SlideShare a Scribd company logo
1 of 10
Download to read offline
Arid Zone Journal of Engineering, Technology and Environment. August, 2010; Vol.7, 24 -33
Copyright© Faculty of Engineering, University of Maiduguri, Nigeria.
Print ISSN: 1596-2490, Electronic ISSN: 2545-5818
www.azojete.com.ng
K-NODE SET RELIABILITY OPTIMIZATION OF A DISTRIBUTED
COMPUTING SYSTEM USING PARTICLE SWARM ALGORITHM
Bakare, G.A.,1
Chiroma, I.N. 2
and Ibrahim, A.A.3
Abstract
A discrete Particle Swarm algorithm is proposed to solve a typical combinatorial optimization problem: K-Node
Set Reliability (KNR) optimization of a distributed computing system (DCS) which is a well-known NP-hard
problem is presented in this paper. The reliability of a subset of network nodes of a DCS is determined such that
the reliability is maximized and specified capacity constraint is satisfied. The proposed algorithm is
demonstrated on an 8 node 11 link DCS topology. The test results show that the proposed algorithm can achieve
good solution quality and convergence characteristics.
1. Introduction
Advances in computer networks and low cost computing elements have led to increasing
interest in Distributed Computing System (DCS). Among the numerous merits of using a DCS
include more effective resource sharing, better fault tolerance, and higher reliability. In
designing such systems, reliability must be considered, which largely relies on the topological
layout of the communication links (Jan et al., 1993; Lin, 1994). Almost all of the optimization
problems relevant to distributed computing system design are NP-complete. That is, for most
problems, there is no known algorithm that could guarantee finding the global optimum in a
polynomial amount of time. Several DCS reliability measures have been developed and one of
these distributed system reliability measures, K-Node reliability (KNR), is adopted in Chen et
al. (1994). Reliability optimization is the design of distributed computing systems, where
KNR is viewed as the probability that all k (a subset of the processing elements) nodes in the
DCS can be run successfully. They presented a heuristic algorithm for maximizing reliability
by the node select problem to obtain an optimal design DCS. Their work did not consider an
exhaustive method because it is too time consuming. Instead, they applied the exact
algorithm, which examine k-node set reliability optimization with a capacity constraint to find
an optimal solution of k-node reliability. The heuristic algorithm work well for large DCS
problems as it largely avoids unnecessary generation of spanning trees. They regarded the
DCS as a weighted graph, in which the weight of each node represents its capacity and
generate k-node disjoint terms using a k-tree disjoint reduction method to obtain the KNR.
This reduces the disjoint terms and hence reduces the computation time.
In Chen (1993), K-node set reliability optimization with capacity constraint for a DCS was
examined using exact method. This method can obtain an optimal solution but cannot
effectively reduce the problem space. Moreover, exact method spends more execution time
1
Department of Electrical Engineering Programme, Abubakar Tafawa Balewa University, Bauchi. Nigeria.
e-mail: bakare_03@yahoo.com
2
University Computer Centre, Abubakar Tafawa Balewa University, Bauchi. Nigeria.
e-mail: inchiroma@yahoo.com
3
Department of Electrical & Electronics Engineering, University of Maiduguri, Maiduguri. Nigeria.
e-mail:ibrahim_ali@yahoo.com
K-node set reliability optimization of a distributed computing system using particle swarm algorithm
25
with a large DCS. In fact, most distributed system problems are large and an increase in the
number of nodes causes the exact method execution time to grow exponentially.
Occasionally, therefore an application requiring an efficient algorithm with an approximate
solution is highly attractive. In many cases, complex heuristics have to be developed to
achieve satisfying results. Previous approaches have either been enumerative-based, which
are applicable only for small DCS sizes (Aggarwal et al., 1982), or heuristic-based, which can
only be applied to larger networks, but do not guarantee optimality. Therefore other heuristic
approaches are required. There exist a number of researches, which deal with such approaches
as discussed in Pierre et al. (1998). Genetic algorithm (GA) is one of such heuristics that have
been found to be a very good computational tool for problem of this nature. They can be
applied to search large, multimodal, complex problem spaces (Holland, 1975; Bakare, 2001).
In Davis et al. (1987), a genetic algorithm to determine the link capacities of a network,
initially generated by the software called DESIGNET was proposed. Chiroma (2005) applied
GA to the optimization of K-node set reliability of a distributed computing system. Good
results in terms of solution quality and convergence characteristics were obtained. Cheng
(1998) employed GA approach in the backbone network design under the constraint: minimal
total link cost and 1-FT (fault-tolerant to 1 link-failure).
Kennedy and Eberhart proposed a new evolutionary computation technique called particle
swarm optimization (PSO) in 1995. This method was developed through the simulation of a
simplified social system and has been found to be robust in solving continuous non-linear
optimization problems (Gudise et al. 2003; Abido 2002; Kennedy et al., 1997; Zhang, 2004).
Particle swarm algorithms differ from other evolutionary algorithms most importantly in both
metaphorical explanations and how they work. The individuals (particles) persist over time,
influencing one another’s search of the problem space, unlike genetic algorithm where the
weakest chromosomes are immediately discarded. The particles in PSO (similar to
chromosomes in GA) are known to have fast convergence to local / global optimum position
(s) over a small number of iterations.
In this paper, an innovative particle swarm algorithm, called discrete PSO for K-node set
reliability optimization of a distributed computing system is presented. The feasibility of the
proposed algorithm is demonstrated on a typical DCS topology obtained from Cheng (1998).
Simulation shows that the proposed algorithm can achieve good results in terms of solution
quality and convergence characteristics.
2. Problem formulation
The KNR problem is characterized as follows:
Given the topology of an undirected DCS, the reliability of each communication link, the
capacity of each node and a possible set of data files, and assume that each node is perfectly
reliable and each link is either in the working state or failed state. The problem can be
mathematically stated thus:
Maximize R (Gk) (1)
Subject to: ∑c (vi) ≥ C constraint (2)
AZOJETE Vol. 7 2010
26
Where Gk is the graph G with set k of nodes specified,
k ≥ 2, R(Gk) is the reliability of the k-node set, vi is an ith node which represents the
ith processing element, c(vi) is the capacity of the ith node and Cconstraint is the total
capacity constraint in the DCS .
3. Applied software techniques
3.1 Overview of Particle Swarm Optimization Technique
Particle swarm optimization (PSO ) is an evolutionary computation technique that was
originally developed in 1995 by Kennedy and Eberhart. It has been developed through
simulation of simplified social models and has been found to be robust for solving non-linear,
non-differentiability multiple optimal and multi-objective problems. The features of the
technique are as follows:
 It is based on a simple concept and has high quality solution with stable convergence.
 The method is based on the researches about swarms such as fish schooling and bird
flocking.
 It was originally developed for non-linear optimization with continuous variables;
however it is easily expanded to treat problems with discrete variables. Therefore it is
applicable to K-node reliability optimization of a distributing computing system.
PSO is an evolutionary technique that does not implement survival of the fittest. Unlike other
evolutionary algorithms where an evolutionary operator is manipulated, each individual in the
swarm flies in the search space with a velocity which is dynamically adjusted according to its
own flying experience and its companions flying experience. The system initially has a
population of random solutions. Each potential solution, called a particle, is given a random
velocity and is flown through the problem space. The particles have memory and each particle
keeps track of its previous best position, called the pbest and its corresponding fitness. There
exist a number of pbest for the respective particles in the swarm and the particle with greatest
fitness is called the global best (gbest ) of the swarm. The basic concept of the PSO method
lies in accelerating each particle towards its pbest and gbest locations, with random weight
acceleration at each time step. The modified velocity of each particle can be computed using
the current velocity and the distance from pbest and gbest as given by:
   2211
1 k
idid
k
idid
k
id
k
id xgbestrandcxpbestrandcVWV 
(3)
In the discrete version of the PSO, the trajectories are changed in the probability that a
coordinate will take on a binary value (0 or 1). Therefore, the positions are computed using:
0else
1enth))((
1
11




