Improved Invasive Weed Optimization for Solving Optimal Reactive Power Problem
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.576-580, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.576580
Abstract
This paper presents Improved Invasive Weed Optimization (IIWO) for solving optimal reactive power problem. Particle Swarm Optimization (PSO) has been combined with Invasive weed optimization (IWO) to enhance exploration & exploitation capability for solving the optimal reactive power Problem. In this paper, the idea of intelligent swarming, social cooperation, competition, and reproduction in an optimization meta-algorithm has been merged.In order to evaluate the efficiency of the proposed algorithm; it has been tested on IEEE 57 bus system and simulation results reveals about the best performance of the proposed algorithm in reducing the real power loss.
Key-Words / Index Term
Invasive weed, optimal reactive Power dispatch,Transmission loss
References
[1]. O.Alsac,and B. Scott, “Optimal load flow with steady state security”,IEEE Transaction. PAS -1973, pp. 745-751.
[2]. Lee K Y ,Park Y M , Oritz J L –A united approach to optimal real and reactive power dispatch , IEEE Transactions on power Apparatus and systems 1985: PAS-104 : 1147-1153
[3]. A.Monticelli , M .V.F Pereira ,and S. Granville , “Security constrained optimal power flow with post contingency corrective rescheduling” , IEEE Transactions on Power Systems :PWRS-2, No. 1, pp.175-182.,1987.
[4]. DeebN ,Shahidehpur S.M ,Linear reactive power optimization in a large power network using the decomposition approach. IEEE Transactions on power system 1990: 5(2) : 428-435
[5]. E. Hobson ,’Network consrained reactive power control using linear programming, ‘ IEEE Transactions on power systems PAS -99 (4) ,pp 868=877, 1980
[6]. K.Y Lee ,Y.M Park , and J.L Oritz, “Fuel –cost optimization for both real and reactive power dispatches” , IEE Proc; 131C,(3), pp.85-93.
[7]. M.K. Mangoli, and K.Y. Lee, “Optimal real and reactive power control using linear programming” , Electr.PowerSyst.Res, Vol.26, pp.1-10,1993.
[8]. C.A. Canizares , A.C.Z.de Souza and V.H. Quintana , “ Comparison of performance indices for detection of proximity to voltage collapse ,’’ vol. 11. no.3 , pp.1441-1450, Aug 1996 .
[9]. S.R.Paranjothi ,andK.Anburaja, “Optimal power flow using refined genetic algorithm”, Electr.PowerCompon.Syst , Vol. 30, 1055-1063,2002.
[10]. D. Devaraj, and B. Yeganarayana, “Genetic algorithm based optimal power flow for security enhancement”, IEE proc-Generation.Transmission and. Distribution; 152, 6 November 2005.
[11]. A.Berizzi, C. Bovo, M. Merlo, and M. Delfanti, “A ga approach to compare orpf objective functions including secondary voltage regulation,” Electric Power Systems Research, vol. 84, no. 1, pp. 187 – 194, 2012.
[12]. C.-F. Yang, G. G. Lai, C.-H. Lee, C.-T. Su, and G. W. Chang, “Optimal setting of reactive compensation devices with an improved voltage stability index for voltage stability enhancement,” International Journal of Electrical Power and Energy Systems, vol. 37, no. 1, pp. 50 – 57, 2012.
[13]. P. Roy, S. Ghoshal, and S. Thakur, “Optimal var control for improvements in voltage profiles and for real power loss minimization using biogeography based optimization,” International Journal of Electrical Power and Energy Systems, vol. 43, no. 1, pp. 830 – 838, 2012.
[14]. B. Venkatesh, G. Sadasivam, and M. Khan, “A new optimal reactive power scheduling method for loss minimization and voltage stability margin maximization using successive multi-objective fuzzy lp technique,” IEEE Transactions on Power Systems, vol. 15, no. 2, pp. 844 – 851, may 2000.
[15]. W. Yan, S. Lu, and D. Yu, “A novel optimal reactive power dispatch method based on an improved hybrid evolutionary programming technique,” IEEE Transactions on Power Systems, vol. 19, no. 2, pp. 913 – 918, may 2004.
[16]. W. Yan, F. Liu, C. Chung, and K. Wong, “A hybrid genetic algorithminterior point method for optimal reactive power flow,” IEEE Transactions on Power Systems, vol. 21, no. 3, pp. 1163 –1169, aug. 2006.
[17]. J. Yu, W. Yan, W. Li, C. Chung, and K. Wong, “An unfixed piecewiseoptimal reactive power-flow model and its algorithm for ac-dc systems,” IEEE Transactions on Power Systems, vol. 23, no. 1, pp. 170 –176, feb. 2008.
[18]. F. Capitanescu, “Assessing reactive power reserves with respect to operating constraints and voltage stability,” IEEE Transactions on Power Systems, vol. 26, no. 4, pp. 2224–2234, nov. 2011.
[19]. Z. Hu, X. Wang, and G. Taylor, “Stochastic optimal reactive power dispatch: Formulation and solution method,” International Journal of Electrical Power and Energy Systems, vol. 32, no. 6, pp. 615 – 621, 2010.
[20]. A.Kargarian, M. Raoofat, and M. Mohammadi, “Probabilistic reactive power procurement in hybrid electricity markets with uncertain loads,” Electric Power Systems Research, vol. 82, no. 1, pp. 68 – 80, 2012.
[21]. J. Kennedy and R.C. Eberhart, “Particle swarm optimization,” in Proc. IEEE Int. Conference on Neural Networks, Piscataway, NJ, pp. 1942–1948, 1995.
[22]. Y. Shi and R. C. Eberhart, “A modified particle swarm optimizer,” in Proc. IEEE Int. Conference on Evolutionary Computation, Piscataway, NJ, pp 69–73, 1998.
[23]. H. Sepehri-Rad and C. Lucas, “A recommender system based on invasive weed optimization algorithm,” in Proc. IEEE Congress on Evolutionary Computation, 2007, pp. 4297–4304.
[24]. B. Dadalipour, A. R. Mallahzadeh, Z. Davoodi-Rad, “Application of the invasive weed optimization technique for antenna configurations,” in Proc. Loughborough Antennas and Propagation Conf., Loughborough, pp. 425-428, Mar. 2008.
[25]. M. Sahraei-Ardakani, M. Roshanaei, A. Rahimi-Kian, C. Lucas, “A Study of Electricity Market Dynamics Using Invasive Weed Optimization,” in Proc. IEEE Symposium on Computational Intelligence and Games, Perth, Australia, Dec. 2008.
[26]. Chaohua Dai, Weirong Chen, Yunfang Zhu, and Xuexia Zhang, “Seeker optimization algorithm for optimal reactive power dispatch,” IEEE Trans. Power Systems, Vol. 24, No. 3, August 2009, pp. 1218-1231.
[27]. J. R. Gomes and 0. R. Saavedra, “Optimal reactive power dispatch using evolutionary computation: Extended algorithms,” IEE Proc.-Gener. Transm. Distrib.. Vol. 146, No. 6. Nov. 1999.
Citation
K. Lenin , "Improved Invasive Weed Optimization for Solving Optimal Reactive Power Problem," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.576-580, 2018.
