• Title/Summary/Keyword: Exchange Algorithm

Search Result 498, Processing Time 0.023 seconds

The Bisection Seed Detection Heuristic for Solving the Capacitated Vehicle Routing Problem (한정 용량 차량 경로 탐색 문제에서 이분 시드 검출 법에 의한 발견적 해법)

  • Ko, Jun-Taek;Yu, Young-Hoon;Jo, Geun-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.1
    • /
    • pp.1-14
    • /
    • 2009
  • The Capacitated Vehicle Routing Problem (CVRP) is the problem that the vehicles stationed at central depot are to be optimally routed to supply customers with demands, satisfying vehicle capacity constraints. The CVRP is the NP-hard as it is a natural generalization of the Traveling Salesman Problem (TSP). In this article, we propose the heuristic algorithm, called the bisection seed detection method, to solve the CVRP. The algorithm is composed of 3-phases. In the first phase, we work out the initial cluster using the improved sweep algorithm. In the next phase, we choose a seed node in each initial cluster by using the bisection seed detection method, and we compose the rout with the nearest node from each seed. At this phase, we compute the regret value to decide the list of priorities for the node assignment. In the final phase, we improve the route result by using the tabu search and exchange algorithm. We compared our heuristic with different heuristics such as the Clark-Wright heuristic and the genetic algorithm. The result of proposed heuristic show that our algorithm can get the nearest optimal value within the shortest execution time comparatively.

  • PDF

Genetic Scheduling Algorithm for FFT Dta Flows in Parallel Computers (병렬 컴퓨터 시스템에서의 FFT 데이터 흐름도에 관한 유전 스케줄링 알고리즘)

  • 박월선;김금호;서루비;윤성대
    • Proceedings of the IEEK Conference
    • /
    • 2000.06c
    • /
    • pp.161-164
    • /
    • 2000
  • We propose the genetic algorithm to apply three kinds of FFT data flows to be considered the overhead for the data exchange between processors that have the multi-scheduling problem on parallel computer In the design of genetic algorithm, we propose the chromosome representation which can simply encode and decode a solution without any heuristic information, the evaluation function to be considered an efficiency of processor, and the genetic operator to inherit a superior gene from their parents. And we saw that the simulation result can verify better performance than the existing algorithm(BEA : binary exchange algorithm)in the face of execution time.

  • PDF

A Study on Voltage Stability Improvement by the Efficient Network Reconfiguration Algorithm

  • Kim, Byung-Seop;Shin, Joong-Rin;Park, Jong-Bae;Shin, Yong-Hak
    • KIEE International Transactions on Power Engineering
    • /
    • v.4A no.2
    • /
    • pp.58-68
    • /
    • 2004
  • This paper presents an optimal routing algorithm (ORA) for maximizing voltage stability as well as for minimizing power loss in radial power systems. In the proposed ORA, a novel voltage stability index (VSI) for real-time assessment is newly introduced based on the conventional critical transmission path framework. In addition, the suggested algorithm can automatically detect the critical transmission paths resulting in voltage collapse when additional real or reactive loads are added. To implement an effective ORA, we have developed an improved branch exchange (IBE) method based on a loss calculation index and tie-branch power flow equations, which are suggested for real-time applications. The proposed algorithm has been tested with IEEE test systems as well as a large-scale power system in Korea to demonstrate its effectiveness and efficiency.

Algorithms on layout design for overhead facility (천장형 설비의 배치 설계를 위한 해법의 개발)

  • Yang, Byoung-Hak
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.1
    • /
    • pp.133-142
    • /
    • 2011
  • Overhead facility design problem(OFDP) is one of the shortest rectilinear flow network problem(SRFNP)[4]. Genetic algorithm(GA), artificial immune system(AIS), population management genetic algorithm (PM) and greedy randomized adaptive search procedures (GRASP) were introduced to solve OFDP. A path matrix formed individual was designed to represent rectilinear path between each facility. An exchange crossover operator and an exchange mutation operator were introduced for OFDP. Computer programs for each algorithm were constructed to evaluate the performance of algorithms. Computation experiments were performed on the quality of solution and calculations time by using randomly generated test problems. The average object value of PM was the best of among four algorithms. The quality of solutions of AIS for the big sized problem were better than those of GA and GRASP. The solution quality of GRASP was the worst among four algorithms. Experimental results showed that the calculations time of GRASP was faster than any other algorithm. GA and PM had shown similar performance on calculation time and the calculation time of AIS was the worst.

Optical Secret Key Sharing Method Based on Diffie-Hellman Key Exchange Algorithm

  • Jeon, Seok Hee;Gil, Sang Keun
    • Journal of the Optical Society of Korea
    • /
    • v.18 no.5
    • /
    • pp.477-484
    • /
    • 2014
  • In this paper, we propose a new optical secret key sharing method based on the Diffie-Hellman key exchange protocol required in cipher system. The proposed method is optically implemented by using a free-space interconnected optical logic gate technique in order to process XOR logic operations in parallel. Also, we present a compact type of optical module which can perform the modified Diffie-Hellman key exchange for a cryptographic system. Schematically, the proposed optical configuration has an advantage of producing an open public key and a shared secret key simultaneously. Another advantage is that our proposed key exchange system uses a similarity to double key encryption techniques to enhance security strength. This can provide a higher security cryptosystem than the conventional Diffie-Hellman key exchange protocol due to the complexity of the shared secret key. Results of numerical simulation are presented to verify the proposed method and show the effectiveness in the modified Diffie-Hellman key exchange system.