k
id
k
id
k
id
x
xVSrandif
(4)
Where:
S(V) is a sigmoid limiting transformation function given by:
 V
eVS 
 11)( (5)
rand , rand1 and rand2 : random numbers between 0 and 1
Vk
id : current velocity of individual i at iteration k
K-node set reliability optimization of a distributed computing system using particle swarm algorithm
27
Vmin
id ≤Vk
id ≤ Vmax
id
Vk+1
id : modified velocity of individual i
xk
id : current position of individual i at iteration k
pbestid : pbest of individual i
gbestid : gbest of the group
c1 and c2: the weighting of the stochastic acceleration that pulls each particle towards
pbest and gbest .
W : inertia weight factor that controls the exploitation and exploration of the search
space by dynamically adjusting the velocity. It is computed using:
max
minmax
max
iter
gen
WW
WW 

 (6)
genmax
: maximum generation
iter : current iteration number.
3.2 Overview of Genetic Algorithms Based Technique
Genetic Algorithms (GAs), first proposed by John Holland in the 1960’s, are numerical
optimization algorithms based on principles inspired from the genetic and evolution
mechanisms observed in natural systems and populations of living beings (Bakare, 2001). The
robust behaviour, which is the distinguishing feature of GAs with respect to other
optimization methods, implies that GAs must differ in the following fundamental ways:
 It searches from a population of candidates and do not process only one single
solution; thus, they are resistant to being trapped in local optima.
 GAs use probabilistic transition rules and not deterministic rules.
 GAs exploit only the payoff information of the objective function to guide their search
towards the global optimum. They do not depend on any additional information like
the existence of derivatives.
One of the disadvantages of GA search is the large number of function evaluations, with the
resulting undesirably long execution time. Binary encoding GAs deals with binary strings,
where the number of bits of each string simulates the genes of an individual chromosome, and
the number of individuals constitutes a population. Each parameter set is encoded into a series
of a fixed length of string symbols, usually from the binary bits, which are then concatenated
into a complete string called chromosome. Sub-strings of specified length are extracted
successively from the concatenated string and are then decoded and mapped into the value in
the corresponding search space. Generally, GAs implementation comprises three different
phases: initial population generation, fitness evaluation and genetic operations (Bakare, 2001).
AZOJETE Vol. 7 2010
28
4. Implementation of the proposed technique
Particle swarm K-node reliability optimization is developed as follows:
4.1 Representation of Individual String
Before using the binary PSO algorithm to solve the KNR combinatorial optimization problem,
the representation of a particle must be defined. A particle is also called an individual. The
problem involves a capacity constraint. The network topology is fixed. The size of every node
is also fixed. Binary coding scheme is therefore employed. The length of a chromosome is
equal to the number of network nodes of the form:
xn, xn-1,.. xi-1,… x2, x1 (7)
Each bit indicates whether the node is selected for the k-node set,
where xi = 1 if vi is selected; otherwise xi = 0.
4.2 Initialization
The DCS parameter such as the number of nodes (n), the number of links (e), each link’s
reliability (aij) and unreliability (bij), each node’s capacity, c(vi), capacity constraint
(Cconstraint), etc are entered into the FORTRAN program. The PSO parameters such as particle
size (ps), minimum and maximum inertia weights, Wmin
and Wmax
, the limit of velocity change
Vmin
and Vmax
, maximum generation (genmax
), acceleration constants c1 and c2, etc are also
entered.
For each node vi, if the degree of vi is d(vi) and if the links ei,k1, ei,k2, ei,k3, …, ei,kd(vi) are
adjacent to vi, then its weight can be computed as in Yeh (2001) using:
  (8)))..)(..((*((* )(32211 ,,,,,, ivdkikikikikikii bababavw 
Where i, k1, k2, …, kd(vi) ϵ {1, n}. The heaviest node is then determined.
Initial population of chromosome Xi =[xn, .., x1] ϵ X are randomly generated with the
heaviest node included. The node capacity that includes this chromosome is computed. If the
sum of the capacity of this chromosome satisfies the capacity constraint, then it is appended to
the population, otherwise it is discarded.
4.3 Evaluation function
The objective function of chromosome is then computed using Yeh et al. (2001):
  2/deg  kratioratioprdlf kk (9)
Where
)1(, 








  kkaratioprdl
kjki Gv
ji
Gv
k

K-node set reliability optimization of a distributed computing system using particle swarm algorithm
29
 knvdratio
ki Gv
ik 1)(deg 







