A Novel Study of Bee Colony Optimization Algorithms for their Applications into Various Domains INTRODUCTION The Bee Colony Optimization (BCO) is a technique based on the mutual understanding of the natural bees in food foraging process. It is a population based search algorithm for optimizing numerical problems. Bees are classic example of teamwork experience, coordination and synchronization. The way they work is remarkable. They carry out a kind of neighborhood search combined with global search
Hybrid Cuckoo ABC Algorithm for optimistic job scheduling in Heterogeneous Computing Systems Amit Chhabra1, Harwinder Kaur2 1 Guru Nanak Dev University, Amritsar Punjab, India Harwindersaini16@gmail.com, Amit.cse@gndu.ac.in Abstract Cloud Computing is now extremely popular because of its wide variety of Applications through internet. The particular service based approaches which are aware from the server selection through the cloud can easily progress toward the cost and performance of
Automated Test Data Generation Using Genetic Algorithms 1 Madhu Jain, Associate Professor Department of Mathematics, IIT Roorkee 2 Manish Saraswat, Assistant Professor, Dept. of MCA, Geetanjali Institute of Technical Studies, Udaipur, Email: manishsaraswat24@gmail.com Abstract: Software testing is one of essential activity in software engineering, which determines the software quality and reliability. For effective software testing valid and suitable test data
A Survey Paper on Exact and Hybrid String Matching Algorithms Mohit Gupta UFID 90991438 Abstract and Introduction A string matching algorithm takes an input pattern and matches it against a given text. The algorithm aligns the pattern with the beginning of the text and keeps shifting the pattern forward until a match is found or end of the text is reached. String matching has a variety of applications like intrusion detection systems, information security, detecting plagiarism, bioinformatics
Optimal Power Flow Using Differential Evolution Algorithm S.Vidya Sagar Reddy Dr.P.Venkata Prasad, Professor Department of Electrical and Electronics Engineering Department of Electrical and Electronics Engineering Chaitanya Bharathi Institute Of Technology(Autonomous) Chaitanya Bharathi Institute Of Technology(Autonomous) Hyderabad, India Hyderabad, India vidyasagar.sabbella@gmail.com pvp_reddy@yahoo.co.uk Abstract— This paper presents an efficient and reliable evolutionary based approach to solve
In the next subsections, the proposed genetic algorithm of protein tertiary structure prediction will be described. i) The Proposed Genetic Algorithm Genetic Algorithms (GA) primarily motivated by the biological theory of evolution, and it was originally developed by J. Holland in 1975 [11]. The GA is is a search heuristic that mimics the process of natural selection. GA is based on the operations of population reproduction and selection to acheive optimal results. Through artificial evolution,
Data mining & Evolutionary algorithms for Multi-objective Optimization problems: A study. Data mining is the process of extracting the knowledge from the huge database available. The ultimate aim of data mining involves prediction based on the knowledge gained. Data mining is known as Knowledge Discovery in Databases (KDD) which is different ways mainly prediction and description. When data mining applied over the real time problem which puts us into trouble by having conflicting objectives to achieve
A distributed quantile filter-based algorithm was proposed in (Chen, Liang & Yu, 2014) to answer top-k query in a wireless sensor network. It evaluate top-k query in wireless sensor networks to maximize the network lifetime. Also, an online algorithm was proposed for answering time-dependent top-k queries with different values of k. Different approaches were proposed in (B. Chen et al., 2014; H. Chen, 2014; Li et al., 2014; Sandhya & Devi, 2013) for answering top-k queries. The safe interval which
3.3 PSO PSO algorithm is developed by the social behavior patterns of the organisms that exist and interact within large groups. As, it converges at a faster rate than the global optimization algorithms, the PSO algorithm is applied for solving various optimization problems easily. In the PSO technique, a population called as a swarm of candidate solutions are encoded as particles in the search space. Initially, PSO begins with the random initialization of the population. These particles move iteratively
Abstract—Internet of Things (IoT) nodes create vulnerabilities exposed to malicious software attacks. Thus, security is necessary to maintain growth in the IoT technology. This paper will focus on the use of Elliptic Curve Digital Signature Algorithm (ECDSA) as a digital authenticator for use in the IoT. Although ECDSA improves security, it comes at the cost of computational complexity in comparison to authentication methods that use ciphers that are symmetric or simple hashes. This complexity often