首页 > 最新文献

2014 International Conference on High Performance Computing and Applications (ICHPCA)最新文献

英文 中文
Bijective mapping of arbitrary finite state machine 任意有限状态机的双目标映射
Pub Date : 2014-12-01 DOI: 10.1109/ICHPCA.2014.7045351
Satrajit Ghosh, Biswanath Sen, R. Das
Reversible Computation is of interest, because it is associated with ultra low power computing. Design and analysis of a reversible sequential circuit is an interesting research problem. State of the art design decomposes a sequential circuit into smaller modules. Then each module is implemented using known reversible circuits like Toffoli Gate, Peres Gate, Fredkin Gate, Picton Gate, and Rice Gate. This approach is inherently intractable in nature. In this work a more efficient approach is proposed that performs a detail analysis of the State Diagram. Redundancy in a state diagram arises if a “next-state” is attained from more than one “present state”. Irredundant description of such a state diagram is possible, if each state is encoded with a binary number and some ancillary bits are used to distinguish the “identical states”. This is helpful in designing a complex system that involves complex interconnection of a large number of sequential circuits.
可逆计算很有趣,因为它与超低功耗计算有关。可逆顺序电路的设计与分析是一个有趣的研究问题。最先进的设计将顺序电路分解成更小的模块。然后每个模块都使用已知的可逆电路,如Toffoli门、Peres门、Fredkin门、Picton门和Rice门来实现。这种方法本质上是难以处理的。在这项工作中,提出了一种更有效的方法,对状态图进行详细分析。如果从多个“当前状态”获得“下一状态”,状态图中的冗余就会出现。如果每个状态都用二进制数编码,并使用一些辅助位来区分“相同状态”,则可以对这种状态图进行无冗余描述。这对于设计包含大量顺序电路的复杂互连的复杂系统是有帮助的。
{"title":"Bijective mapping of arbitrary finite state machine","authors":"Satrajit Ghosh, Biswanath Sen, R. Das","doi":"10.1109/ICHPCA.2014.7045351","DOIUrl":"https://doi.org/10.1109/ICHPCA.2014.7045351","url":null,"abstract":"Reversible Computation is of interest, because it is associated with ultra low power computing. Design and analysis of a reversible sequential circuit is an interesting research problem. State of the art design decomposes a sequential circuit into smaller modules. Then each module is implemented using known reversible circuits like Toffoli Gate, Peres Gate, Fredkin Gate, Picton Gate, and Rice Gate. This approach is inherently intractable in nature. In this work a more efficient approach is proposed that performs a detail analysis of the State Diagram. Redundancy in a state diagram arises if a “next-state” is attained from more than one “present state”. Irredundant description of such a state diagram is possible, if each state is encoded with a binary number and some ancillary bits are used to distinguish the “identical states”. This is helpful in designing a complex system that involves complex interconnection of a large number of sequential circuits.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114646544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stability enhancement in SVC based controller design using Differential Evolution algorithm 基于差分进化算法的SVC控制器稳定性增强设计
Pub Date : 2014-12-01 DOI: 10.1109/ICHPCA.2014.7045362
S. K. Mohapatra, B. Dash
This paper describes the power system stability enhancement in Static Var Compensator (SVC) based damping controller. Here Proportional Integral Derivative (PID) and Lead-Lag (LL) controllers with associated time delay are considered for the proposed study. To find out the optimal controller parameters, Differential evolution algorithm is applied. The performance of the given controller is analysed under different disturbances for single machine infinite bus power system. To effectiveness and robustness of the proposed controllers, the various simulation results are compared under various disturbances and operating conditions.