 
nk 2
The fitness values that determine which chromosomes are to be carried onto the next
generation are computed from the objective function equation.
4.3 Implementation of the PSO for KNR
The main steps involved in the searching procedures of the proposed PSO method are given
by the following:
Step 1: Read the DCS data and the PSO parameters. Compute the weight of each node
using Equation (8) and select the heaviest node.
Step 2: Generate randomly initial population of particles with random positions and
velocities and the heaviest node included. The node capacity that includes this
chromosome is computed. If the sum of the capacity of this chromosome satisfies the
capacity constraint, then it is appended to the population, otherwise it is discarded.
Step 3: Compute the fitness value of the initial particles in the swarm using the
objective function (Equation 9). Set the initial pbest to current position of each particle
and the initial best evaluated values among the swarm is set to gbest .
Step 4: Update the generation count.
Step 5: Update the velocities and the positions according to Equations (3) and (4)
respectively.
Step 6: Compute the fitness value of the new particles in the swarm using Equation
(9). Update the pbest with new positions if the particle’s present fitness is better than
the previous one. Also update the gbest with the best in the population swarm.
Step 7: Repeat steps 4 to 6 until the preset convergence criterion: maximum number of
generations is fulfilled.
Step 8: Compute the reliability R (GK) of the optimal K-node set result in the
chromosome of the population using Monte Carlo technique (Lin et al. 1994) and
output the K-node set corresponding to the R (GK).
AZOJETE Vol. 7 2010
30
5. Results and discussion
The procedure described above was implemented using the FORTRAN language and the
developed software program was executed on a 450 MHz Pentium III PC. To illustrate the
effectiveness of the proposed method, a distributed computing system topology obtained from
Chen et al. (1993) was considered.
The topology of the distributed computing system with eight (8) nodes, and eleven (11) links,
was considered as a case study where c (vi) represents the capacity of nodes vi, and aij
represents the reliability of the link eij.
v2 v4v3
e67
v5
v7 v6
e18
e17
e68
e56
e46
e48
e45
e34
e12
e18
v8v1
e23
Figure 1: A DCS with 8 nodes and 11 links
Benchmark input data for DCS are:
c (v1) = 39, c(v2) = 45, c(v3) = 38, c(v4) = 53, c(v5) = 47, c (v6) = 49, c(v7) = 51, c(v8) = 41.
a12= 0.89, a17= 0.81, a18= 0.93, a23= 0.85, a34= 0.91, a45= 0.82, a46= 0.83, a48= 0.96, a56=
0.87, a67= 0.84, a68= 0.88. Cconstraint ≥ 100.
The proposed approach was then applied to this problem and the optimum parameter setting
for the PSO is shown in Table I.
Table I: Optimum parameter setting for PSO
C1 2
C2 2
Vmax
2
Vmin
-2
genmax
50
Particle size (PS) 20
Wmax
0.9
Wmin
0.4
K-node set reliability optimization of a distributed computing system using particle swarm algorithm
31
The maximum fitness value of 0.701 was achieved and the chromosomes are 0001010 (from
left to right). The k-node set in the population chromosome is {v4, v6}, i.e. nodes 4 and 6.
The algorithm then computes the reliability and output the k-node set, which is the highest
reliability k-node set, and R ({v4, v6}) = 0.9974. It can therefore be seen that the same
solution quality was achieved by the PSO when compared with GA approach (Chiroma, 2005)
and the exact method (Chen et al., 1993). The convergence characteristic of PSO is as shown
in Figure 2. The convergence characteristics of both GA and PSO methods are comparatively
shown in Figure 3. As can be seen from this figure, both the PSO and GA have rapid
convergence characteristics. GA achieved the maximum fitness earlier than the PSO: second
and third generations respectively.
0.2
0.3
0.4
0.5
0.6
0.7
0.8
1 8 15 22 29 36 43 50
Generation number
Fitnessvalue
Average fitness
Maximum fitness
Figure 2: Convergence characteristics of PSO
0.4
0.45
0.5
0.55
0.6
0.65
0.7
0.75
1 7 13 19 25 31 37 43 49
Generation number
Fitnessvalue
GA maximum fitness
PSO maximum fitness
Figure 3: Comparison of convergence characteristics of PSO & GA
This shows that PSO has good convergence characteristics and is less prone to being trapped
into local optimal. Finally, PSO has less parameter settings when compared to GA.
AZOJETE Vol. 7 2010
32
Comparing the complexity of the proposed method with that of exact method, the complexity
of the exact method is O (2e x 2n), where e denotes the number of edges (links) and n
represents the number of nodes (Chen et al., 1994). With our proposed algorithm, however, in
the worst case, the complexity of evaluating the weight of each node is O(e), that of selecting
the heaviest node is O(n), and that of computing the reliability of the k- node set is O(m2),
where m represents the number of paths of the selected k-node set (Aziz, 1982). Therefore, the
complexity of the proposed algorithm is O (n*ps*ng+m2), where ps is the population size,
and ng is the total number of generation. Although the conventional techniques can yield an
optimal solution, they cannot effectively reduce the number of reliability computations. Some
applications, especially NP-complete problems, often require an efficient algorithm for
computing the reliability. Under this circumstance deriving the optimal reliability may not be
feasible. So an efficient algorithm, even when it yields only approximate reliability, is
preferred.
4. Conclusions
In this paper, comparison is made between the particle swarm optimization and genetic
algorithm based K-node set reliability optimization. The efficiency and accuracy of the
proposed algorithm has been verified by implementing the procedure using FORTRAN
language program on a Pentium III microcomputer. Verification on a typical DCS topology
revealed that PSO achieved the same good solution quality as compared with GA and exact
method. PSO exhibits good convergence characteristics and is less prone to being caught at
the local optimal. The proposed algorithm can efficiently obtain the optimal k-node set
reliability with a capacity constraint.
References
Abido M. A. (2002). Optimal design of power system stabilizers using PSO. IEEE
Transactions on Energy and Conversion. Vol 17, No. 3, pp. 406-413.
Aggarwal, K.K., Chopra, Y.C. and Bajwa J.S. (1982). Topological layout of links for
optimizing the overall reliability in a computer communication system.
Microelectronics and Reliability 22, pp.347-351
Aziz M. A., (1982). Path set enumeration of directed graphs by the set theoretic method.
Microelectronics and Reliability, Vol. 5, No. 37, pp. 809-814.
Bakare, G. A. (2001). Removal of Overloads and Voltage Problem in Electric Power Systems
using Genetic Algorithm/Expert Systems Approaches. Ph.D. Dissertation published by
Shaker Verlag, Germany.
Chen R. S., Chen, D. J. and Yel, Y. S. (1994). Reliability optimization in the design of
distributed computing systems. Proceedings of Int. Conference on Computing and
Information Institute of Computer Science and Engineering of National Chiao Tung
University, Hsinchu, Taiwan. R.O.C., pp.422-439.
K-node set reliability optimization of a distributed computing system using particle swarm algorithm
33
Chen R. S., Chen, D. J. and Yel, Y. S. (1993). Reliability optimization of distributed
computing systems subject to capacity constraint. International journal of Computers
& Mathematics with Applications. 29(3), pp. 93-99.
Cheng S. T. (1998) Topological optimization of a reliable communications network. IEEE
Trans. on Reliability. Vol.47, No.3, pp. 225-233.
Chiroma I. N. (2005) A genetic algorithm- based efficient optimization of K-node set
reliability for distributed computing system. MSc. Thesis (Computer Science),
Abubakar Tafawa Balewa University, Bauchi, Nigeria.
Davis, L. and Coombs, S. (1987). Optimizing network link sizes with genetic algorithms in
modelling and simulation methodology. Knowledge System’s Paradegins.
Amsterdam, The Netherlands, Elsevier, pp.22-28.
Gudise V. G. and Venayamooorthy G. K. (2003) Comparison of PSO and back propagation of
training algorithms for neural networks”, IEEE Swarm Intelligence Symposium.
Holland, J. H (1975). Adaptation in natural and artificial systems. University of Michigan
Press.
Jan, R.H., Hwang, F.J. and Cheng, S.T. (1993). Topological optimization of a communication
network subject to a reliability constraint. IEEE Trans on Reliability. Vol. 42, N0.1,
pp.63-70.
Kennedy J. and Eberhart R. (1997). A discrete binary version of the particle swarm
optimization”. Proceedings of IEEE International Conference on Neural Networks,
Perth, Australia,Vol. 4, pp. 4104-4108.
Lin, M. S. (1994). The reliability analysis on distributed computing systems. PhD
Dissertation, Institute of Computer Science and Information Engineering, National
Chiao Tung University, Hsinchu, Taiwan, R.O.C., pp.64-75.
Pierre, S. and Legault, G. (1988). A genetic algorithm for designing distributed computer
network topologies. IEEE Transactions on Systems, Man and Cybernetics. Part B:
Cybernetics, Vol.28, No.2.
Yeh Y. S., Chiu C. C. and Chen R. S. (2001). A genetic algorithm for K-node set optimization
with capacity constraint of a distributed system. Proceedings National Science Council
ROC (A), Vol. 25, No. 1, pp. 27-34.
Yeh M. S., Lin J. S. and Yeh W. C. (1994). A new Monte Carlo method for estimating
network reliability. Proceedings of the 16th International Conference on Computers
and Industrial Engineering, pp. 723-726.
Zhang W. and Liu Y. (2004). Reactive power optimization based on PSO in a practical power
system”. IEEE, PES Meeting.

