• Title/Summary/Keyword: performance-based optimization

Search Result 2,574, Processing Time 0.035 seconds

Likelihood-based Directional Optimization for Development of Random Pattern Authentication System (랜덤 패턴 인증 방식의 개발을 위한 우도 기반 방향입력 최적화)

  • Choi, Yeonjae;Lee, Hyun-Gyu;Lee, Sang-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.1
    • /
    • pp.71-80
    • /
    • 2015
  • Many researches have been studied to overcome the weak points in authentication schemes of mobile devices such as pattern-authentication that is vulnerable for smudge-attack. Since random-pattern-lock authenticates users by drawing figure of predefined-shape, it can be a method for robust security. However, the authentication performance of random-pattern-lock is influenced by input noise and individual characteristics sign pattern. We introduce an optimization method of user input direction to increase the authentication accuracy of random-pattern-lock. The method uses the likelihood of each direction given an data which is angles of line drawing by user. We adjusted recognition range for each direction and achieved the authentication rate of 95.60%.

Prolonging Network Lifetime by Optimizing Actuators Deployment with Probabilistic Mutation Multi-layer Particle Swarm Optimization

  • Han, Yamin;Byun, Heejung;Zhang, Liangliang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2959-2973
    • /
    • 2021
  • In wireless sensor and actuator networks (WSANs), the network lifetime is an important criterion to measure the performance of the WSAN system. Generally, the network lifetime is mainly affected by the energy of sensors. However, the energy of sensors is limited, and the batteries of sensors cannot be replaced and charged. So, it is crucial to make energy consumption efficient. WSAN introduces multiple actuators that can be regarded as multiple collectors to gather data from their respective surrounding sensors. But how to deploy actuators to reduce the energy consumption of sensors and increase the manageability of the network is an important challenge. This research optimizes actuators deployment by a proposed probabilistic mutation multi-layer particle swarm optimization algorithm to maximize the coverage of actuators to sensors and reduce the energy consumption of sensors. Simulation results show that this method is effective for improving the coverage rate and reducing the energy consumption.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.200-206
    • /
    • 2021
  • Fraud in e-commerce transaction increased in the last decade especially with the increasing number of online stores and the lockdown that forced more people to pay for services and groceries online using their credit card. Several machine learning methods were proposed to detect fraudulent transaction. Neural networks showed promising results, but it has some few drawbacks that can be overcome using optimization methods. There are two categories of learning optimization methods, first-order methods which utilizes gradient information to construct the next training iteration whereas, and second-order methods which derivatives use Hessian to calculate the iteration based on the optimization trajectory. There also some training refinements procedures that aims to potentially enhance the original accuracy while possibly reduce the model size. This paper investigate the performance of several NN models in detecting fraud in e-commerce transaction. The backpropagation model which is classified as first learning algorithm achieved the best accuracy 96% among all the models.

Innovative Solutions for Design and Fabrication of Deep Learning Based Soft Sensor

  • Khdhir, Radhia;Belghith, Aymen
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.131-138
    • /
    • 2022
  • Soft sensors are used to anticipate complicated model parameters using data from classifiers that are comparatively easy to gather. The goal of this study is to use artificial intelligence techniques to design and build soft sensors. The combination of a Long Short-Term Memory (LSTM) network and Grey Wolf Optimization (GWO) is used to create a unique soft sensor. LSTM is developed to tackle linear model with strong nonlinearity and unpredictability of manufacturing applications in the learning approach. GWO is used to accomplish input optimization technique for LSTM in order to reduce the model's inappropriate complication. The newly designed soft sensor originally brought LSTM's superior dynamic modeling with GWO's exact variable selection. The performance of our proposal is demonstrated using simulations on real-world datasets.

Large Scale Cooperative Coevolution Differential Evolution (대규모 협동진화 차등진화)

  • Shin, Seong-Yoon;Tan, Xujie;Shin, Kwang-Seong;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.665-666
    • /
    • 2022
  • Differential evolution is an efficient algorithm for continuous optimization problems. However, applying differential evolution to solve large-scale optimization problems quickly degrades performance and exponentially increases runtime. To overcome this problem, a new cooperative coevolution differential evolution based on Spark (referred to as SparkDECC) is proposed. The divide-and-conquer strategy is used in SparkDECC.

  • PDF

Cooperative Coevolution Differential Evolution (협력적 공진화 차등진화)

  • Shin, Seong-Yoon;Lee, Hyun-Chang;Shin, Kwang-Seong;Kim, Hyung-Jin;Lee, Jae-Wan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.559-560
    • /
    • 2021
  • Differential evolution is an efficient algorithm for solving continuous optimization problems. However, applying differential evolution to solve large-scale optimization problems dramatically degrades performance and exponentially increases runtime. Therefore, a novel cooperative coevolution differential evolution based on Spark (known as SparkDECC) is proposed. The divide-and-conquer strategy is used in SparkDECC.