本文介绍了基于静态无功补偿器(SVC)的阻尼控制器对电力系统稳定性的增强。在这里,比例积分导数(PID)和前置滞后(LL)控制器与相关的时间延迟被考虑到提出的研究。为了找到最优的控制器参数,采用了差分进化算法。针对单机无限母线电力系统,分析了该控制器在不同扰动下的性能。为了验证所提控制器的有效性和鲁棒性,对各种干扰和运行条件下的仿真结果进行了比较。
{"title":"Stability enhancement in SVC based controller design using Differential Evolution algorithm","authors":"S. K. Mohapatra, B. Dash","doi":"10.1109/ICHPCA.2014.7045362","DOIUrl":"https://doi.org/10.1109/ICHPCA.2014.7045362","url":null,"abstract":"This paper describes the power system stability enhancement in Static Var Compensator (SVC) based damping controller. Here Proportional Integral Derivative (PID) and Lead-Lag (LL) controllers with associated time delay are considered for the proposed study. To find out the optimal controller parameters, Differential evolution algorithm is applied. The performance of the given controller is analysed under different disturbances for single machine infinite bus power system. To effectiveness and robustness of the proposed controllers, the various simulation results are compared under various disturbances and operating conditions.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114935715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of list scheduling algorithms for parallel system 并行系统列表调度算法分析
Pub Date : 2014-12-01 DOI: 10.1109/ICHPCA.2014.7045327
Sunita Kushwaha, Sanjay Kumar
Scheduling is more complex and important in the case of multiple processor environments. In this paper we have studied various multiple processor systems and their characteristics. Also, we have compared some heuristic scheduling algorithms namely LPT (Longest Processing Time), SPT (Shortest Processing Time), ECT (Earliest Completion Time) and EST (Earliest Starting Time) for n independent jobs on m identical machines in order to minimize the turnaround time and maximize the throughput. These jobs are arriving at random time. Here, we observe that throughput and turnaround time are not changing when the number of processors is more than the number of processes. We also observe that EST is best from the point of view of throughput and turnaround time, when number of processors is less than number of processes.
在多处理器环境下,调度更加复杂和重要。本文研究了各种多处理机系统及其特点。此外,我们还比较了一些启发式调度算法,即LPT(最长处理时间),SPT(最短处理时间),ECT(最早完成时间)和EST(最早开始时间),用于m台相同机器上的n个独立作业,以最小化周转时间和最大化吞吐量。这些工作是随机出现的。在这里,我们观察到,当处理器数量大于进程数量时,吞吐量和周转时间没有变化。我们还观察到,当处理器数量少于进程数量时,从吞吐量和周转时间的角度来看,EST是最好的。
{"title":"Analysis of list scheduling algorithms for parallel system","authors":"Sunita Kushwaha, Sanjay Kumar","doi":"10.1109/ICHPCA.2014.7045327","DOIUrl":"https://doi.org/10.1109/ICHPCA.2014.7045327","url":null,"abstract":"Scheduling is more complex and important in the case of multiple processor environments. In this paper we have studied various multiple processor systems and their characteristics. Also, we have compared some heuristic scheduling algorithms namely LPT (Longest Processing Time), SPT (Shortest Processing Time), ECT (Earliest Completion Time) and EST (Earliest Starting Time) for n independent jobs on m identical machines in order to minimize the turnaround time and maximize the throughput. These jobs are arriving at random time. Here, we observe that throughput and turnaround time are not changing when the number of processors is more than the number of processes. We also observe that EST is best from the point of view of throughput and turnaround time, when number of processors is less than number of processes.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116300887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fingerprint based symmetric cryptography 基于指纹的对称密码
Pub Date : 2014-12-01 DOI: 10.1109/ICHPCA.2014.7045306
Subhas Barman, Samiran Chattopadhyay, D. Samanta
Key management is an important issue in traditional symmetric cryptography. It consists of key generation, key modification and key sharing to establish a message communication between partners. In general, a randomly generated key is shared with the counter partner by transmitting it along with the message or prior to the message communication. Maintaining privacy of cryptographic key determines the security of cryptography. Biometric is the alternate to maintain the privacy of key by protecting it with users biometric from unauthorized access. In this paper, a cryptographic key is linked with users fingerprint data. A string of binary number as cryptographic key is extracted from fingerprint template and this key is used to encrypt a message. During decryption process, the user is able to generate that cryptographic key from a fresh fingerprint instance to decrypt the encrypted message.