More Related Content

What's hot

Novel algorithms for Knowledge discovery from neural networks in Classificat...
Novel algorithms for  Knowledge discovery from neural networks in Classificat...Novel algorithms for  Knowledge discovery from neural networks in Classificat...
Novel algorithms for Knowledge discovery from neural networks in Classificat...Dr.(Mrs).Gethsiyal Augasta
 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
 
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...
Using Neighbor’s State Cross-correlation to Accelerate Adaptation  in Docitiv...Using Neighbor’s State Cross-correlation to Accelerate Adaptation  in Docitiv...
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...paperpublications3
 
Study and Performance Analysis of MOS Technology and Nanocomputing QCA
Study and Performance Analysis of MOS Technology and Nanocomputing QCAStudy and Performance Analysis of MOS Technology and Nanocomputing QCA
Study and Performance Analysis of MOS Technology and Nanocomputing QCAVIT-AP University
 
Neural Networks: Model Building Through Linear Regression
Neural Networks: Model Building Through Linear RegressionNeural Networks: Model Building Through Linear Regression
Neural Networks: Model Building Through Linear RegressionMostafa G. M. Mostafa
 
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...paperpublications3
 
A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...eSAT Publishing House
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...IRJET Journal
 
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...ijcseit
 
A survey on weighted clustering techniques in manets
A survey on weighted clustering techniques in manetsA survey on weighted clustering techniques in manets
A survey on weighted clustering techniques in manetsIAEME Publication
 
STUDY OF TASK SCHEDULING STRATEGY BASED ON TRUSTWORTHINESS
STUDY OF TASK SCHEDULING STRATEGY BASED ON TRUSTWORTHINESS STUDY OF TASK SCHEDULING STRATEGY BASED ON TRUSTWORTHINESS
STUDY OF TASK SCHEDULING STRATEGY BASED ON TRUSTWORTHINESS ijdpsjournal
 
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...IJCSEIT Journal
 
The improved k means with particle swarm optimization
The improved k means with particle swarm optimizationThe improved k means with particle swarm optimization
The improved k means with particle swarm optimizationAlexander Decker
 

What's hot (18)

Novel algorithms for Knowledge discovery from neural networks in Classificat...
Novel algorithms for  Knowledge discovery from neural networks in Classificat...Novel algorithms for  Knowledge discovery from neural networks in Classificat...
Novel algorithms for Knowledge discovery from neural networks in Classificat...
 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...
 
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...
Using Neighbor’s State Cross-correlation to Accelerate Adaptation  in Docitiv...Using Neighbor’s State Cross-correlation to Accelerate Adaptation  in Docitiv...
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...
 
Study and Performance Analysis of MOS Technology and Nanocomputing QCA
Study and Performance Analysis of MOS Technology and Nanocomputing QCAStudy and Performance Analysis of MOS Technology and Nanocomputing QCA
Study and Performance Analysis of MOS Technology and Nanocomputing QCA
 
Neural Networks: Model Building Through Linear Regression
Neural Networks: Model Building Through Linear RegressionNeural Networks: Model Building Through Linear Regression
Neural Networks: Model Building Through Linear Regression
 
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
 
6119ijcsitce01
6119ijcsitce016119ijcsitce01
6119ijcsitce01
 
A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
 
A survey on weighted clustering techniques in manets
A survey on weighted clustering techniques in manetsA survey on weighted clustering techniques in manets
A survey on weighted clustering techniques in manets
 
STUDY OF TASK SCHEDULING STRATEGY BASED ON TRUSTWORTHINESS
STUDY OF TASK SCHEDULING STRATEGY BASED ON TRUSTWORTHINESS STUDY OF TASK SCHEDULING STRATEGY BASED ON TRUSTWORTHINESS
STUDY OF TASK SCHEDULING STRATEGY BASED ON TRUSTWORTHINESS
 
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
 
The improved k means with particle swarm optimization
The improved k means with particle swarm optimizationThe improved k means with particle swarm optimization
The improved k means with particle swarm optimization
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
Karas and atila
Karas and atilaKaras and atila
Karas and atila
 

Similar to 3 article azojete vol 7 24 33

Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Alexander Decker
 
Energy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LCEnergy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LCpaperpublications3
 
OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...
OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...
OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...ijngnjournal
 
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction NetworkEDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction Networkgerogepatton
 
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction NetworkEDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction Networkgerogepatton
 
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...cscpconf
 
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETSFAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETScsandit
 
Fitness function X-means for prolonging wireless sensor networks lifetime
Fitness function X-means for prolonging wireless sensor  networks lifetimeFitness function X-means for prolonging wireless sensor  networks lifetime
Fitness function X-means for prolonging wireless sensor networks lifetimeIJECEIAES
 
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...csandit
 
APPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINES
APPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINESAPPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINES
APPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINEScseij
 
Application of particle swarm optimization to microwave tapered microstrip lines
Application of particle swarm optimization to microwave tapered microstrip linesApplication of particle swarm optimization to microwave tapered microstrip lines
Application of particle swarm optimization to microwave tapered microstrip linescseij
 
Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...ijfcstjournal
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
 
An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...
An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...
An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...IRJET Journal
 
Data clustering using kernel based
Data clustering using kernel basedData clustering using kernel based
Data clustering using kernel basedIJITCA Journal
 
Artificial Intelligence Applications in Petroleum Engineering - Part I
Artificial Intelligence Applications in Petroleum Engineering - Part IArtificial Intelligence Applications in Petroleum Engineering - Part I
Artificial Intelligence Applications in Petroleum Engineering - Part IRamez Abdalla, M.Sc
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 

Similar to 3 article azojete vol 7 24 33 (20)

Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)
 
Energy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LCEnergy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LC
 
OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...
OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...
OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction NetworkEDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
 
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction NetworkEDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
 
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
 
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETSFAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
 
Fitness function X-means for prolonging wireless sensor networks lifetime
Fitness function X-means for prolonging wireless sensor  networks lifetimeFitness function X-means for prolonging wireless sensor  networks lifetime
Fitness function X-means for prolonging wireless sensor networks lifetime
 
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
 
APPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINES
APPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINESAPPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINES
APPLICATION OF PARTICLE SWARM OPTIMIZATION TO MICROWAVE TAPERED MICROSTRIP LINES
 
Application of particle swarm optimization to microwave tapered microstrip lines
Application of particle swarm optimization to microwave tapered microstrip linesApplication of particle swarm optimization to microwave tapered microstrip lines
Application of particle swarm optimization to microwave tapered microstrip lines
 
L010628894
L010628894L010628894
L010628894
 
Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
 
Bz02516281633
Bz02516281633Bz02516281633
Bz02516281633
 
An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...
An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...
An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...
 
Data clustering using kernel based
Data clustering using kernel basedData clustering using kernel based
Data clustering using kernel based
 
Artificial Intelligence Applications in Petroleum Engineering - Part I
Artificial Intelligence Applications in Petroleum Engineering - Part IArtificial Intelligence Applications in Petroleum Engineering - Part I
Artificial Intelligence Applications in Petroleum Engineering - Part I
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 

More from Oyeniyi Samuel

Particle Swarm Optimization (PSO)-Based Distributed Power Control Algorithm f...
Particle Swarm Optimization (PSO)-Based Distributed Power Control Algorithm f...Particle Swarm Optimization (PSO)-Based Distributed Power Control Algorithm f...
Particle Swarm Optimization (PSO)-Based Distributed Power Control Algorithm f...Oyeniyi Samuel
 
Equilibrium and Kinetic Studies of Adsorption of Safranin-O from Aqueous Solu...
Equilibrium and Kinetic Studies of Adsorption of Safranin-O from Aqueous Solu...Equilibrium and Kinetic Studies of Adsorption of Safranin-O from Aqueous Solu...
Equilibrium and Kinetic Studies of Adsorption of Safranin-O from Aqueous Solu...Oyeniyi Samuel
 