Design and Implementation of Robocar in Various Modes Using IoT and Image Processing
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.581-587, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.581587
Abstract
As we know the AI and IoT are one of the most emerging domains nowdays . IoT mainly focuses on to make human life more easier i.e. Every person having its own smart phone through which he can do many tasks from anytime anywhere. In today’s world, Artificial Intelligence (AI) has begun to take center stage. One of the most important uses of AI in recent times has been its application in automated vehicle. The recent trend has been moving towards the creation of robotic devices which are capable of making spontaneous and effective decisions in demanding situations.In this paper we have created an Auto-following robo car. Here we have used Raspberry Pi3 Model B which is having many features with their inbuilt library functions like Wifi ,USB connector ,HDMI port, External SD card support. Hence its seems like mini computer. We are also using ultrasonic sensors, Bluetooth sensor, WIFI module, Camera ,gas leak sensor ,humidity sensor along with the Raspberry Pi. Here we are introducing image processing for live video streaming through web page. The main purpose is to provide the service for elderly peoples who lives alone at home when there is nobody at home. It is mainly focuses on image processing, obstacle detection and avoidance , image processing, live streming and through this concepts we can monitor and control the system from our device.
Key-Words / Index Term
Image processing, Auto following ,WIFI, Ultrasonic sensors ,Raspberry Pi
References
[1] Aravinda Ramakrishnan Srinivasan, and Subhadeep Chakraborty Member, IEEE” Path planning with user route preference - A reward surface approximation approach using orthogonal Legendre polynomials” 2016 IEEE International (CASE) Fort Worth, TX, USA, August 21-24, 2016
[2] Noel Sharkey, University of Sheffield,” Cassandra or False Prophet of Doom: AI Robots and War” H i s t o r i e s & F u t u r e s
[3] Martin V. Butz, Matthias J. Linhardt, and Thies D. Lönneker,” Effective Racing on Partially Observable Tracks:Indirectly Coupling Anticipatory EgocentricSensors With Motor Commands” IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 3, NO. 1, MARCH 2011
[4] Min Xu1, Huazhen Zhang1, Hongji Tang1” Design of Motion Control System for Robot Car Based on DSP” 978-1-5090-4657-7/17/$31.00 c 2017 IEEE
[5] Markus Johansson, Keijo Haataja, Jarno Mielikainen, Pekka Toivanen, Department of Computer Science University of Kuopio P.O.Box 1627, FIN-70211 Kuopio, Finland” Designing and Implementing an Intelligent ZigBee and WLAN Enabled Robot Car”
[6] S R Madkar (Assistant Professor), Vipul Mehta, Nitin Bhuwania, Maitri Parida,” Robot Controlled Car Using Wi-Fi Module” Volume 6, Issue 5, May 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering
[7] Tzuu-Hseng S, Chih-Yang Chen, Kai-Chuin Lim,” Combination of Fuzzy Logic Control and Back Propagation Neural Networks for the Autonomous Driving Control of Car-Like Mobile Robot Systems” SICE Annual Conference 2010 August 18-21, 2010, The Grand Hotel, Taipei, Taiwan
[8] Prashanth C R, Sagar T, Naresh Bhat, Naveen D, Sudhir Rao Rupanagudi, R Ashok Kumar,” Obstacle Detection & Elimination of Shadows for an Image Processing Based Automated Vehicle” 2013 (ICACCI)
[9] Brian Paden∗,1 , Michal Cáp ˇ ∗,1,2 , Sze Zheng Yong1 , Dmitry Yershov1 , and Emilio Frazzoli1,” A Survey of Motion Planning and Control Techniques for Self-driving Urban Vehicles” 25 Apr 2016
[10] Hung-Chi Chu*, Ming-Fu Chien, Tzu-Hsuan Lin and Zhi-Jun Zhang,” Design and Implementation of an Auto-Following Robot-Car System for the Elderly” 2016 International Conference on System Science and Engineering (ICSSE) National Chi Nan University, Taiwan, July 7-9, 2016
[11] See discussions, stats, and author profiles for this publication at https://www.researchgate.net/publication/316923208 “WiFi Based Human Tracking Robot”
[12] Huanhuan Yang1, Yinqiu Wang2,∗,Li Gao3,” A General Line Tracking Algorithm Based on Computer Vision” 978-1-4673-9714-8/16/$31.00 c 2016 IEEE
[13] Gurjashan Singh Pannu, Mohammad Dawud Ansari, Pritha Gupta Netaji Subhas,” Design and Implementation of Autonomous Car using Raspberry Pi” International Journal of Computer Applications (0975 – 8887) Volume 113 – No. 9, March 2015
[14] http://www.remoteaccess.org/what-is-a-vnc/
Citation
Namrata Moghe, Vikas Maral, Ashish Panchal, Kiran Baing, ReshmaDhamal, "Design and Implementation of Robocar in Various Modes Using IoT and Image Processing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.581-587, 2018.
EEDS: An Efficient Multi Keyword Search Scheme over Encrypted Data on Mobile Cloud
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.588-593, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.588593
Abstract
With increasing number of websites the Web users are increased with the massive amount of data available on the internet which is provided by the Web Search Engine (WSE). The aim of the WSE is to provide the relevant search result to the user with the behavior of the user click were they performed. WSE provides the relevant result on behalf of the user frequent click based method. From this method, no assurance to the user privacy and also no securities were providing to their data. Hence users were afraid for their private information during the search has become a major barrier. There were many techniques proposed by researchers of those most of them are based on the server side where it encompasses many security concerns. For minimizing the privacy risk this paper addresses a client-side based technique with the combination of a Greedy method to prevent the user data that we applied in Knowledge mining area.
Key-Words / Index Term
Web Search Engine, personalized search, user query logs, content search and privacy preserving
References
[1] D. Huang, “Mobile cloud computing,” IEEE COMSOC Multimedia Communications Technical Committee (MMTC) E-Letter, 2011.
[2] D. M. Blei, A. Y. Ng, and M. I. Jordan, “Latent Dirichlet allocation,” the Journal of Machine Learning Research, vol. 3, 2003, pp. 993–1022.
[3] R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “ Order-preserving encryption for numeric data,” in Proceedings of the 2004 ACM SIGMOD international conference on Management of data. ACM, 2004, pp. 563-574.
[4] D. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on. IEEE, 2000, pp. 44–55.
[5] A. Aizawa, “ An Information-theoretic perspective of tf-IDF measures,” Information Processing and Management, 2003, vol. 39, pp. 45-65.
[6] Y. Chang and M. Mitzenmacher, “ Privacy-preserving keyword searches on remotely encrypted data,” in Applied Cryptography and Network Security. Springer, 2005, pp. 391-421.
[7] A. Swaminathan, Y. Mao, G. Su, H. Gou, A. Varna, S. He, M. Wu, and D. Oard, “ Confidentiality-preserving rank-ordered search,” in Proceedings of the 2007 ACM workshop on Storage security and survivability. ACM 2007, pp. 7-12.
Citation
M. Akhila, K. Madhavi, "EEDS: An Efficient Multi Keyword Search Scheme over Encrypted Data on Mobile Cloud," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.588-593, 2018.