密钥管理是传统对称密码学中的一个重要问题。它包括密钥生成、密钥修改和密钥共享,以建立伙伴之间的消息通信。通常,随机生成的密钥通过与消息一起传输或在消息通信之前传输而与计数器伙伴共享。密钥的保密性决定了加密技术的安全性。生物识别技术是通过使用用户生物识别技术保护密钥免遭未经授权的访问而维护密钥隐私的替代方法。在本文中,一个加密密钥与用户的指纹数据相关联。从指纹模板中提取一串二进制数作为加密密钥,并使用该密钥对消息进行加密。在解密过程中,用户可以从一个新的指纹实例生成加密密钥来解密加密消息。
{"title":"Fingerprint based symmetric cryptography","authors":"Subhas Barman, Samiran Chattopadhyay, D. Samanta","doi":"10.1109/ICHPCA.2014.7045306","DOIUrl":"https://doi.org/10.1109/ICHPCA.2014.7045306","url":null,"abstract":"Key management is an important issue in traditional symmetric cryptography. It consists of key generation, key modification and key sharing to establish a message communication between partners. In general, a randomly generated key is shared with the counter partner by transmitting it along with the message or prior to the message communication. Maintaining privacy of cryptographic key determines the security of cryptography. Biometric is the alternate to maintain the privacy of key by protecting it with users biometric from unauthorized access. In this paper, a cryptographic key is linked with users fingerprint data. A string of binary number as cryptographic key is extracted from fingerprint template and this key is used to encrypt a message. During decryption process, the user is able to generate that cryptographic key from a fresh fingerprint instance to decrypt the encrypted message.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125075235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Minimization of the BER using Brewster's angle based polarization diversity technique for indoor Visible Light Communication system 基于布鲁斯特角度的偏振分集技术在室内可见光通信系统中的误码率最小化
Pub Date : 2014-12-01 DOI: 10.1109/ICHPCA.2014.7045317
A. Semwal, A. S. Buttar
Numerous methodologies, system models and modulation techniques are present in literatures for indoor Visible Light Communication (VLC). This paper proposed a VLC system model, for Line of Sight (LOS) and partially Non Line of Sight (NLOS) in indoor applications. The novice modulation technique based on polarization phase shift key and Brewster's angle based polarization diversity technique (BABPDT). By introducing a transparent sheet in between the transmitter and receiver to alleviate the shadowing problem faced in VLC system. When an optical signal is incident on transparent sheet at Brewster's angle, the signal get polarized into two signals. The polarized reflected signal and polarized transmitted signal. The visible light portion of quanta particles of electromagnetic spectrum is used to transmit information via LEDs as a transmitter and photo diode as a receiver.
室内可见光通信(VLC)的研究方法、系统模型和调制技术多种多样。本文提出了一种室内视距(LOS)和部分非视距(NLOS)的VLC系统模型。基于偏振相移键的新手调制技术和基于布鲁斯特角的偏振分集技术(BABPDT)。通过在发射端和接收端之间引入透明片来缓解VLC系统所面临的阴影问题。当光信号以布鲁斯特角入射到透明片上时,光信号被偏振成两个信号。偏振反射信号和偏振透射信号。电磁波谱中量子粒子的可见光部分通过led作为发射器,光电二极管作为接收器进行信息传输。
{"title":"Minimization of the BER using Brewster's angle based polarization diversity technique for indoor Visible Light Communication system","authors":"A. Semwal, A. S. Buttar","doi":"10.1109/ICHPCA.2014.7045317","DOIUrl":"https://doi.org/10.1109/ICHPCA.2014.7045317","url":null,"abstract":"Numerous methodologies, system models and modulation techniques are present in literatures for indoor Visible Light Communication (VLC). This paper proposed a VLC system model, for Line of Sight (LOS) and partially Non Line of Sight (NLOS) in indoor applications. The novice modulation technique based on polarization phase shift key and Brewster's angle based polarization diversity technique (BABPDT). By introducing a transparent sheet in between the transmitter and receiver to alleviate the shadowing problem faced in VLC system. When an optical signal is incident on transparent sheet at Brewster's angle, the signal get polarized into two signals. The polarized reflected signal and polarized transmitted signal. The visible light portion of quanta particles of electromagnetic spectrum is used to transmit information via LEDs as a transmitter and photo diode as a receiver.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123740054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differential evolution for cost reduction in cellular network 蜂窝网络成本降低的差分进化
Pub Date : 2014-12-01 DOI: 10.1109/ICHPCA.2014.7045313
S. Parija, P. K. Sahu, S. S. Singh
In cellular network cost involved in location management is higher but this issue is more common, crucial and complex problem. Although location management issues have been emerged in the field of communications no specific definition has been devised for it. Wireless network area is usually consisting of location area and paging area. The cost involved when a mobile subscriber moving in a particular service area. Since during a call the exact location of the subscriber must be known to the network the management of the network is to track the subscriber when a call comes to mobile device. For the same some cost is incurred that is location update cost and paging cost of the subscriber during the movement in a location service area. This study proposes a new evolutionary approach named Binary Differential Evolution (BDE) minimizes the total cost involved in wireless network. This technique is a stochastic, population-based optimization strategy proposed for combinatorial optimization problem to solve the location management issue. Here the given cellular network is partitioned into reporting cell and non-reporting cell so as to optimize the location area of a given cellular area. BDE is a meta-heuristic strategy presented to be a very powerful widely used technique based on evolutionary algorithms with some specific characteristics. Among the various evolutionary strategies BDE is one of the biological global optimization approach with reduced complexity has received a wide attraction from many fields such as computer science, economics and engineering fields. With the help of the realistic data for generating the test network simulation are carried out in different networks and the results are demonstrated and discussed in this work. The objective of this work is to define the best values to the Differential Evolution (DE) configuration by considering various parameters using realistic network.