Design Description of a Tentacle Based Scanning System
Design Description of a Tentacle Based Scanning SystemDesign Description of a Tentacle Based Scanning System
Design Description of a Tentacle Based Scanning SystemOyeniyi Samuel
 
Profiled Deck Composite Slab Strength Verification: A Review
Profiled Deck Composite Slab Strength Verification: A ReviewProfiled Deck Composite Slab Strength Verification: A Review
Profiled Deck Composite Slab Strength Verification: A ReviewOyeniyi Samuel
 
Optimization of Mechanical Expression of Castor Seeds Oil (Ricinus communis) ...
Optimization of Mechanical Expression of Castor Seeds Oil (Ricinus communis) ...Optimization of Mechanical Expression of Castor Seeds Oil (Ricinus communis) ...
Optimization of Mechanical Expression of Castor Seeds Oil (Ricinus communis) ...Oyeniyi Samuel
 
Inundation and Hazard Mapping on River Asa, using GIS
Inundation and Hazard Mapping on River Asa, using GISInundation and Hazard Mapping on River Asa, using GIS
Inundation and Hazard Mapping on River Asa, using GISOyeniyi Samuel
 
A Review of Smart Grids Deployment Issues in Developing Countries
A Review of Smart Grids Deployment Issues in Developing CountriesA Review of Smart Grids Deployment Issues in Developing Countries
A Review of Smart Grids Deployment Issues in Developing CountriesOyeniyi Samuel
 
NOx Emission in Iron and Steel Production: A Review of Control Measures for S...
NOx Emission in Iron and Steel Production: A Review of Control Measures for S...NOx Emission in Iron and Steel Production: A Review of Control Measures for S...
NOx Emission in Iron and Steel Production: A Review of Control Measures for S...Oyeniyi Samuel
 
Artificial Neural Network Modelling of the Energy Content of Municipal Solid ...
Artificial Neural Network Modelling of the Energy Content of Municipal Solid ...Artificial Neural Network Modelling of the Energy Content of Municipal Solid ...
Artificial Neural Network Modelling of the Energy Content of Municipal Solid ...Oyeniyi Samuel
 
Development of Inundation Map for Hypothetical Asa Dam Break using HEC-RAS an...
Development of Inundation Map for Hypothetical Asa Dam Break using HEC-RAS an...Development of Inundation Map for Hypothetical Asa Dam Break using HEC-RAS an...
Development of Inundation Map for Hypothetical Asa Dam Break using HEC-RAS an...Oyeniyi Samuel
 
Job Safety Assessment of Woodwork Industry in the South-western Nigeria
Job Safety Assessment of Woodwork Industry in the South-western NigeriaJob Safety Assessment of Woodwork Industry in the South-western Nigeria
Job Safety Assessment of Woodwork Industry in the South-western NigeriaOyeniyi Samuel
 
Anaerobicaly - Composted Environmental Wastes as Organic Fertilizer and Ident...
Anaerobicaly - Composted Environmental Wastes as Organic Fertilizer and Ident...Anaerobicaly - Composted Environmental Wastes as Organic Fertilizer and Ident...
Anaerobicaly - Composted Environmental Wastes as Organic Fertilizer and Ident...Oyeniyi Samuel
 
Security Architecture for Thin Client Network
Security Architecture for Thin Client NetworkSecurity Architecture for Thin Client Network
Security Architecture for Thin Client NetworkOyeniyi Samuel
 
Algorithm for the Dynamic Analysis of Plane Rectangular Rigid Frame Subjected...
Algorithm for the Dynamic Analysis of Plane Rectangular Rigid Frame Subjected...Algorithm for the Dynamic Analysis of Plane Rectangular Rigid Frame Subjected...
Algorithm for the Dynamic Analysis of Plane Rectangular Rigid Frame Subjected...Oyeniyi Samuel
 
Comparism of the Properties and Yield of Bioethanol from Mango and Orange Waste
Comparism of the Properties and Yield of Bioethanol from Mango and Orange WasteComparism of the Properties and Yield of Bioethanol from Mango and Orange Waste
Comparism of the Properties and Yield of Bioethanol from Mango and Orange WasteOyeniyi Samuel
 
Development of Farm Records Software
Development of Farm Records SoftwareDevelopment of Farm Records Software
Development of Farm Records SoftwareOyeniyi Samuel
 
Compressive Strength of Concrete made from Natural Fine Aggregate Sources in ...
Compressive Strength of Concrete made from Natural Fine Aggregate Sources in ...Compressive Strength of Concrete made from Natural Fine Aggregate Sources in ...
Compressive Strength of Concrete made from Natural Fine Aggregate Sources in ...Oyeniyi Samuel
 
Evaluation of Chemical and Physico-Mechanical Properties of Ado-Ekiti Natural...
Evaluation of Chemical and Physico-Mechanical Properties of Ado-Ekiti Natural...Evaluation of Chemical and Physico-Mechanical Properties of Ado-Ekiti Natural...
Evaluation of Chemical and Physico-Mechanical Properties of Ado-Ekiti Natural...Oyeniyi Samuel
 
Modeling and Simulation of Pyrolysis Process for a Beech Wood Material
Modeling and Simulation of Pyrolysis Process for a Beech Wood MaterialModeling and Simulation of Pyrolysis Process for a Beech Wood Material
Modeling and Simulation of Pyrolysis Process for a Beech Wood MaterialOyeniyi Samuel
 
An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...Oyeniyi Samuel
 

More from Oyeniyi Samuel (20)

Particle Swarm Optimization (PSO)-Based Distributed Power Control Algorithm f...
Particle Swarm Optimization (PSO)-Based Distributed Power Control Algorithm f...Particle Swarm Optimization (PSO)-Based Distributed Power Control Algorithm f...
Particle Swarm Optimization (PSO)-Based Distributed Power Control Algorithm f...
 
Equilibrium and Kinetic Studies of Adsorption of Safranin-O from Aqueous Solu...
Equilibrium and Kinetic Studies of Adsorption of Safranin-O from Aqueous Solu...Equilibrium and Kinetic Studies of Adsorption of Safranin-O from Aqueous Solu...
Equilibrium and Kinetic Studies of Adsorption of Safranin-O from Aqueous Solu...
 
Design Description of a Tentacle Based Scanning System
Design Description of a Tentacle Based Scanning SystemDesign Description of a Tentacle Based Scanning System
Design Description of a Tentacle Based Scanning System
 
Profiled Deck Composite Slab Strength Verification: A Review
Profiled Deck Composite Slab Strength Verification: A ReviewProfiled Deck Composite Slab Strength Verification: A Review
Profiled Deck Composite Slab Strength Verification: A Review
 
Optimization of Mechanical Expression of Castor Seeds Oil (Ricinus communis) ...
Optimization of Mechanical Expression of Castor Seeds Oil (Ricinus communis) ...Optimization of Mechanical Expression of Castor Seeds Oil (Ricinus communis) ...
Optimization of Mechanical Expression of Castor Seeds Oil (Ricinus communis) ...
 
Inundation and Hazard Mapping on River Asa, using GIS
Inundation and Hazard Mapping on River Asa, using GISInundation and Hazard Mapping on River Asa, using GIS
Inundation and Hazard Mapping on River Asa, using GIS
 
A Review of Smart Grids Deployment Issues in Developing Countries
A Review of Smart Grids Deployment Issues in Developing CountriesA Review of Smart Grids Deployment Issues in Developing Countries
A Review of Smart Grids Deployment Issues in Developing Countries
 
NOx Emission in Iron and Steel Production: A Review of Control Measures for S...
NOx Emission in Iron and Steel Production: A Review of Control Measures for S...NOx Emission in Iron and Steel Production: A Review of Control Measures for S...
NOx Emission in Iron and Steel Production: A Review of Control Measures for S...
 