  • PDF

A Study on Portfolios Using Simulated Annealing and Tabu Search Algorithms (시뮬레이티드 어닐링와 타부 검색 알고리즘을 활용한 포트폴리오 연구)

  • Woo Sik Lee
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.27 no.2_2
    • /
    • pp.467-473
    • /
    • 2024
  • Metaheuristics' impact is profound across many fields, yet domestic financial portfolio optimization research falls short, particularly in asset allocation. This study delves into metaheuristics for portfolio optimization, examining theoretical and practical benefits. Findings indicate portfolios optimized via metaheuristics outperform the Dow Jones Index in Sharpe ratios, underscoring their potential to enhance risk-adjusted returns significantly. Tabu search, in comparison to Simulated Annealing, demonstrates superior performance by efficiently navigating the search space. Despite these advancements, practical application remains challenging due to the complexities in metaheuristic implementation. The study advocates for broader algorithmic exploration, including population-based metaheuristics, to refine asset allocation strategies further. This research marks a step towards optimizing portfolios from an extensive array of financial assets, aiming for maximum efficacy in investment outcomes.

A Hybrid Approach for Black-hole Intrusion Detection using Fuzzy Logic and PSO Algorithm

  • M. Rohani hajiabadi;S. Gheisari;A. Ahvazi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.10
    • /
    • pp.109-114
    • /
    • 2024
  • Wireless Sensor Networks (WSN) includes a large number of small sensor nodes and low cost, which are randomly located in a region. The wireless sensor network has attracted much attention from universities and industry around the world over the past decades, with features denser levels of node deployment, self-configuration, uncertainty of sensor nodes, computing, and memory constraints. Black-hole attack is one of the most known attacks on this network. In this study, the combination of fuzzy logic and particle swarm optimization (PSO) algorithms is proposed as an effective method for detecting black-hole attack in the AODV protocol. In the current study, a new function has been proposed in order to determine the membership of fuzzy parameters based on the particle swarm optimization algorithm. The proposed method was evaluated in different scenarios and was compared with other state of arts. The simulation result of this method proved the better performance in both detection rate and delivered packet rate.

A study on the Optimization of Sewage Sludge-based Adsorbent Carbonization Condition for Improving Adsorption Capacity of Hydrogen Sulfide (H2S) (황화수소(H2S) 흡착성능 증진을 위한 하수슬러지 기반 흡착제 탄화조건 최적화 연구)

  • Choi, Sung Yeol;Jang, Young Hee;Kim, Sung Su
    • Applied Chemistry for Engineering
    • /
    • v.29 no.6
    • /
    • pp.765-771
    • /
    • 2018
  • In this study, the optimization of carbonization conditions in manufacturing processes was performed to improve the absorption performance of sewage sludge based sorbent used for treating $H_2S$ out of all odorous substances generated by various environmental facilities. Adsorbents applied were manufactured from the sewage treatment plant under different carbonization conditions, such as temperature and heating rate, and the correlation between the adsorption performance and physical properties of the adsorbents was verified. As a result, the adsorption performance of sludge at $900^{\circ}C$ with a heating rate of $10^{\circ}C/min$ was the best, and the SEM and BET analysis revealed that specific surface area and characteristics of pore (size, volume) were major parameters for the adsorption. In addition, the effect of K ions used for improving the adsorption performance of the optimum carbonization condition sorbent was insignificant for the sewage sludge based sorbent.

A Study on Identification using Particle Swarm Optimization for 3-DOF Helicopter System (3-자유도 헬리콥터 시스템의 입자군집최적화 기법을 이용한 시스템 식별)

  • Lee, Ho-Woon;Kim, Tae-Woo;Kim, Tae-Hyoung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.2
    • /
    • pp.105-110
    • /
    • 2015
  • This study proposes the more improved mathematical model than conventional that for the 3-DOF Helicopter System in Quanser Inc., and checks the validity about the proposed model by performance comparison between the controller based on the conventional model and that based on the proposed model. Research process is next : First, analyze the dynamics for the 3-DOF helicopter system and establish the linear mathematical model. Second, check the eliminated nonlinear-elements in linearization process for establishing the linear mathematical model. And establish the improved mathematical model including the parameters corresponding to the eliminated nonlinear-elements. At that time, it is used for modeling that Particle Swarm Optimization algorithm the meta-heuristic global optimization method. Finally, design the controller based on the proposed model, and verify the validity of the proposed model by comparison about the experimental results between the designed controller and the controller based on the conventional model.