在蜂窝网络中,位置管理所涉及的成本较高,但这是一个较为普遍、关键和复杂的问题。虽然在通信领域出现了地点管理问题,但没有为其制定具体的定义。无线网络区域通常由定位区和寻呼区组成。移动用户在特定服务区域移动时所涉及的费用。由于在呼叫期间,用户的确切位置必须为网络所知,因此网络的管理是在呼叫到移动设备时跟踪用户。同样,在位置服务区移动期间,用户的位置更新成本和寻呼成本也会产生一些成本。本研究提出一种新的演化方法,称为二元差分演化(BDE),使无线网路的总成本最小化。该技术是针对组合优化问题提出的一种随机的、基于群体的优化策略,以解决位置管理问题。这里将给定蜂窝网络划分为报告单元和非报告单元,以优化给定蜂窝区域的位置区域。BDE是一种元启发式策略,是一种非常强大的广泛使用的技术,它基于具有某些特定特征的进化算法。在众多的进化策略中,BDE是一种复杂性较低的生物全局优化方法,受到了计算机科学、经济学和工程等领域的广泛关注。借助生成测试网络的真实数据,在不同的网络中进行了仿真,并对结果进行了论证和讨论。本工作的目的是通过考虑实际网络中的各种参数,定义差分进化(DE)配置的最佳值。
{"title":"Differential evolution for cost reduction in cellular network","authors":"S. Parija, P. K. Sahu, S. S. Singh","doi":"10.1109/ICHPCA.2014.7045313","DOIUrl":"https://doi.org/10.1109/ICHPCA.2014.7045313","url":null,"abstract":"In cellular network cost involved in location management is higher but this issue is more common, crucial and complex problem. Although location management issues have been emerged in the field of communications no specific definition has been devised for it. Wireless network area is usually consisting of location area and paging area. The cost involved when a mobile subscriber moving in a particular service area. Since during a call the exact location of the subscriber must be known to the network the management of the network is to track the subscriber when a call comes to mobile device. For the same some cost is incurred that is location update cost and paging cost of the subscriber during the movement in a location service area. This study proposes a new evolutionary approach named Binary Differential Evolution (BDE) minimizes the total cost involved in wireless network. This technique is a stochastic, population-based optimization strategy proposed for combinatorial optimization problem to solve the location management issue. Here the given cellular network is partitioned into reporting cell and non-reporting cell so as to optimize the location area of a given cellular area. BDE is a meta-heuristic strategy presented to be a very powerful widely used technique based on evolutionary algorithms with some specific characteristics. Among the various evolutionary strategies BDE is one of the biological global optimization approach with reduced complexity has received a wide attraction from many fields such as computer science, economics and engineering fields. With the help of the realistic data for generating the test network simulation are carried out in different networks and the results are demonstrated and discussed in this work. The objective of this work is to define the best values to the Differential Evolution (DE) configuration by considering various parameters using realistic network.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131015730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A PKI based timestamped secure signing tool for e-documents 基于PKI的电子文档时间戳安全签名工具
Pub Date : 2014-12-01 DOI: 10.1109/ICHPCA.2014.7045360
S. Goswami, S. Misra, M. Mukesh
With digitization of documents becoming a buzz word, several research initiatives have been taken in the field. However, an associated challenge that arises is the process of certifying and validating document integrity and ensuring non-repudiation. E-signatures gave a solution but could not prove the signer's identity. Digital certificates were thereafter used along with signatures to prove the identity of the signer. In this paper we present a schema for embedding digital signature as well as certifying and verifying the content of electronic document in a secured and tamperproof manner. Digital signature is created with hash value of the document generated by a hashing algorithm and encrypting the hash value by private key of the signer. Finally, the document is time stamped by an authorized time stamping server. The paper incorporates a novel online validation mechanism for ensuring the usage of live certificate in signing the document and also checks the integrity of the document. It also suppresses the replay attack by encrypting user credential at one end and decrypting and verifying it at the other end with asymmetric key cryptography. Another unique mechanism incorporated to redundantly suppress replay attach is to embed a timestamp, generated by authorized third party time-stamping authority, which registers and verifies user identity. The system was exposed to security vulnerability assessment using a suite of tools as well as other mechanisms reported in literature. Results of attack assessment indicated that the system is capable of handling most of the dangerous threats and vulnerabilities.