Artificial Neural Network Modelling of the Energy Content of Municipal Solid ...
Artificial Neural Network Modelling of the Energy Content of Municipal Solid ...Artificial Neural Network Modelling of the Energy Content of Municipal Solid ...
Artificial Neural Network Modelling of the Energy Content of Municipal Solid ...
 
Development of Inundation Map for Hypothetical Asa Dam Break using HEC-RAS an...
Development of Inundation Map for Hypothetical Asa Dam Break using HEC-RAS an...Development of Inundation Map for Hypothetical Asa Dam Break using HEC-RAS an...
Development of Inundation Map for Hypothetical Asa Dam Break using HEC-RAS an...
 
Job Safety Assessment of Woodwork Industry in the South-western Nigeria
Job Safety Assessment of Woodwork Industry in the South-western NigeriaJob Safety Assessment of Woodwork Industry in the South-western Nigeria
Job Safety Assessment of Woodwork Industry in the South-western Nigeria
 
Anaerobicaly - Composted Environmental Wastes as Organic Fertilizer and Ident...
Anaerobicaly - Composted Environmental Wastes as Organic Fertilizer and Ident...Anaerobicaly - Composted Environmental Wastes as Organic Fertilizer and Ident...
Anaerobicaly - Composted Environmental Wastes as Organic Fertilizer and Ident...
 
Security Architecture for Thin Client Network
Security Architecture for Thin Client NetworkSecurity Architecture for Thin Client Network
Security Architecture for Thin Client Network
 
Algorithm for the Dynamic Analysis of Plane Rectangular Rigid Frame Subjected...
Algorithm for the Dynamic Analysis of Plane Rectangular Rigid Frame Subjected...Algorithm for the Dynamic Analysis of Plane Rectangular Rigid Frame Subjected...
Algorithm for the Dynamic Analysis of Plane Rectangular Rigid Frame Subjected...
 
Comparism of the Properties and Yield of Bioethanol from Mango and Orange Waste
Comparism of the Properties and Yield of Bioethanol from Mango and Orange WasteComparism of the Properties and Yield of Bioethanol from Mango and Orange Waste
Comparism of the Properties and Yield of Bioethanol from Mango and Orange Waste
 
Development of Farm Records Software
Development of Farm Records SoftwareDevelopment of Farm Records Software
Development of Farm Records Software
 
Compressive Strength of Concrete made from Natural Fine Aggregate Sources in ...
Compressive Strength of Concrete made from Natural Fine Aggregate Sources in ...Compressive Strength of Concrete made from Natural Fine Aggregate Sources in ...
Compressive Strength of Concrete made from Natural Fine Aggregate Sources in ...
 
Evaluation of Chemical and Physico-Mechanical Properties of Ado-Ekiti Natural...
Evaluation of Chemical and Physico-Mechanical Properties of Ado-Ekiti Natural...Evaluation of Chemical and Physico-Mechanical Properties of Ado-Ekiti Natural...
Evaluation of Chemical and Physico-Mechanical Properties of Ado-Ekiti Natural...
 
Modeling and Simulation of Pyrolysis Process for a Beech Wood Material
Modeling and Simulation of Pyrolysis Process for a Beech Wood MaterialModeling and Simulation of Pyrolysis Process for a Beech Wood Material
Modeling and Simulation of Pyrolysis Process for a Beech Wood Material
 
An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...
 

Recently uploaded

Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESkarthi keyan
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
Forming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptForming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptNoman khan
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProRay Yuan Liu
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectGayathriM270621
 

Recently uploaded (20)

Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
Forming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptForming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).ppt
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision Pro
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subject
 