A Review on Hybrid Renewable Energy – Solar, Wind and Hydrogen Energy
Review Paper | Journal Paper
Vol.6 , Issue.6 , pp.594-599, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.594599
Abstract
Now-a-days renewable energy resources like solar, wind and hydrogen must be developed in order to stabilize and reduce carbon dioxide emissions. Efficiency slows down the demand growth so that rising clean energy supplies can make deep cuts in fossil fuel use. Otherwise if energy use grows too first, renewable energy development will chase receding target. Different generations of Photovoltaic (PV) cells with their efficiency rate and scope of their use, in regards to practical application with economic fall outs, were also spell out from the case study. Currently, photovoltaic (PV) panels only have the ability the ability to convert 16% of the sunlight that hits them into electricity. Many experts believe that the solar energy is not efficient enough to be economically sustainable given the cost to produce the panel themselves. Cost of PV being shown to be the main contributor in terms of deciding the economy of PV –based power generation scheme. Presently the economy evaluation of solar PV and solar heating like solar cooker, solar pond etc. were assessed here in regards to their merit and demerit.In concern with different aspects on cost evaluation for on-shore and off-shore wind energy regarding the development of wind firm at particular site were assessed. In order to avail the wind energy value per square meter at a concerned site for a particular wind speed could also be ascertained. A wind firm is a group of wind turbines in the same location used to produce electric power. A large wind farm may consist of several hundred individual wind turbines and cover an extended area of hundreds of square miles. A rigorous study in different corners on the economy of the production of hydrogen in terms of splitting water that is electrolysis was made and it was noted that the ocean thermal energy conversion system generated electricity would be the best cost effective method. On examination it has been found that H2 fuel cell combine as transport fuel, it could be shown that a single 100 MW ocean thermal energy can cater to 30 hydrogen refueling stations, each with 250 vehicle movements per day.Feasibility study is carried out on optimized hybridization of combination of PV –wind with H2, for uninterrupted power supply at different concerned areas.
Key-Words / Index Term
Solar Energy, Wind Energy, Solar Pond, PV module, Wind speed, Hydrogen energy, Electrolysis, Hybrid System
References
[1]. Mohammadi S Modeling the allocation and economic evaluation of PV panels and wind turbines in urban areas. ProcediaEnvironmental Sciences Vol.-22, 333-351,2014.
[2]. American Wind Energy Association, Wind Energy Fact Sheet, 10 steps inbuilding wind farms. windmail@awea.org,2009
[3]. Subhashish Banerjee Application on Solar, Wind and Hydrogen Energy - A Feasibility Reviewfor an Optimised Hybrid Renewable Energy System, J Fundam Renewable Energy Vol.- 5, Issue 6, Appl,2015.
[4]. Sara Riahi,Renewable Energies in MOROCCO: Situation of the Sector, Development Potential of the Sector,IJCSE,Vol.-05,Issue-1,107-114,2017
[5]. Krishnendu Jana, Cost Effective Multi-Purpose Solar Charger Unit for Rural Development,IJCSE.Vol.-04,Issue-06,26-30,2016
[6]. Elam CC, Padro GP, Realizingthe hydrogen future: the International Energy Agency’s efforts to advancehydrogen energy technologies. International Journal of Hydrogen Energy Vol.-28,601-607,2003.
[7]. Symes MD, Decoupling hydrogen and oxygen evolution during electrolytic water splitting using an electron-coupled-proton buffer,Nature chemistry Vol.-5, 403-409,2013.
[8]. Abbasi T, Renewable hydrogen: Prospects and challenges.Renewable and Sustainable Energy Reviews Vol.-15, Issue-06,3034-3040,2011.
[9]. Ball M,The hydrogen economy - Vision or reality? InternationalJournal of Hydrogen Energy Vol.-40,Issue-25, 7903-7919,2015.
[10]. Levin JI,An Analysis of HydrogenProduction from Renewable Electricity Sources. Conference Paper NREL/CP-560-37612 September2005.
Citation
Maya Nayak, "A Review on Hybrid Renewable Energy – Solar, Wind and Hydrogen Energy," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.594-599, 2018.
Identification of Fake Posts in Instagram using Grade based Approach in Online Social Networks
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.600-603, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.600603
Abstract
Now a day’s use of social networking sites like Instagram, Facebook, Twitter, has increased due to its popularity on network for Communication and maintaining relationship among various users. Each user that uses the social networking sites will make its profiles and upload its private information. These social networks users are not aware of numerous security risks included in these networks like privacy and identity theft. To overcome these kind of threats, an attempt has been made in this paper to identify fake posts in instagram social networks. To identify fake posts, grade-based approach is proposed in which grade of fake profiles are distinguished from genuine profiles. The proposed mechanism is analyzed using Weka tool with performance metrics like Precision, recall, F-measure and ROC curves. The results show that proposed mechanism detects more fake posts.
Key-Words / Index Term
Fake Posts, Fake Profile, Instagram, Online Social Networks, and Weka.
References
[1]. ShikhaAgrawal, JitendraAgrawal, ” Survey on Anomaly Detection using Data Mining Techniques”: 19th International Conference on Knowledge Based and Intelligent Information and Engineering Systems, Procedia Computer Science 60, page no. 708 – 713,Year of publication 2015.
[2]. Nandhini, M. and Das, B.B., “An assessment and methodology for fraud detection in online social network”, IEEE Second International Conference on In Science Technology Engineering and Management (ICONSTEM), pp. 104-108,2016.
[3]. Yadav, Neha M., and P. N. Chatur. "Compromised Account Detection and Prevention by Profiling Social Behavior and FASS Key Concept." In Recent Trends in Electrical, Electronics and Computing Technologies (ICRTEECT),International Conference on, pp. 164-168. IEEE, 2017.
[4]. Van Der Walt, Estée, and Jan Eloff. "Using Machine Learning to Detect Fake Identities: Bots vs Humans." IEEE Access 6 (2018): 6540-6549.
[5]. Egele, Manuel, GianlucaStringhini, Christopher Kruegel, and Giovanni Vigna. "Towards detecting compromised accounts on social networks." IEEE Transactions on Dependable and Secure Computing 14, no. 4 (2017): 447-460.
[6]. Dr. SanjeevDhawanandEkta, “Implications of Various Fake Profile Detection Techniques in Social Networks”, IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p-ISSN: 2278-8727, pp:49-55,2016.
[7]. Ekta, “ Reputation Based Technique to Distinguish Posts in Facebook Social Network ”, 5th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), pp:307-312,2016.
[8]. SanjeevDhawan, KulvinderSinghand Sanjay Sagwal, “Identification of Malicious Posts in Facebook Social Networks”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, ISSN: 2456-3307, Vol.2, Issue 5, pp: 43-46, 2017.
[9]. SanjeevDhawan, Kulvinder Singh and Satinder, “Uncovering of Fake Users in Twitter Using Classifiers”, International Journal of Emerging Technologies in Computational and Applied Sciences,ISSSN:2279-0055pp:75-80, 2016.
[10]. Dr Vijay Tiwari, “ Analysis and Detection of Fake Profile Over Social Network ”, International Conference on Computing, Communication and Automation, pp: 175-179, 2017.