随着文献数字化成为一个热门词汇,该领域已经采取了一些研究举措。然而,出现的一个相关挑战是认证和验证文档完整性并确保不可否认性的过程。电子签名给出了一个解决方案,但不能证明签名者的身份。此后,数字证书与签名一起用于证明签名者的身份。本文提出了一种嵌入数字签名的方案,并以安全、防篡改的方式对电子文档的内容进行认证和验证。使用哈希算法生成的文档的哈希值创建数字签名,并使用签名者的私钥对哈希值进行加密。最后,由授权的时间戳服务器对文档进行时间戳。本文引入了一种新的在线验证机制,以确保在签名文件时使用实时证书,并检查文件的完整性。它还通过在一端对用户凭证进行加密,在另一端使用非对称密钥加密对其进行解密和验证来抑制重放攻击。另一种用于冗余抑制重放附加的独特机制是嵌入一个时间戳,该时间戳由授权的第三方时间戳机构生成,用于注册和验证用户身份。使用一套工具以及文献中报道的其他机制对系统进行安全漏洞评估。攻击评估结果表明,该系统能够处理大多数危险威胁和漏洞。
{"title":"A PKI based timestamped secure signing tool for e-documents","authors":"S. Goswami, S. Misra, M. Mukesh","doi":"10.1109/ICHPCA.2014.7045360","DOIUrl":"https://doi.org/10.1109/ICHPCA.2014.7045360","url":null,"abstract":"With digitization of documents becoming a buzz word, several research initiatives have been taken in the field. However, an associated challenge that arises is the process of certifying and validating document integrity and ensuring non-repudiation. E-signatures gave a solution but could not prove the signer's identity. Digital certificates were thereafter used along with signatures to prove the identity of the signer. In this paper we present a schema for embedding digital signature as well as certifying and verifying the content of electronic document in a secured and tamperproof manner. Digital signature is created with hash value of the document generated by a hashing algorithm and encrypting the hash value by private key of the signer. Finally, the document is time stamped by an authorized time stamping server. The paper incorporates a novel online validation mechanism for ensuring the usage of live certificate in signing the document and also checks the integrity of the document. It also suppresses the replay attack by encrypting user credential at one end and decrypting and verifying it at the other end with asymmetric key cryptography. Another unique mechanism incorporated to redundantly suppress replay attach is to embed a timestamp, generated by authorized third party time-stamping authority, which registers and verifies user identity. The system was exposed to security vulnerability assessment using a suite of tools as well as other mechanisms reported in literature. Results of attack assessment indicated that the system is capable of handling most of the dangerous threats and vulnerabilities.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126880149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DE-FPA: A hybrid differential evolution-flower pollination algorithm for function minimization DE-FPA:一种用于函数最小化的混合差分进化-花授粉算法
Pub Date : 2014-12-01 DOI: 10.1109/ICHPCA.2014.7045350
Dwaipayan Chakraborty, S. Saha, Oindrilla Dutta
In this paper, a new hybrid population based algorithm (DE-FPA) is proposed with the combination of differential evolution optimization algorithm and flower pollination algorithm. The main idea is to integrate the natural evolution characteristics of the population in differential evolution algorithm with the pollination behavior of flowering plant in flower pollination algorithm to synthesize the strength and power of both the algorithms. The hybrid algorithm is robust in the sense that the globalization takes place in evolution. Some benchmark test functions are utilized here to compare the hybrid algorithm with the individual DE and FPA algorithms in searching the best solution. The results show the hybrid algorithm possesses a better capability in searching for the sufficiently good solution and to escape from local optima. In addition to that, a novel concept of dynamic adaptive weight is introduced for faster convergence than the individual algorithms, thereby making the hybrid one competent.