3 article azojete vol 7 24 33

  • 1. Arid Zone Journal of Engineering, Technology and Environment. August, 2010; Vol.7, 24 -33 Copyright© Faculty of Engineering, University of Maiduguri, Nigeria. Print ISSN: 1596-2490, Electronic ISSN: 2545-5818 www.azojete.com.ng K-NODE SET RELIABILITY OPTIMIZATION OF A DISTRIBUTED COMPUTING SYSTEM USING PARTICLE SWARM ALGORITHM Bakare, G.A.,1 Chiroma, I.N. 2 and Ibrahim, A.A.3 Abstract A discrete Particle Swarm algorithm is proposed to solve a typical combinatorial optimization problem: K-Node Set Reliability (KNR) optimization of a distributed computing system (DCS) which is a well-known NP-hard problem is presented in this paper. The reliability of a subset of network nodes of a DCS is determined such that the reliability is maximized and specified capacity constraint is satisfied. The proposed algorithm is demonstrated on an 8 node 11 link DCS topology. The test results show that the proposed algorithm can achieve good solution quality and convergence characteristics. 1. Introduction Advances in computer networks and low cost computing elements have led to increasing interest in Distributed Computing System (DCS). Among the numerous merits of using a DCS include more effective resource sharing, better fault tolerance, and higher reliability. In designing such systems, reliability must be considered, which largely relies on the topological layout of the communication links (Jan et al., 1993; Lin, 1994). Almost all of the optimization problems relevant to distributed computing system design are NP-complete. That is, for most problems, there is no known algorithm that could guarantee finding the global optimum in a polynomial amount of time. Several DCS reliability measures have been developed and one of these distributed system reliability measures, K-Node reliability (KNR), is adopted in Chen et al. (1994). Reliability optimization is the design of distributed computing systems, where KNR is viewed as the probability that all k (a subset of the processing elements) nodes in the DCS can be run successfully. They presented a heuristic algorithm for maximizing reliability by the node select problem to obtain an optimal design DCS. Their work did not consider an exhaustive method because it is too time consuming. Instead, they applied the exact algorithm, which examine k-node set reliability optimization with a capacity constraint to find an optimal solution of k-node reliability. The heuristic algorithm work well for large DCS problems as it largely avoids unnecessary generation of spanning trees. They regarded the DCS as a weighted graph, in which the weight of each node represents its capacity and generate k-node disjoint terms using a k-tree disjoint reduction method to obtain the KNR. This reduces the disjoint terms and hence reduces the computation time. In Chen (1993), K-node set reliability optimization with capacity constraint for a DCS was examined using exact method. This method can obtain an optimal solution but cannot effectively reduce the problem space. Moreover, exact method spends more execution time 1 Department of Electrical Engineering Programme, Abubakar Tafawa Balewa University, Bauchi. Nigeria. e-mail: bakare_03@yahoo.com 2 University Computer Centre, Abubakar Tafawa Balewa University, Bauchi. Nigeria. e-mail: inchiroma@yahoo.com 3 Department of Electrical & Electronics Engineering, University of Maiduguri, Maiduguri. Nigeria. e-mail:ibrahim_ali@yahoo.com
  • 2. K-node set reliability optimization of a distributed computing system using particle swarm algorithm 25 with a large DCS. In fact, most distributed system problems are large and an increase in the number of nodes causes the exact method execution time to grow exponentially. Occasionally, therefore an application requiring an efficient algorithm with an approximate solution is highly attractive. In many cases, complex heuristics have to be developed to achieve satisfying results. Previous approaches have either been enumerative-based, which are applicable only for small DCS sizes (Aggarwal et al., 1982), or heuristic-based, which can only be applied to larger networks, but do not guarantee optimality. Therefore other heuristic approaches are required. There exist a number of researches, which deal with such approaches as discussed in Pierre et al. (1998). Genetic algorithm (GA) is one of such heuristics that have been found to be a very good computational tool for problem of this nature. They can be applied to search large, multimodal, complex problem spaces (Holland, 1975; Bakare, 2001). In Davis et al. (1987), a genetic algorithm to determine the link capacities of a network, initially generated by the software called DESIGNET was proposed. Chiroma (2005) applied GA to the optimization of K-node set reliability of a distributed computing system. Good results in terms of solution quality and convergence characteristics were obtained. Cheng (1998) employed GA approach in the backbone network design under the constraint: minimal total link cost and 1-FT (fault-tolerant to 1 link-failure). Kennedy and Eberhart proposed a new evolutionary computation technique called particle swarm optimization (PSO) in 1995. This method was developed through the simulation of a simplified social system and has been found to be robust in solving continuous non-linear optimization problems (Gudise et al. 2003; Abido 2002; Kennedy et al., 1997; Zhang, 2004). Particle swarm algorithms differ from other evolutionary algorithms most importantly in both metaphorical explanations and how they work. The individuals (particles) persist over time, influencing one another’s search of the problem space, unlike genetic algorithm where the weakest chromosomes are immediately discarded. The particles in PSO (similar to chromosomes in GA) are known to have fast convergence to local / global optimum position (s) over a small number of iterations. In this paper, an innovative particle swarm algorithm, called discrete PSO for K-node set reliability optimization of a distributed computing system is presented. The feasibility of the proposed algorithm is demonstrated on a typical DCS topology obtained from Cheng (1998). Simulation shows that the proposed algorithm can achieve good results in terms of solution quality and convergence characteristics. 2. Problem formulation The KNR problem is characterized as follows: Given the topology of an undirected DCS, the reliability of each communication link, the capacity of each node and a possible set of data files, and assume that each node is perfectly reliable and each link is either in the working state or failed state. The problem can be mathematically stated thus: Maximize R (Gk) (1) Subject to: ∑c (vi) ≥ C constraint (2)
  • 3. AZOJETE Vol. 7 2010 26 Where Gk is the graph G with set k of nodes specified, k ≥ 2, R(Gk) is the reliability of the k-node set, vi is an ith node which represents the ith processing element, c(vi) is the capacity of the ith node and Cconstraint is the total capacity constraint in the DCS . 3. Applied software techniques 3.1 Overview of Particle Swarm Optimization Technique Particle swarm optimization (PSO ) is an evolutionary computation technique that was originally developed in 1995 by Kennedy and Eberhart. It has been developed through simulation of simplified social models and has been found to be robust for solving non-linear, non-differentiability multiple optimal and multi-objective problems. The features of the technique are as follows:  It is based on a simple concept and has high quality solution with stable convergence.  The method is based on the researches about swarms such as fish schooling and bird flocking.  It was originally developed for non-linear optimization with continuous variables; however it is easily expanded to treat problems with discrete variables. Therefore it is applicable to K-node reliability optimization of a distributing computing system. PSO is an evolutionary technique that does not implement survival of the fittest. Unlike other evolutionary algorithms where an evolutionary operator is manipulated, each individual in the swarm flies in the search space with a velocity which is dynamically adjusted according to its own flying experience and its companions flying experience. The system initially has a population of random solutions. Each potential solution, called a particle, is given a random velocity and is flown through the problem space. The particles have memory and each particle keeps track of its previous best position, called the pbest and its corresponding fitness. There exist a number of pbest for the respective particles in the swarm and the particle with greatest fitness is called the global best (gbest ) of the swarm. The basic concept of the PSO method lies in accelerating each particle towards its pbest and gbest locations, with random weight acceleration at each time step. The modified velocity of each particle can be computed using the current velocity and the distance from pbest and gbest as given by:    2211 1 k idid k idid k id k id xgbestrandcxpbestrandcVWV  (3) In the discrete version of the PSO, the trajectories are changed in the probability that a coordinate will take on a binary value (0 or 1). Therefore, the positions are computed using: 0else 1enth))(( 1 11     k id k id k id x xVSrandif (4) Where: S(V) is a sigmoid limiting transformation function given by:  V eVS   11)( (5) rand , rand1 and rand2 : random numbers between 0 and 1 Vk id : current velocity of individual i at iteration k