[11]. https://towardsdatascience.com/the-random-forest-algorithm-d457d499ffcd?gi=1ae814c17d8d accessed on 22-05-2018.
[12]. https://machinelearningmastery.com/what-is-the-weka-machine-learning-workbench/ accessed on 22-05-2018.
Citation
Sanjeev Dhawan, Kulvinder Singh, Pooja, "Identification of Fake Posts in Instagram using Grade based Approach in Online Social Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.600-603, 2018.
Brain tumour Detection and Classification using APSO Based LLWNN Model and Improved Enhanced Fuzzy C Means Algorithm from Magnetic Resonance image
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.604-615, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.604615
Abstract
This paper presents a novel APSO Based LLWNN (Local Linear Wavelet Neural Network) model for automatic brain tumordetection and classification.The Improved Enhanced fuzzy c means(IEnFCM) algorithm has been proposed for image segmentation and the GLCM (Gray Level Cooccurrence Matrix) feature extraction technique has been used for feature extraction from MR images.This paper aims to use the hybrid models and algorithms for classification and segmentation of brain tumors from the MR images. The extracted features have been fed as input to the proposed APSO based LLWNN model for classification of Beignin and Malignant tumors. In this research work the proposed LLWNN model weights are optimised by using APSO training which will provide unique solution to relief the hectic task of radiologist from manual detection of brain tumors from MR Images. Also the centersof the LLWNN model are also chosen by the Enhanced Fuzzy C Means algorithm and updated by the APSO algorithm. The results of proposed PSO based LLWNN model has been compared with PSO-LLWNN model, APSO-RBFNN and PSO-RBFNN model and the comparison results also presented in this paper. The experimental results obtained from the proposed model shows better classification results as compared to the existing models proposed.
Key-Words / Index Term
Fuzzy c means algorithm (FCM), Enhanced fuzzy c means(EnFCM), RBFNN,LLWNN(Local Linear Wavelet Neural Network),APSO(Accelerated Particle Swarm Optimization),PSO
References
[1] Ding Y, Fu X , “Kernel-based fuzzy c-means clustering algorithm based on genetic algorithm”, Neurocomputing, 188: 233–238, 2016., doi.org/10.1016/j.neucom.2015.01.106.
[2] J. Mehena, M. C. Adhikary , “Medical Image Segmentation and Detection of MR Images Based on Spatial Multiple-Kernel Fuzzy C-Means Algorithm” World Academy of Science, Engineering and Technology International Journal of Biomedical and Biological Engineering Vol:9, No:6, 2015.
[3] D. Mahapatra. “Semi-supervised learning and graph cuts for consensus based medical image segmentation,” Pattern Recognit., vol. 63, pp. 700709, Mar. 2017. doi.org/10.1016/j.patcog.2016.09.030
[4] Y.A. Tolias and S.M. Panas, “On applying spatial constraints in fuzzy image clustering using a fuzzy rule-based system”, IEEE Signal Processing Lett., 5 (1998) 245–247.
[5] Y.A. Tolias and S.M. Panas, “Image segmentation by a fuzzy clustering algorithm using adaptive spatially constrained membership functions”, IEEE Trans. Syst.,Man, Cybern. A., 28 (1998) 359–369.
[6] A.W.C. Liew, S.H. Leung, W.H. Lau, “Fuzzy image clustering incorporating spatial continuity”, Inst. Elec. Eng. Vis. Image Signal Process., 147 (2000) 185–192.
[7] M.N. Ahmed, S.M. Yamany, N. Mohamed, A.A. Farag, T. Moriarty, “A modified fuzzy C-means algorithm for bias field estimation and segmentation of MRI data”, IEEE Trans. Med. Imaging., 21(2002) 193–199.
[8] L. Szilágyi, Z. Benyó, S.M. Szilágyii, H.S. Adam, “MR Brain Image Segmentation Using an Enhanced Fuzzy C-Means Algorithm”, in 25th Annual International Conference of IEEE EMBS (2003)17-21.
[9] S.C. Chen and D.Q. Zhang, “Robust Image Segmentation Using FCM With Spatial Constraints Based on New Kernel-Induced Distance Measure”, IEEE Trans. Syst.,Man, Cybern. B., 34(4) (2004) 1907-1916
[10] T.Gopi Krishna, K.V.N. Sunitha, S. Mishra, “Detection and Classification of Brain Tumor from MRI Medical Image using Wavelet Transform and PSO based LLRBFNN Algorithm” International Journal of Computer Sciences and Engineering, Volume-6, Issue-1, E-ISSN: 2347-2693,2018.
[11] G. C. Karmakar and L. S. Dooley, “A generic fuzzy rule based image segmentation algorithm”, Pattern Recognition Letters, 23(10) (2002) 1215-1227.
[12] A. Nyma, M. Kang, Y. Kwon, C. Kim and J. M. Kim, “A Hybrid Technique for Medical Image Segmentation”, Journal of Biomedicine and Biotechnology, Vol. 12, pp. 1-7, 2012.
[13] M. S. Atkins and B. T. Mackiewich, “Fully Automatic Segmentation of the Brain in MRI”, IEEE Tran. On medical imaging, Vol. 17 (1), pp.98107, 1998.
[14] Omid Jamshidi and Abdol Hamid Pilevar, “Automatic Segmentation of Medical Images using Fuzzy c-Mean and Genetic Algorithm”, Journal of Computational Medicine, Vol. 2(13), pp.91-96, 2013.
[15] M. Brummer, R. Mersereau, R. Eisner, and R. Lewine, “Automatic detection of brain contours in MRI data sets”, IEEE Trans. Medical Imaging., Vol.1(4),pp.153–166, 1993.
[16] A. Hammers, “Automatic anatomical brain MRI segmentation combining label propagation and decision fusion”, NeuroImage, Vol. 33(1), pp.115–126, 2006.
[17] Chen X., Nguyen B.P., Chui Ch., Ong S., 2016, Automated brain tumor segmentation using kernel dictionary learning and superpixel-level features, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Budapest, 002547 - 002552
[18] Khaled Abd-Ellah M., Ismail Awad A., Khalaf A. M., HamedF. A.,2016, Design and implementation of a computer-aided diagnosis system for brain tumor classification, 2016 28th International Conference on Microelectronics (ICM), Cairo, Egypt, 73 - 76
[19] Lang R., Zhao L., Jia K., 2016, Brain tumor image segmentation based on convolution neural network, 2016 9th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), Datong, China, 1402 - 1406 .
[20] Kaur, T., Saini, B. S., & Gupta, S. (2016). Optimized Multi Threshold Brain Tumor Image Segmentation Using Two Dimensional Minimum Cross Entropy Based on Co-occurrence Matrix. In Medical Imaging in Clinical Applications (pp. 461-486). Springer International Publishing.
[21] Verma, A. K., & Saini, B. S. Alexander, “Fractional integral filtering of wavelet coefficients for image denoising”. Signal & Image Processing : An International Journal (SIPIJ) Vol.6, No.3, June 2015
[22] El-Naqa, I., Yang, Y., Wernick, M.N., Galatsanos, N.P., Nishikawa, R.M,2002, A support vector machine approach for detection of microcalcifications, IEEE Trans. Med. Imag., 21, (12), 1552–1563.