本文将差分进化优化算法与花卉授粉算法相结合,提出了一种新的基于混合种群的优化算法(DE-FPA)。其主要思想是将差分进化算法中种群的自然进化特征与开花植物的传粉行为结合起来,综合两种算法的优势和威力。混合算法具有鲁棒性,因为全球化是在进化过程中发生的。本文利用一些基准测试函数将混合算法与单独的DE和FPA算法在搜索最佳解方面进行比较。结果表明,混合算法在寻找足够好的解和摆脱局部最优解方面具有较好的能力。此外,还引入了动态自适应权值的概念,使混合算法的收敛速度比单个算法更快,从而使混合算法更有竞争力。
{"title":"DE-FPA: A hybrid differential evolution-flower pollination algorithm for function minimization","authors":"Dwaipayan Chakraborty, S. Saha, Oindrilla Dutta","doi":"10.1109/ICHPCA.2014.7045350","DOIUrl":"https://doi.org/10.1109/ICHPCA.2014.7045350","url":null,"abstract":"In this paper, a new hybrid population based algorithm (DE-FPA) is proposed with the combination of differential evolution optimization algorithm and flower pollination algorithm. The main idea is to integrate the natural evolution characteristics of the population in differential evolution algorithm with the pollination behavior of flowering plant in flower pollination algorithm to synthesize the strength and power of both the algorithms. The hybrid algorithm is robust in the sense that the globalization takes place in evolution. Some benchmark test functions are utilized here to compare the hybrid algorithm with the individual DE and FPA algorithms in searching the best solution. The results show the hybrid algorithm possesses a better capability in searching for the sufficiently good solution and to escape from local optima. In addition to that, a novel concept of dynamic adaptive weight is introduced for faster convergence than the individual algorithms, thereby making the hybrid one competent.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114003833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Test case prioritization techniques “an empirical study” 测试用例优先化技术“实证研究”
Pub Date : 2014-12-01 DOI: 10.1109/ICHPCA.2014.7045344
Neha Sharma, Sujata, G. Purohit
Regression testing is an expensive process. A number of methodologies of regression testing are used to improve its effectiveness. These are retest all, test case selection, test case reduction and test case prioritization. Retest all technique involves re-execution of all available test suites, which are critical moreover cost effective. In order to increase efficiency, test case prioritization is being utilized for rearranging the test cases. A number of algorithms has been stated in the literature survey such as Greedy Algorithms and Metaheuristic search algorithms. A simple greedy algorithm focuses on test case prioritization but results in less efficient manner, due to which researches moved towards the additional greedy and 2-Optimal algorithms. Forthcoming metaheuristic search technique (Hill climbing and Genetic Algorithm) produces a much better solution to the test case prioritization problem. It implements stochastic optimization while dealing with problem concern. The genetic algorithm is an evolutionary algorithm which gives an exact mathematical fitness value for the test cases on which prioritization is done. This paper focuses on the comparison of metaheuristic genetic algorithm with other algorithms and proves the efficiency of genetic algorithm over the remaining ones.
