression,” IEEE Signal Process. Mag., No. 9, Sep 2001, Page 59–73
[17] J.Xu, F.Wu, J.Liang and W.Zhang, “Directional Lapped Transforms for Image Coding,” IEEE Transactions on Image Processing, Vol.19, No.1, Jan 2010, Page 85- 97
[18] M.N.Do and M.Vetterli, “The Contourlet Transform: An Efficient Directional Multiresolution Image Representation,” IEEE Trans. Image Process., Vol. 14, No. 12, Dec 2005, Page 2091–2106
[19] Y.Lu and M.N.Do, “Crisp-Contourlets: A Critically Sampled Directional Multi resolution Image Representation,” SPIE Conf. Wavelet Applications in Signal and Image Processing, Aug 2003
[20] V.Chappelier, C.Guillemot and S.Marinkovic, “Image Coding With Iterated Contourlet and Wavelet Transforms,” SPIE Vis. Commun. Image Process., Vol. 5150, Jul 2003, Page 1253–1264
[21] V.Velisavljeric, B.B.Lozano, M.Vetterli and P.L.Dragotti, “Directionlets: Anisotropic Multi-Directional Representation With Separable Filtering,” IEEE Trans. Image Process., Vol. 15, No. 7, Jul 2006, Page 1916–1933
[22] R.L.Claypoole, G.M.Davis, W.Sweldens and R.G.Baraniuk, “Nonlinear Wavelet Transforms for Image Coding via Lifting,” IEEE Transactions on Image Processing, Vol.12, No.12, Dec 2003, Page 1449-1459
[23] R.Claypoole, R.Baraniuk and R.Nowak, “Adaptive Wavelet Transforms via Lifting,” IEEE Transactions on Signal Processing, May 1999, Page 1-28
[24] C.L.Chang and B.Girod, “Direction-Adaptive Discrete Wavelet Transform for Image Compression,” IEEE Transactions on Image Processing, Vol.16, No.5, May 2007, Page 1289-1302
[25] Y.Liu and K.N.Ngan, “Weighted Adaptive Lifting-Based Wavelet Transform for Image Coding,” IEEE Transactions on Image Processing, Vol.17, No.4, April 2008, Page 500-511
Citation
G. Pandyan, Arthi. H, "Design and Development of A Novel Algorithm For Quality of Jpeg Compressed Images," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.119-125, 2018.
Information Retrieval From Thyroid Database Through Data Mining
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.126-130, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.126130
Abstract
Thyroid disorders occur due to dysfunction of the thyroid gland or pituitary gland, iodine deficiency, cancer in some parts of the body, or due to side-effects from other medications. Hyperthyroidism, Hypothyroidism, Goitre, and Thyroid cancer are some of the ailments that result due to thyroid disorders. Some other reasons like pregnancy, or medications for other illnesses may also show abnormal levels of thyroid hormones This research study aims to identify conditions based on which we could predict the type of thyroid disorder in patients. This could help in further diagnosis and treatment. We study various attributes commonly found in patients with thyroid disorders to identify those attributes that may specifically describe the type of thyroid disorder in a person. Moreover we analyze six different classes of thyroid disorders, their symptoms and try to classify what kind of disorder a person has based on the symptoms. Totally 1535 records with 29 attributes are taken for the study. Statistical techniques are used to analyze the frequency of occurrence of various factors towards each type of the disease and test for significance of factors is also done. The results are used to build a data model that helps to predict the occurrence of specific type of thyroid disorder in a patient based on significant symptoms. The results emphasize that age, sex, values of hormones like TSH, T3, T4 and FTI of a patient play a predominant role in classifying and determining the type of thyroid disorder in the person. We also classify the given dataset using various decision tree techniques in different ways and compare the results.
Key-Words / Index Term
Data mining, Thyroid disorder, Classification, Prediction
References
[1]. Dr.G.Rasitha Banu, M.Baviya, “Predicting Thyroid Disease using Data Mining Technique”, International Journal of Modern Trends in Engineering and Research, e-ISSN 2349-9745, Pages 666-670, Vol 2(3), March 2015.