[23] Kimia rezaei and Hamed agahi , “Malignant and benign brain tumor segmentation and classification using svm with weighted kernel width”, Signal & Image Processing : An International Journal (SIPIJ) Vol.8, No.2, April 2017
[24] Liao Y.-Y., Tsui, P.-H., Yeh, C.-K.,2009, Classification of benign and malignant breast tumors by ultrasound B-scan and nakagami-based images, J. Med. Biol. Eng.30, (5), 307–312.
[25] A. Demirhan, M. Toru, and I. Guler, “Segmentation of tumor and edema along with healthy tissues of brain using wavelets and neural networks,”IEEE Journal of Biomedical and Health Informatics,vol.19,no.4,pp.1451–1458,2015.
[26] S. Damodharan and D. Raghavan, “Combining tissue segmentation and neural network for brain tumor detection,” International Arab Journal of Information Technology, vol. 12, no. 1, pp. 42–52, 2015.
[27] M. Alfonse and A.-B. M. Salem, “An automatic classification of brain tumors through MRI using support vector machine,” Egyptian Computer Science Journal, Vol. 40, pp. 11–21, 2016.
[28] A. Chaddad, “Automated feature extraction in brain tumor by magnetic resonance imaging using gaussian mixture models,” International Journal of Biomedical Imaging, vol. 2015, Article ID 868031, 11 pages, 2015.
[29] E. A. Zanaty, “Determination of gray matter (GM) and white matter (WM) volume in brain magnetic resonance images (MRI),” International Journal of Computer Applications, vol. 45, pp. 16–22, 2012
[30] T. Torheim, E. Malinen, K. Kvaal et al., “Classification of dynamic contrast enhanced MR images of cervical cancers using texture analysis and support vector machines,” IEEE Transactions on Medical Imaging, vol. 33, no. 8, pp. 1648–1656, 2014.
[31] J.Yao,J.Chen,andC.Chow,“Breast tumor analysis in dynamic contrast enhanced MRI using texture features and wavelet transform,”IEEE Journal on Selected Topics in Signal Processing, vol.3,no.1,pp.94–100,2009.
[32] P. Kumar and B. Vijayakumar, “Brain tumour Mr image segmentation and classification using by PCA and RBF kernel based support vector machine,” Middle-East Journal of Scientific Research, vol. 23, no. 9, pp. 2106–2116, 2015.
[33] N. Sharma, A. Ray, S. Sharma, K. Shukla, S. Pradhan, and L. Aggarwal, “Segmentation and classification of medical images using texture-primitive features: application of BAM-type artificial neural network,” Journal of Medical Physics, vol. 33, no. 3, pp. 119–126, 2008
[34] W. Cui, Y. Wang, Y. Fan, Y. Feng, and T. Lei, “Localized FCM clustering with spatial information for medical image segmentation and bias field estimation,” International Journal of Biomedical Imaging, vol. 2013, Article ID 930301, 8 pages, 2013.
[35] G. Wang, J. Xu, Q. Dong, and Z. Pan, “Active contour model coupling with higher order diffusion for medical image segmentation,” International Journal of Biomedical Imaging, vol. 2014, Article ID 237648, 8 pages, 2014.
[36] A. Chaddad, “Automated feature extraction in brain tumor by magnetic resonance imaging using gaussian mixture models,” International Journal of Biomedical Imaging, vol. 2015, Article ID 868031, 11 pages, 2015.
[37] S. N. Deepa and B. Arunadevi, “Extreme learning machine for classification of brain tumor in 3DMR images,” Informatologia, vol. 46, no. 2, pp. 111–121, 2013.
[38] J. Sachdeva, V. Kumar, I. Gupta, N. Khandelwal, and C. K. Ahuja,“Segmentation, feature extraction,and multiclass brain tumor classification,” Journal of Digital Imaging, vol. 26, no. 6, pp.1141–1150,2013.
[39] N. B. Bahadure, A. K. Ray, H. P. Thethi, “Image Analysis for MRI Based Brain Tumor Detection and Feature Extraction Using Biologically Inspired BWT and SVM” Hindawi International Journal of Biomedical Imaging, Volume 2017, Article ID 9749108, https://doi.org/10.1155/2017/9749108.
[40] M.R.Senapati, P.K.Dash, “Intelligent Systems Based on Local Linear Wavelet Neural Network and Recursive Least Square Approach for Breast Cancer Classification”, Artificial Intelligence and Review, Springer, ISSN 0269-2821. vol 39, issue 2, pp 151-163, February 2013, DOI: 10.1007/s10462-011-9263-5.
[41] P. Mohanaiah, P. Sathyanarayana, L. GuruKumar, “Image texture feature extraction using GLCM approach” International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013
[42] M. Singh Choudhry, Rajiv Kapoor “Performance Analysis of Fuzzy C-Means Clustering Methods for MRI Image Segmentation” Twelfth International Multi-Conference on Information Processing-2016 (IMCIP-2016), Science Direct, Procedia Computer Science 89 ( 2016 ) 749 – 758
[43] Songcan Chen, Daoqiang Zhang, “Robust Image Segmentation using FCM with Spatial Constraints Based on New Kernel-Induced Distance Measure”, IEEE Transaction on Systems, Man and Cybernetics-Part B, vol. 34(4), August (2004).
[44] S. R. Kannana, S. Ramathilagamb, R. Devia and E. Hinesc, Strong Fuzzy C-Means in Medical Image Data Analysis, The Journal of Systems and Software, pp. 2425–2438, (2012).
[45] A. Zexuan Ji, Yong Xiab, Qiang Chena, Quansen Suna, Deshen Xiaa and David Dagan Feng, “Fuzzy C-Means Clustering with Weighted Image Patch for Image Segmentation”, Applied Soft Computing, vol. 12, pp. 1659–1667, (2012).
[46] M.N. Ahmed, S.M. Yamany, N. Mohamed, A.A. Farag, T. Moriarty, A modified fuzzy C-means algorithm for bias field estimation and segmentation of MRI data, IEEE Trans. Med. Imaging., 21(2002) 193–199.
[47] M. N. Ahmed, S.M. Yamany, N.A. Mohamed, A.A. Farag, T. Moriarty, Bias field estimation and adaptive segmentation of MRI data using modified fuzzy C-means algorithm , in Proc. IEEE Int. Conf. ComputerVision and Pattern Recogn., 1 (1999) 250–255.
[48] S.C. Chen and D.Q. Zhang, Robust Image Segmentation Using FCM With Spatial Constraints Based on New Kernel-Induced Distance Measure, IEEE Trans. Syst.,Man, Cybern. B., 34(4) (2004) 1907-1916
[49] Weiling Cai, Songcan Chen, Daoqiang Zhang “Fast and Robust Fuzzy C-Means Clustering Algorithms Incorporating Local Information for Image Segmentation”, Department of Computer Science & Engineering, Nanjing University of Aeronautics & Astronautics Nanjing 210016, P.R. China.
[50] L. Szilágyi, Z. Benyó, S.M. Szilágyii, H.S. Adam, MR Brain Image Segmentation Using an Enhanced Fuzzy C-Means Algorithm, in 25th Annual International Conference of IEEE EMBS (2003)17-21.