Artificial neural network algorithm comparison for exchange rate prediction

  • Shin, Noo Ri;Yun, Dai Yeol;Hwang, Chi-gon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.125-130
    • /
    • 2020
  • At the end of 1997, the volatility of the exchange rate intensified as the nation's exchange rate system was converted into a free-floating exchange rate system. As a result, managing the exchange rate is becoming a very important task, and the need for forecasting the exchange rate is growing. The exchange rate prediction model using the existing exchange rate prediction method, statistical technique, cannot find a nonlinear pattern of the time series variable, and it is difficult to analyze the time series with the variability cluster phenomenon. And as the number of variables to be analyzed increases, the number of parameters to be estimated increases, and it is not easy to interpret the meaning of the estimated coefficients. Accordingly, the exchange rate prediction model using artificial neural network, rather than statistical technique, is presented. Using DNN, which is the basis of deep learning among artificial neural networks, and LSTM, a recurrent neural network model, the number of hidden layers, neurons, and activation function changes of each model found the optimal exchange rate prediction model. The study found that although there were model differences, LSTM models performed better than DNN models and performed best when the activation function was Tanh.

A Publish Subscribe Information Exchange Model and A Novel Matching Algorithm for Navy Shipboard Systems (해군 함정 컴퓨팅 체계 정보교환을 위한 Publish Subscribe 모델 기반 아키텍처 및 매칭 알고리즘)

  • Kim, Hong-Jae;Oh, Sang-Yoon
    • The KIPS Transactions:PartA
    • /
    • v.18A no.5
    • /
    • pp.181-192
    • /
    • 2011
  • Information superiority is an essential factor in modern warfare and it can be archived by efficient information exchange between systems. Various computing systems are installed on the today's navy vessels. However, it is hard to improve interoperability and efficiency of information exchange since the configurations of installed systems are varying. The military standard and commercial standard are mix-used between systems. In this paper, we propose an information exchange architecture based on Pub/Sub model as a communication middleware to improve interoperability as well as enhancing scalability. We also propose a novel tree matching algorithm to improve a performance of PubSub broker. In the proposed algorithm, each tree nodes have information about predicates of subscription that can reduce event matching time. The performance evaluation results show our proposed algorithm reduces time for matching predicates compare with other algorithms.

Performance Analysis for Reducing Authentication Time in Hand-over (핸드오버시 인증 대기시간 단축을 위한 성능 분석)

  • Shin Seung-Soo;Seo Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.163-169
    • /
    • 2004
  • In this paper, a conventional key exchange method simply performs the key exchange setup step based on discrete algebraic subjects. But the mutual-authentication procedure of wireless PKI for reducing authentication time uses an elliptical curve for a key exchange setup step. Proposed handover method shows reduced handover processing time than conventional method since it can reduce CRL retrieval time. Also, we compared proposed authentication structure and conventional algorithm. and simulation results show that proposed authentication method outperforms conventional algorithm in all environment regardless of call arrival rate. queue service rate. queue size.

  • PDF

Predicting Audit Reports Using Meta-Heuristic Algorithms

  • Valipour, Hashem;Salehi, Fatemeh;Bahrami, Mostafa
    • Journal of Distribution Science
    • /
    • v.11 no.6
    • /
    • pp.13-19
    • /
    • 2013
  • Purpose - This study aims to predict the audit reports of listed companies on the Tehran Stock Exchange by using meta-heuristic algorithms. Research design, data, methodology - This applied research aims to predict auditors reports' using meta-heuristic methods (i.e., neural networks, the ANFIS, and a genetic algorithm). The sample includes all firms listed on the Tehran Stock Exchange. The research covers the seven years between 2005 and 2011. Results - The results show that the ANFIS model using fuzzy clustering and a least-squares back propagation algorithm has the best performance among the tested models, with an error rate of 4% for incorrect predictions and 96% for correct predictions. Conclusion - A decision tree was used with ten independent variables and one dependent variable the less important variables were removed, leaving only those variables with the greatest effect on auditor opinion (i.e., net-profit-to-sales ratio, current ratio, quick ratio, inventory turnover, collection period, and debt coverage ratio).

Analysis for Authentication waiting time in Hand-over using Queueing Model (큐잉 모델을 이용한 핸드오버 시 인증 대기시간 분석)

  • Shin Seung-Soo;Kim Duck-Sool
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.123-132
    • /
    • 2005
  • In this paper, a conventional key exchange method simply Performs the key exchange setup step based on discrete algebraic subjects. But the mutual-authentication procedure of wireless PKI for reducing authentication time uses an elliptical curve for a key exchange setup step. Proposed hand-over method shows reduced hand-over processing time than conventional method since it can reduce CRL retrieval time. Also, we compared proposed authentication structure and conventional algorithm, and simulation results show that proposed authentication method outperforms conventional algorithm in authentication waiting time.

  • PDF