[2]. Irina Ionitak Liviu Ionita, “Prediction of Thyroid Disease Using Data Mining Techniques”, BRAIN. Broad Research in Artificial Intelligence and Neuroscience. Vol.7. pp.115-124. Nov 18, 2017
[3]. Prerana, Parveen Sehgal, Khushboo Taneha, “Predictive Data Mining for Diagnosis of Thyroid Disease using Neural Network”, International Journal of Research in Management, Science & Technology, e-ISSN 2321-3264, Vol 3(2), April 2015
[4]. Ebru Turanoglu Bekar, Gozde Ulutagay, Suzan Kantarci Savas, “Classification of Thyroid Disease by Using Data Mining Models: A comparison of Decision Tree algorithms.” The Oxford Journal of Intelligent Decision and Data Science, Vol 2016(2), Pages 13-28, doi: 10.5899/2016/ojids-00002,
[5]. K.Rajam, R. Jemina Priyadarsini, “A Survey on Diagnosis of Thyroid Disease using Data Mining Techniques”, International Journal of Computer Science and Mobile Computing, ISSN 2320-088x , Vol 5(5), pg 354-358, May 2016
[6]. Dr.B.Srinivasan, K.Pavya, “Diagnosis of Thyroid Disease Using Data Mining Techniques: A study”, International Research Journal of Engineering and Technology, e-ISSN 2395-0056, Vol 3(11), Nov 2016.
[7]. Dr. G.Rasitha Banu, M.Baviya, Dr. Murtaza Ali, “A Study on Thyroid Disease using Data Mining Algorithm”, International Journal of Technical Research and Applications, e-ISSN 2320-8163, Vol 3(4), PP 376-379, Aug 2015
[8]. Zoya Khalid, Sheema Sameen, Shaukat I Malike, Shehzad S, “Computational Analysis on the Role of GPM6A in human thyroid cancer”, Journal of Data Mining in Genome Proteinomics 3:114, doi: 10.4172/2153-0602.1000114, ISSN 2153-0602,Jan 2012.
[9]. B.Jothi, S.KRishnaveni, J. Jeyasudha, “Analysis of thyroid syndrome using K-Means Clustering Algorithm”, Journal of Chemical and Pharmaceutical Sciences, ISSN 0974-2115,
[10]. K. Saravana Kumar, Dr. R. Manicka Chezian, “Analysis on Suspicious Thyroid Recognition using Association Rule Mining”, Journal of Global research in Computer Science, ISSN 2229-371X, Vol. 3(9), Sep 2012.
[11]. Limin Wang, FangYuan Cao, ShuangCheng Wang, MingHui Sun, LiYan Dong, “Using k-dependence causal forest to mine the most significant dependency relationships among clinical variables for thyroid disease diagnosis”, PLOS One, Vol 12(8), e0182070, 2017, doi: 10.1371/journal.pone.0182070
[12]. Kevin M.Pantalone et al., “Measurement of Serum Free Thyroxine Index may provide additional case detection compared to free thyroxine in the diagnosis of central hypothyroidism”, Case Reports in Endocrinology, Vol 2015, Dec 8, 2015, doi: 10.1155/2015/965191
Citation
N. Vijayalakshmi, P. Nithya, "Information Retrieval From Thyroid Database Through Data Mining," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.126-130, 2018.
Application of GWO in Control of BH System with ISE Objective Function
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.131-136, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.131136
Abstract
This work deals with performance evaluation of integral square error (ISE) objective function in determining the optimal parameters of proportional-integral-derivative (PID) controller for control of ball hoop system using Grey Wolf Optimization (GWO) algorithm. The GWO is recently proposed bio inspired heuristic algorithm inspired by both the social hierarchy and hunting strategy of grey wolves. Comparison of proposed GWO/PID scheme with other existing techniques has also been shown in graphical and tabular forms. It has been observed that proposed GWO/PID approach with ISE as an objective function gives less settling time and overshoot when compared with existing approaches in the literature.
Key-Words / Index Term
Ball Hoop System, PID Controller, Grey Wolf Optimization, Meta-Heuristic, Integral Square Error (ISE)
References
[1] M. Zhuang and D.P. Atherton , “Automatic tuning of optimum PID controllers”, IEEE Proceedings, Vol. 140, Issue 3, pp. 216-224, 1993.
[2] K. J. Astrom and T. Hagglund, “The future of PID control”, Control Engineering Practice, pp. 1163- 1175, 2001.
[3] K.H. Ang, and G. Chong, Y. Li, “PID control system analysis, design and technology”, IEEE Trans. Control System Technology, Vol. 13, pp. 559-576, 2005.
[4] J. G. Ziegler, Ν. B. Nichols, "Optimum setting for automatic controllers", Trans. ASME, Vol. 64, pp. 7759-7768, 1942.