[51] Fahd Mohsen, Mohiy Hadhoud, Kamel Mostafa and Khalid Amin, “A New Image Segmentation Method Based on Particle Swarm Optimization,” The International Arab Journal of Information Technology, Vol. 9, No.5, September 2012.
[52] Xin-She Yang, Suash Deb and Simon Fong, “Accelerated Particle Swarm Optimization and Support Vector Machine for Business Optimization and Applications”, Communications in Computer and Information Science, Vol. 136, Springer, pp. 53-66 (2011).
[53] Serene Bhaskaran, Ruchi Varma, Dr.Jayanta Ghosh, “ A Comparative study of GA, PSO and APSO : Feed point optimization of a patch antenna” International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013
[54] P. K. Nayak, S. Mishra, P. K. Dash, Ranjeeta Bisoi, “Comparison of modified teaching–learning-based optimization and extreme learning machine for classification of multiple power signal disturbances”, Neural Computing & Application,Springer,2016. DOI 10.1007/s00521-015-2010-0
[55] M.R.Senapati, I.Vijaya and ,P.K.Dash “Rule Extraction by Training Radial Basis Functional Neural Network with Particle Swarm Optimization” published in American Journal of Science, Science Publication, ISSN: 1549-3636, vol 3, issue 8, pp.592-599,2007
[56] A. Patra, S. Das, S. N. Mishra, M. R. Senapati , “An adaptive local linear optimized radial basis functional neural network model for financial time series prediction” Neural Computing and Applications, vol.28, Issue 1, January 2017 ,Pages 101-110, doi:10.1007/s00521-015-2039-0.
[57] Yuehui Chen, Jiwen Dong , Bo Yang and Yong Zhang, A Local Linear Wavelet Neural Network, Proceedings of the 5th World Congress on Intelligent Control and Automation, June 15-19, 2004, Hangzhou, P.R. China
Citation
Premananda Sahu,Satyasis Mishra, M.Vamsi Krishna,Tadesse Hailu Ayane, "Brain tumour Detection and Classification using APSO Based LLWNN Model and Improved Enhanced Fuzzy C Means Algorithm from Magnetic Resonance image," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.604-615, 2018.
V&V Analysis of Composite Web Service using WS Simulator for Trust Management in WS Lifespan
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.616-624, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.616624
Abstract
Validation and Verification in Composite web service development process is basic need to provide trust in between developers who are handling this development process using cloud service through different geographical locations. In this research work, V&V process simulated through Web Service Simulator using Asp. Net Web Services controlled by Web application. In continuity, complete demonstration of customers and web service interaction is simulated. This research work answers the questions as How data has been verified and validated so that it does not create any threats for the developers system, How intruder have not access to data without complete authentication. The research is also demonstrates the role based limitation in web service development. Web Services Simulator (WSS) used the concept of SOAP and it monitored and controlled security threats through a web application that are imposed via attackers at several points..
Key-Words / Index Term
Web Services, Composition of Web Services, SOAP , Validation and Verification, WSDL, UDDI, Web security Attacks, Threats Classification
References
[1] M. D. Priya, A. Lavanya, "Intrusion Detection System Using Raspberry Pi Honeypot in Network Security", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4 Issue 3, pp. 41-45, January-February 2018.
[2] E. Manigandan, C. Kalaiarasi, E. Manigandan, Prof. C. Kalaiarasi, "Cryptography in Cloud Computing : A Basic Approach to confirm Security in Cloud", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4 Issue 3, pp. 58-63, January-February 2018.
[3] W. T. Tsai, Y. Chen, R. Paul N. Liao, and H. Huang, “Cooperative and Group Testing in Verification of Dynamic Composite Web Services”, in Workshop on Quality Assurance and Testing of Web-Based Applications, in conjunction with COMPSAC, September 2004, pp.170-173.
[4] Vicente Aguilera Diaz, Robert Auger, Amit Klein, Dennis Groves, Cesar, “MX Injection : Capturing and Exploiting Hidden Mail Servers”, OWASP Spain chapter meeting of June 16th, 2006.
[5] TasosLaskos, “Arachni Framework v1.4 &WebUI v0.5.10”, Web Application Security Scanner, Feb 09 2016,01:04AM,http://www.securityfocus.com/archive/107/537488/30/0/threaded
[6] “Common Vulnerabilities and Exposures, The Standard for Information Security Vulnerability Names”, sponsored by US-CERT at the U.S. Department of Homeland Security. Copyright © 1999–2016, The MITRE Corporation. CVEhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0800
[7] Kumar, Vipin, Srivastava, Jaideep, Lazarevic, Aleksandar, “Managing Cyber threats: Issues, Approaches and Challenges”, Springer Publishers,2005, ISBN 978-0-387-24226-2.
[8] S. K. Singh, “Database systems: Concepts, Design and applications”, Pearson Education India, 2011, ISBN 978-81-317-6092-5.
[9] Web Application Security Consortium.http://www.webappsec.org
[10] Roberto Chinnici, Hugo Haas, Amelia A. Lewis, Jean-Jacques Moreau, David Orchard,SanjivaWeerawarana, “Web Services Description Language (WSDL) Version 2.0 Part 2”: AdjunctsW3C Recommendation 26 June 2007.Copyright © 2007 W3C® (MIT, ERCIM, Keio)
[11] Kung-Kiu Lau and Cuong Tran, “Composite Web Services”, Chapter: Emerging Web Services Technology, Volume II, Part of the series:Whitestein Series in Software Agent Technologies and Autonomic Computing, pp 77-95
[12] DimkaKarastoyanova and Alejandro Buchmann, “Development Life Cycle of Web Service-based Business Processes. Enabling Dynamic Invocation of Web Services at Run Time”, ICSOC’05: The 3rd International Conference On Service Oriented Computing, 2004.
[13] Karthikeyan Bhargavan, Ricardo Corin,CedricFournet,Andrew D. Gordon, “Secure Sessions for Web Services”,ACM Workshop on Secure Web Services, October 29, 2004, Fairfax VA,USA.Copyright 2004 ACM 1-58113-973-X/04/0010
[14] Muhammad Ahtisham Aslam, Jun Shen,Michael Herrmann, “An Integration Life Cycle for Semantic Web Services Composition”,11th International Conference on Computer Supported Cooperative Work in Design, 2007, E-ISBN :1-4244-0963-2, Print ISBN:1-4244-09624 DOI:10.1109/CSCWD.2007.4281485, Page(s):490 – 495.
[15] Zhaohao Sun, Dong Dong, Jun Han, “A Demand Driven Web Service Lifecycle”, New Trends in Information and Service Science, 2009. NISS `09, DOI: 10.1109/NISS.2009.135
[16] Oracle® Application Server Web Services Developer`sGuide, 10g (10.1.3.5.0), Part Number E13982-01
[17] F. Curbera, M. Duftler, R. Khalaf, W. Nagy, N. Mukhi,and S.Weerawarana, “Unraveling the Web Services Web: An Introduction to SOAP, WSDL, and UDDI,” IEEE Internet Computing, vol. 6,no. 2, pp. 86-93, Mar./Apr. 2002
[18] Martin Gudgin, Marc Hadley,Noah Mendelsohn, Jean-Jacques Moreau, Henrik Frystyk Nielsen, Anish Karmarkar, Yves Lafon, “SOAP Version 1.2 Part 1: Messaging Framework (Second Edition)”, W3C Recommendation 27 April 2007.