回归测试是一个昂贵的过程。一些回归测试的方法被用来提高其有效性。它们是重新测试全部,测试用例选择,测试用例减少和测试用例优先级排序。重新测试所有技术包括重新执行所有可用的测试套件,这是至关重要的,而且具有成本效益。为了提高效率,测试用例优先级被用于重新安排测试用例。在文献综述中提出了一些算法,如贪心算法和元启发式搜索算法。简单的贪心算法侧重于测试用例的优先排序,但效率较低,因此研究转向了额外的贪心算法和2-Optimal算法。即将到来的元启发式搜索技术(爬坡和遗传算法)为测试用例优先级问题提供了更好的解决方案。它在处理问题关注的同时实现了随机优化。遗传算法是一种进化算法,它为测试用例提供精确的数学适应度值,并在此基础上进行优先级排序。本文将元启发式遗传算法与其他算法进行了比较,并证明了遗传算法的有效性。
{"title":"Test case prioritization techniques “an empirical study”","authors":"Neha Sharma, Sujata, G. Purohit","doi":"10.1109/ICHPCA.2014.7045344","DOIUrl":"https://doi.org/10.1109/ICHPCA.2014.7045344","url":null,"abstract":"Regression testing is an expensive process. A number of methodologies of regression testing are used to improve its effectiveness. These are retest all, test case selection, test case reduction and test case prioritization. Retest all technique involves re-execution of all available test suites, which are critical moreover cost effective. In order to increase efficiency, test case prioritization is being utilized for rearranging the test cases. A number of algorithms has been stated in the literature survey such as Greedy Algorithms and Metaheuristic search algorithms. A simple greedy algorithm focuses on test case prioritization but results in less efficient manner, due to which researches moved towards the additional greedy and 2-Optimal algorithms. Forthcoming metaheuristic search technique (Hill climbing and Genetic Algorithm) produces a much better solution to the test case prioritization problem. It implements stochastic optimization while dealing with problem concern. The genetic algorithm is an evolutionary algorithm which gives an exact mathematical fitness value for the test cases on which prioritization is done. This paper focuses on the comparison of metaheuristic genetic algorithm with other algorithms and proves the efficiency of genetic algorithm over the remaining ones.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114598782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Fuzzy logic based wind energy conversion system with Solid oxide fuel cell 基于模糊逻辑的固体氧化物燃料电池风能转换系统
Pub Date : 2014-12-01 DOI: 10.1109/ICHPCA.2014.7045342
M. Lalitha, T. Janardhan, R. Mohan
In recent years the Double-Fed Induction Generator (DFIG) gaining more popular due to their variable speed and variable pitch control. A dynamic Solid oxide fuel cell (SOFC) is integrated with Double fed Induction Generator (DFIG), due to their fluctuating nature of wind energy. This paper presents a simulation of SOFC fuel cell integrated with a doubly fed induction generator to maintain grid voltage constant 440 V and 50 Hz. Existing literature used PI controller based vector control technique for the control of DFIG. In this work, fuzzy logic controller is proposed to decrease total harmonic distortion in grid current. The performance of the system for sudden load changes with PI control and proposed control technique has been obtained and compared, by using MATLAB SIMULINK.
近年来,双馈感应发电机(DFIG)因其变速和变节距控制而越来越受到人们的欢迎。由于固体氧化物燃料电池(SOFC)与双馈感应发电机(DFIG)的风能波动特性,将其集成到动态固体氧化物燃料电池中。本文模拟了集成双馈感应发电机的SOFC燃料电池,以保持电网电压恒定440 V和50 Hz。现有文献采用基于PI控制器的矢量控制技术对DFIG进行控制。在这项工作中,提出了模糊逻辑控制器来降低电网电流的总谐波畸变。利用MATLAB SIMULINK对PI控制和所提出的控制方法对系统在负荷突变情况下的性能进行了比较。
{"title":"Fuzzy logic based wind energy conversion system with Solid oxide fuel cell","authors":"M. Lalitha, T. Janardhan, R. Mohan","doi":"10.1109/ICHPCA.2014.7045342","DOIUrl":"https://doi.org/10.1109/ICHPCA.2014.7045342","url":null,"abstract":"In recent years the Double-Fed Induction Generator (DFIG) gaining more popular due to their variable speed and variable pitch control. A dynamic Solid oxide fuel cell (SOFC) is integrated with Double fed Induction Generator (DFIG), due to their fluctuating nature of wind energy. This paper presents a simulation of SOFC fuel cell integrated with a doubly fed induction generator to maintain grid voltage constant 440 V and 50 Hz. Existing literature used PI controller based vector control technique for the control of DFIG. In this work, fuzzy logic controller is proposed to decrease total harmonic distortion in grid current. The performance of the system for sudden load changes with PI control and proposed control technique has been obtained and compared, by using MATLAB SIMULINK.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129600653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2014 International Conference on High Performance Computing and Applications (ICHPCA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1