[5] G.H. Cohen and G.A. Coon, “Theoretical Investigation of Retarded Control”, The American Society of Mechanical Engineer, Vol. 75, pp. 827-834, 1953.
[6] O. Roeva and T. Slavov, “PID Controller tuning based on metaheuristic algorithms for bioprocess control”, Biotechnology & Biotechnological Equipment, pp. 3267-3277, 2014.
[7] S. Pareek, M. Kishnani and R. Gupta, “Optimal tuning of PID controller using meta heuristic algorithms”, IEEE International Conference on Advances in Engineering & Technology Research (ICAETR ), 2014.
[8] P. Sreekanth and A. Hari, “Genetic algorithm based self tuning regulator for ball and hoop system”, IEEE Conference on Emerging Devices and Smart Systems (ICEDSS), 2016.
[9] M. EI-Said EI-Telbany, “Employing Particle Swarm Optimizer and Genetic Algorithms for Optimal Tuning of PID Controllers: A Comparative Study”, ICGST-ACSE Journal, Vol. 7, No. 2, pp. 49-54, 2007.
[10] [10] H. Mojallali, R. Gholipour, A. Khosravi and H. Babaee, “ Application of chaotic particle swarm optimization to PID parameter tuning in ball and hoop system”, International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, pp. 452-457, 2012.
[11] [11] Morkos and H. Kamal, “ Optimal tuning of PID controller using adaptive hybrid particle swarm optimization algorithm” , Int. J. of Computers, Communications & Control, Vol VII, No.1, pp. 101-114, 2012.
[12] [12] D. Davendra, I. Zelinka and R. Senkerik, “Chaos driven evolutionary algorithms for the task of PID Control”, Computers & Mathematics with Applications, Vol. 60, No. 4, pp.1088–1104, 2010.
[13] [13] N. Jain, G. Parmar and R. Gupta, “ Performance of PID controller of nonlinear system using swarm intelligence techniques”, ICTACT Journal on Soft Computing,Vol. 6, pp. 1314-1318, 2016.
[14] [14] E. S. Ali and S. M. Abd-Elazim, “Bacteria foraging optimization algorithm based load frequency controller for interconnected power system”, Electric Power and Energy Systems, Vol. 33, pp. 633-638, 2011.
[15] [15] S. Mirjalili, S. M. Mirjalili and A. Lewis, “Grey Wolf Optimizer”, Adv. Eng. Softw., ELSEVIER, Volume 69, pages 46-61, 2014.
[16] [16] V. Soni, G. Parmar and M. Kumar, “A hybrid grey wolf optimisation and pattern search algorithm for automatic generation control of multi area interconnected power system”, Int. J. of Advanced Intelligence Paradigms, Inderscience [In Press].
[17] [17] L.D. Mech, “Alpha status, dominance, and division of labor in wolf packs”, Canadian Journal of Zoology, Volume 77, 1999.
[18] [18] C. Muro, R. Escobedo, L. Spectoe and R. P. Coppinger, “Wolf-pack (Canis Lupus) hunting strategies emerge from simple rules in computational simulations”, ELSEVIER, Volume 88, pages 192-197, 2011.
[19] [19] P. Wellstead, “ The ball and hoop system”, Automatica,Vol. 19, No. 4, pp. 401-406,1983.
[20] [20] Z.-L. Gaing, “A particle swarm optimization approach for optimum design of PID controller in AVR system,” IEEE Trans. Energy Conversion, Volume 19, pages 384-391, June 2004.
[21] [21] Dervis Karaboga, Bahriye Basturk, “A Powerful and Efficient Algorithm for Numerical Function Optimization: Artificial Bee Colony (ABC) Algorithm”, Journal of Global Optimization, Vol. 39, No. 3, pp. 459-471, 2007.
[22] [22] Kevin M. Passino, “Biomimicy of Bacterial Foraging for Distributed Optimization and Control”, IEEE Control Systems, Vol. 22, No. 3, pp. 52-67, 2002.
[23] [23] N. Jain, G. Parmar, R. Gupta and I. Khanam, “ Performance evaluation of GWO/PID approach in control of ball hoop system with different objective functions and perturbation”, Cogent Engineering, Vol. 5, pp. 1-18, 2018.
Citation
Vijay Kumar, Girish Parmar, Rajesh Bhatt, "Application of GWO in Control of BH System with ISE Objective Function," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.131-136, 2018.