Citation
G. Raj, M. Mahajan, D. Singh, "V&V Analysis of Composite Web Service using WS Simulator for Trust Management in WS Lifespan," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.616-624, 2018.
Advanced Fireworks Algorithm for Solving Optimal Reactive Power Dispatch Problem
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.625-631, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.625631
Abstract
This paper presents an Advanced Fireworks Algorithm (AFA) for solving optimal reactive power dispatch problem. Fireworks algorithm (FWA) is inspired by the fireworks explosion in the sky at night. When a firework bursts, a shower of sparks appears around it. In this way, the neighboring area of the firework is explored. By directing the amplitude of the explosion, the capability of confined exploration for Advanced Fireworks Algorithm (AFA) is guaranteed. The way of fireworks algorithm probing the neighboring area can be further enriched by differential mutation operator. In order to assess the efficiency of proposed algorithm, it has been tested on IEEE 30 system and compared to other standard algorithms. The simulation results demonstrate worthy performance of the Advanced Fireworks Algorithm (AFA) in solving optimal reactive power dispatch problem.
Key-Words / Index Term
optimal reactive power, Transmission loss, Fireworks algorithm, differential mutation operator.
References
[1] M. A. Abido, J. M. Bakhashwain, “A novel multi objective evolutionary algorithm for optimal reactive power dispatch problem,” in proc. Electronics, Circuits and Systems conf., vol. 3, pp. 1054-1057, 2003.
[2] W. N. W. Abdullah, H. Saibon, A. A. M. Zain, K. L. Lo, “Genetic Algorithm for Optimal Reactive Power Dispatch,” in proc. Energy Management and Power Delivery conf., vol. 1, pp. 160-164, 1998.
[3] K. Y. Lee, Y. M. Park, J. L. Ortiz, “Fuel-cost minimisation for both real and reactive-power dispatches,” in proc. Generation, Transmission and Distribution conf., vol. 131, pp. 85-93, 1984.
[4] S. Granville, “Optimal Reactive Dispatch Trough Interior Point Methods,” IEEE Trans. on Power Systems, vol. 9, pp. 136-146, 1994.
[5] N. I. Deeb, S. M. Shahidehpour, “An Efficient Technique for Reactive Power Dispatch Using a Revised Linear Programming Approach,” Electric Power System Research, vol. 15, pp. 121-134, 1988.
[6] N. Grudinin, “Reactive Power Optimization Using Successive Quadratic Programming Method,” IEEE Trans. on Power Systems, vol. 13, pp. 1219-1225, 1998.
[7] M. A. Abido, “Optimal Power Flow Using Particle Swarm Optimization,” Electrical Power and Energy Systems, vol. 24, pp. 563-571, 2002.
[8] A. A. Abou El Ela, M. A. Abido, S. R. Spea, “Differential Evolution Algorithm for Optimal Reactive Power Dispatch,” Electric Power Systems Research, vol. 81, pp. 458-464, 2011.
[9] V. Miranda, N. Fonseca, “EPSO-Evolutionary Particle Swarm Optimization, A New Algorithm with Applications in Power Systems,” in Proc. of Transmission and Distribution conf., vol. 2, pp. 745-750,2002.
[10] C.A. Canizares , A.C.Z.de Souza and V.H. Quintana , “ Comparison of performance indices for detection of proximity to voltage collapse ,’’ vol. 11. no.3 , pp.1441-1450, Aug 1996 .
[11] Y. Tan and Y. Zhu, “Fireworks algorithm for optimization,” in Advances in Swarm Intelligence, pp. 355–364, Springer, 2010.
[12] A. Janecek and Y. Tan, “Iterative improvement of the multiplicative update nmf algorithm using nature-inspired optimization,” in Natural Computation (ICNC), 2011 Seventh International Conference on, vol. 3, pp. 1668–1672, IEEE, 2011.
[13] A. Janecek and Y. Tan, “Swarm intelligence for non-negative matrix factorization,” International Journal of Swarm Intelligence Research (IJSIR), vol. 2, no. 4, pp. 12–34, 2011.
[14] A. Janecek and Y. Tan, “Using population based algorithms for initializing nonnegative matrix factorization,” in Advances in Swarm Intelligence, pp. 307–316, Springer, 2011.
[15] H. Gao and M. Diao, “Cultural firework algorithm and its application for digital filters design,” International Journal of Modelling, Identification and Control, vol. 14, no. 4, pp. 324–331, 2011.
[16] W. He, G. Mi, and Y. Tan, “Parameter optimization of local concentration model for spam detection by using fireworks algorithm,” in Advances in Swarm Intelligence, pp. 439–450, Springer, 2013.
[17] R. Storn and K. Price, “Differential evolution–a simple and efficient heuristic for global optimization over continuous spaces,” Journal of global optimization, vol. 11, no. 4, pp. 341–359, 1997.
[18] J. Brest, S. Greiner, B. Boskovic, M. Mernik, and V. Zumer, “Selfadapting control parameters in differential evolution: A comparative study on numerical benchmark problems,” Evolutionary Computation, IEEE Transactions on, vol. 10, no. 6, pp. 646–657, 2006.
[19] S. Das and P. N. Suganthan, “Differential evolution: A survey of the state-of-the-art,” Evolutionary Computation, IEEE Transactions on,vol. 15, no. 1, pp. 4–31, 2011.
[20] R. Mallipeddi, P. N. Suganthan, Q.-K. Pan, and M. F. Tasgetiren,“Differential evolution algorithm with ensemble of parameters and mutation strategies,” Applied Soft Computing, vol. 11, no. 2, pp. 1679–1696, 2011.
[21] J. Dominguez and G. T. Pulido, “A comparison on the search of particle swarm optimization and differential evolution on multi-objective optimization,” in Evolutionary Computation (CEC), 2011 IEEE Congress on, pp. 1978–1985, IEEE, 2011.
[22] Y. Wang, Z. Cai, and Q. Zhang, “Differential evolution with composite trial vector generation strategies and control parameters,” Evolutionary Computation, IEEE Transactions on, vol. 15, no. 1, pp. 55–66, 2011.
[23] S. Biswas, S. Kundu, S. Das, and A. V. Vasilakos, “Teaching and learning best differential evoltuion with self-adaptation for real parameter optimization,” in Evolutionary Computation (CEC), 2013 IEEE Congress on, pp. 1115–1122, IEEE, 2013.
[24] S. Biswas, S. Kundu, and S. Das, “An improved parent-centric mutation with normalized neighborhoods for inducing niching behavior in differential evolution,” IEEE Transactions on Cybernetics, 2014.
[25] S. Biswas, S. Kundu, D. Bose, S. Das, and P. Suganthan, “Synchronizing differential evolution with a modified affinity-based mutation framework,” in Differential Evolution (SDE), 2013 IEEE Symposium on, pp. 61–68, IEEE, 2013.
[26] S. Zheng, A. Janecek, and Y. Tan, “Enhanced fireworks algorithm,” IEEE Congress on Evolutionary Computation, pp. 2069–2077, 2013.
[27] Wu Q H, Ma J T. “Power system optimal reactive power dispatch using evolutionary programming”, IEEE Transactions on power systems 1995; 10(3): 1243-1248 .
[28] S.Durairaj, D.Devaraj, P.S.Kannan ,“Genetic algorithm applications to optimal reactive power dispatch with voltage stability enhancement”, IE(I) Journal-EL Vol 87,September 2006.
[29] D.Devaraj , “Improved genetic algorithm for multi – objective reactive power dispatch problem”, European Transactions on electrical power 2007 ; 17: 569-581.
[30] P. Aruna Jeyanthy and Dr. D. Devaraj “Optimal Reactive Power Dispatch for Voltage Stability Enhancement Using Real Coded Genetic Algorithm”, International Journal of Computer and Electrical Engineering, Vol. 2, No. 4, August, 2010 1793-8163.
669
Citation
K. Lenin, "Advanced Fireworks Algorithm for Solving Optimal Reactive Power Dispatch Problem," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.625-631, 2018.
A Dynamic Key Based Authentication Using Vehicular Ad-Hoc Network Communication
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.632-636, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.632636
Abstract
A vehicular Ad-hoc network is an ad-hoc network of vehicles supported by fixed infrastructure. It is characterized by a highly dynamic topology with vehicles moving in a restricted road environment with different speeds. Vehicles are equipped with wireless communication devices known as On-Board Units (OBU) which enables them to communicate with other vehicles and Roadside Units. Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) are two typical modes of vehicle communication in VANETs. Envisioned applications such as traffic accident prevention, battlefield control commands transmission and emergency coordination rescue arose a great deal of academic and industrial research on Vehicular Ad hoc Networks. In this research, developed a new security scheme called elliptic curve cryptography and ESSAP uses an algorithm to create the encrypted string. Using the encrypted string elliptic curve cryptography generated a docket, which will be transmitted from one node to another. The receiver node may desire to know that the docket has not been attacked in transit. In proposed research from our usage demonstrate that elliptic curve cryptography can ensure multicast source legitimacy and fundamentally upgrade the effectiveness of verification for multicast correspondence in VANETs, and our execution demonstrates that elliptic curve cryptography plan can be effortlessly conveyed in genuine vehicular ad-hoc network condition.
Key-Words / Index Term
Elliptic curve cryptography, Key Generation, Security
References
[1] X. lin, X. Sun, X. Wang, C. Zhang, P. Ho, X. Shen.“TSVC: Timed Efficient and Secure Vehicular Communications with Privacy Preserving.” IEEE Transactions on Wireless Communications, to appear.
[2] Studer, F.Bai, B. Bellur, and A. Perrig, “Flexible, extensible, and efficient VANET authentication”, Proceeding of the 6th Annual Conference on Embedded Security in Cars (escar 2008), Noverbem 2008.
[3] A.Perrig, R.Canneti, D.Song and J.D. Tygar. “Efficient and Secure Source Authentication for Multicast” In Network and Distributed System Security Symposium, NDSS ’01, Februray 2001.
[4] Chaurasia, B.K., Verma, S., Bhasker, S.M.: Message broadcast in VANETs using Group Signature. In: Fourth International Conference on Wireless Communication and Sensor Networks, pp.131-136 (2008).
[5] K.Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki. CARAVAN: providing location privacy for VANET. In Workshop on Embedded Security in Cars (ESCAR), 2005.
[6] M. Raya, A. Aziz, and J.-P. Hubaux, “Efficient secure aggregation in VANETs” in ACM Workshop on Vehicular Ad hoc Networks (VANET), 2006.
[7] H.-J. Reumerman, M. Roggero, and M. Ruffini. “The application-based clustering concept and requirements for intervehicle networks.” IEEE Communications magazine, 43(4): 108-113, April 2005.
[8] H. Harney and C. Muckenhirn. Group Key Management Protocol (GKMP) architecture.RFC 2094, 1997.
[9] X.Hong, M.Gerla, G.Pei, and C.Chiang. A group mobility model for ad hoc wireless networks. In Proceedings of the ACM International Workshop on Modeling and Simulation of Wireless and Mobile Systems (MSWiM), August 1999.
Citation
R. Suganya, "A Dynamic Key Based Authentication Using Vehicular Ad-Hoc Network Communication," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.632-636, 2018.
Study of Audible Frequency Levels in Mapping Phase of Blue Hearing System using MATLAB GUI
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.637-641, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.637641
Abstract
The present study provides the study of audible frequency levels for blue hearing system for any patient during mapping session. Blue Hearing System[1] is an alternative system to provide the listening sense for deaf and mute patients. Here the neural response telemetry data has been compared with the comfort level data for the user for all the electrodes present in the inner instrument of BHS. The study significantly concludes that inner most and outer most electrodes have less difference between threshold and comfort level in comparison to middle electrodes of the spiral in the instrument. The analytical part and the graphical user interface has been designed and implemented using MATLAB.
Key-Words / Index Term
Blue Hearing System (BHS), Neural Response Telemetry(NRT), Mapping
References
[1] P. Saxena, “A Note on Blue Hearing System (BHS) to Develop Speech in Deaf and Mute People”, Recent Research in Science and Technology, Vol. 2, Issue No. 9, pp. 04-07, 2010.
[2] V. R. Pradeep, “A comparative Study on the Differences between NRT and Behavioral Mapping in Cochlear Implant- A Single Case Study”, Global Journal of Otolaryngology, Vol.9 Issue No.4 , pp.01-04,2017.
[3] Rosenzweig Elizabeth, “Mapping a Cochlear Implant”, Auditory Verbal Therapy, October 24, 2011, https://auditoryverbaltherapy.net/2011/10/24/mapping-a-cochlear-implant/
[4] G. Kokturk , “Wavelet based Speech Strategy in Cochlear Implant”, Cochlear Implant Research Updates, pp. 39-58, April 2012, https://www.intechopen.com/books/cochlear-implant-research-updates/wavelet-based-speech-strategy-in-cochlear-implant
[5] H. Ali ,J.H.Noble, R.N. Gifford, R.F. Labadie ,B. M. Dawant, J. H.L .Hansen, E. Tobey, “Image-Guided Customization of Frequency-Place Mapping in Cochlear Implants”, Proceedings of IEEE conference ICASSP, pp. 5843-5847, 2015.
[6] R. Mittal, S.S. Panwar , S. Nair, V.R. Sinha , A. V. Ramesh , A. Nilkanthan and P. Raj , “Mapping of Paediatric Cochlear Implant Recipients using EABR as a Tool”Journal of Otology & Rhinology,Vol. 4, Issue No. 2, pp. 01-04, 2015
[7] Stakhovskaya O., Sridhar D., Bonham B.H., Leake P.A., “FrequencyMap for the Human Cochlear Spiral Ganglion: Implications for Cochlear Implants”, Journal of the association for research in Otolaryngology, JARO 8: 220-233, 2007.
Citation
Parul Saxena, Ashish Mehta, "Study of Audible Frequency Levels in Mapping Phase of Blue Hearing System using MATLAB GUI," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.637-641, 2018.