  • 4. K-node set reliability optimization of a distributed computing system using particle swarm algorithm 27 Vmin id ≤Vk id ≤ Vmax id Vk+1 id : modified velocity of individual i xk id : current position of individual i at iteration k pbestid : pbest of individual i gbestid : gbest of the group c1 and c2: the weighting of the stochastic acceleration that pulls each particle towards pbest and gbest . W : inertia weight factor that controls the exploitation and exploration of the search space by dynamically adjusting the velocity. It is computed using: max minmax max iter gen WW WW    (6) genmax : maximum generation iter : current iteration number. 3.2 Overview of Genetic Algorithms Based Technique Genetic Algorithms (GAs), first proposed by John Holland in the 1960’s, are numerical optimization algorithms based on principles inspired from the genetic and evolution mechanisms observed in natural systems and populations of living beings (Bakare, 2001). The robust behaviour, which is the distinguishing feature of GAs with respect to other optimization methods, implies that GAs must differ in the following fundamental ways:  It searches from a population of candidates and do not process only one single solution; thus, they are resistant to being trapped in local optima.  GAs use probabilistic transition rules and not deterministic rules.  GAs exploit only the payoff information of the objective function to guide their search towards the global optimum. They do not depend on any additional information like the existence of derivatives. One of the disadvantages of GA search is the large number of function evaluations, with the resulting undesirably long execution time. Binary encoding GAs deals with binary strings, where the number of bits of each string simulates the genes of an individual chromosome, and the number of individuals constitutes a population. Each parameter set is encoded into a series of a fixed length of string symbols, usually from the binary bits, which are then concatenated into a complete string called chromosome. Sub-strings of specified length are extracted successively from the concatenated string and are then decoded and mapped into the value in the corresponding search space. Generally, GAs implementation comprises three different phases: initial population generation, fitness evaluation and genetic operations (Bakare, 2001).
  • 5. AZOJETE Vol. 7 2010 28 4. Implementation of the proposed technique Particle swarm K-node reliability optimization is developed as follows: 4.1 Representation of Individual String Before using the binary PSO algorithm to solve the KNR combinatorial optimization problem, the representation of a particle must be defined. A particle is also called an individual. The problem involves a capacity constraint. The network topology is fixed. The size of every node is also fixed. Binary coding scheme is therefore employed. The length of a chromosome is equal to the number of network nodes of the form: xn, xn-1,.. xi-1,… x2, x1 (7) Each bit indicates whether the node is selected for the k-node set, where xi = 1 if vi is selected; otherwise xi = 0. 4.2 Initialization The DCS parameter such as the number of nodes (n), the number of links (e), each link’s reliability (aij) and unreliability (bij), each node’s capacity, c(vi), capacity constraint (Cconstraint), etc are entered into the FORTRAN program. The PSO parameters such as particle size (ps), minimum and maximum inertia weights, Wmin and Wmax , the limit of velocity change Vmin and Vmax , maximum generation (genmax ), acceleration constants c1 and c2, etc are also entered. For each node vi, if the degree of vi is d(vi) and if the links ei,k1, ei,k2, ei,k3, …, ei,kd(vi) are adjacent to vi, then its weight can be computed as in Yeh (2001) using:   (8)))..)(..((*((* )(32211 ,,,,,, ivdkikikikikikii bababavw  Where i, k1, k2, …, kd(vi) ϵ {1, n}. The heaviest node is then determined. Initial population of chromosome Xi =[xn, .., x1] ϵ X are randomly generated with the heaviest node included. The node capacity that includes this chromosome is computed. If the sum of the capacity of this chromosome satisfies the capacity constraint, then it is appended to the population, otherwise it is discarded. 4.3 Evaluation function The objective function of chromosome is then computed using Yeh et al. (2001):   2/deg  kratioratioprdlf kk (9) Where )1(,            kkaratioprdl kjki Gv ji Gv k 
  • 6. K-node set reliability optimization of a distributed computing system using particle swarm algorithm 29  knvdratio ki Gv ik 1)(deg           nk 2 The fitness values that determine which chromosomes are to be carried onto the next generation are computed from the objective function equation. 4.3 Implementation of the PSO for KNR The main steps involved in the searching procedures of the proposed PSO method are given by the following: Step 1: Read the DCS data and the PSO parameters. Compute the weight of each node using Equation (8) and select the heaviest node. Step 2: Generate randomly initial population of particles with random positions and velocities and the heaviest node included. The node capacity that includes this chromosome is computed. If the sum of the capacity of this chromosome satisfies the capacity constraint, then it is appended to the population, otherwise it is discarded. Step 3: Compute the fitness value of the initial particles in the swarm using the objective function (Equation 9). Set the initial pbest to current position of each particle and the initial best evaluated values among the swarm is set to gbest . Step 4: Update the generation count. Step 5: Update the velocities and the positions according to Equations (3) and (4) respectively. Step 6: Compute the fitness value of the new particles in the swarm using Equation (9). Update the pbest with new positions if the particle’s present fitness is better than the previous one. Also update the gbest with the best in the population swarm. Step 7: Repeat steps 4 to 6 until the preset convergence criterion: maximum number of generations is fulfilled. Step 8: Compute the reliability R (GK) of the optimal K-node set result in the chromosome of the population using Monte Carlo technique (Lin et al. 1994) and output the K-node set corresponding to the R (GK).
  • 7. AZOJETE Vol. 7 2010 30 5. Results and discussion The procedure described above was implemented using the FORTRAN language and the developed software program was executed on a 450 MHz Pentium III PC. To illustrate the effectiveness of the proposed method, a distributed computing system topology obtained from Chen et al. (1993) was considered. The topology of the distributed computing system with eight (8) nodes, and eleven (11) links, was considered as a case study where c (vi) represents the capacity of nodes vi, and aij represents the reliability of the link eij. v2 v4v3 e67 v5 v7 v6 e18 e17 e68 e56 e46 e48 e45 e34 e12 e18 v8v1 e23 Figure 1: A DCS with 8 nodes and 11 links Benchmark input data for DCS are: c (v1) = 39, c(v2) = 45, c(v3) = 38, c(v4) = 53, c(v5) = 47, c (v6) = 49, c(v7) = 51, c(v8) = 41. a12= 0.89, a17= 0.81, a18= 0.93, a23= 0.85, a34= 0.91, a45= 0.82, a46= 0.83, a48= 0.96, a56= 0.87, a67= 0.84, a68= 0.88. Cconstraint ≥ 100. The proposed approach was then applied to this problem and the optimum parameter setting for the PSO is shown in Table I. Table I: Optimum parameter setting for PSO C1 2 C2 2 Vmax 2 Vmin -2 genmax 50 Particle size (PS) 20 Wmax 0.9 Wmin 0.4
  • 8. K-node set reliability optimization of a distributed computing system using particle swarm algorithm 31 The maximum fitness value of 0.701 was achieved and the chromosomes are 0001010 (from left to right). The k-node set in the population chromosome is {v4, v6}, i.e. nodes 4 and 6. The algorithm then computes the reliability and output the k-node set, which is the highest reliability k-node set, and R ({v4, v6}) = 0.9974. It can therefore be seen that the same solution quality was achieved by the PSO when compared with GA approach (Chiroma, 2005) and the exact method (Chen et al., 1993). The convergence characteristic of PSO is as shown in Figure 2. The convergence characteristics of both GA and PSO methods are comparatively shown in Figure 3. As can be seen from this figure, both the PSO and GA have rapid convergence characteristics. GA achieved the maximum fitness earlier than the PSO: second and third generations respectively. 0.2 0.3 0.4 0.5 0.6 0.7 0.8 1 8 15 22 29 36 43 50 Generation number Fitnessvalue Average fitness Maximum fitness Figure 2: Convergence characteristics of PSO 0.4 0.45 0.5 0.55 0.6 0.65 0.7 0.75 1 7 13 19 25 31 37 43 49 Generation number Fitnessvalue GA maximum fitness PSO maximum fitness Figure 3: Comparison of convergence characteristics of PSO & GA This shows that PSO has good convergence characteristics and is less prone to being trapped into local optimal. Finally, PSO has less parameter settings when compared to GA.
  • 9. AZOJETE Vol. 7 2010 32 Comparing the complexity of the proposed method with that of exact method, the complexity of the exact method is O (2e x 2n), where e denotes the number of edges (links) and n represents the number of nodes (Chen et al., 1994). With our proposed algorithm, however, in the worst case, the complexity of evaluating the weight of each node is O(e), that of selecting the heaviest node is O(n), and that of computing the reliability of the k- node set is O(m2), where m represents the number of paths of the selected k-node set (Aziz, 1982). Therefore, the complexity of the proposed algorithm is O (n*ps*ng+m2), where ps is the population size, and ng is the total number of generation. Although the conventional techniques can yield an optimal solution, they cannot effectively reduce the number of reliability computations. Some applications, especially NP-complete problems, often require an efficient algorithm for computing the reliability. Under this circumstance deriving the optimal reliability may not be feasible. So an efficient algorithm, even when it yields only approximate reliability, is preferred. 4. Conclusions In this paper, comparison is made between the particle swarm optimization and genetic algorithm based K-node set reliability optimization. The efficiency and accuracy of the proposed algorithm has been verified by implementing the procedure using FORTRAN language program on a Pentium III microcomputer. Verification on a typical DCS topology revealed that PSO achieved the same good solution quality as compared with GA and exact method. PSO exhibits good convergence characteristics and is less prone to being caught at the local optimal. The proposed algorithm can efficiently obtain the optimal k-node set reliability with a capacity constraint. References Abido M. A. (2002). Optimal design of power system stabilizers using PSO. IEEE Transactions on Energy and Conversion. Vol 17, No. 3, pp. 406-413. Aggarwal, K.K., Chopra, Y.C. and Bajwa J.S. (1982). Topological layout of links for optimizing the overall reliability in a computer communication system. Microelectronics and Reliability 22, pp.347-351 Aziz M. A., (1982). Path set enumeration of directed graphs by the set theoretic method. Microelectronics and Reliability, Vol. 5, No. 37, pp. 809-814. Bakare, G. A. (2001). Removal of Overloads and Voltage Problem in Electric Power Systems using Genetic Algorithm/Expert Systems Approaches. Ph.D. Dissertation published by Shaker Verlag, Germany. Chen R. S., Chen, D. J. and Yel, Y. S. (1994). Reliability optimization in the design of distributed computing systems. Proceedings of Int. Conference on Computing and Information Institute of Computer Science and Engineering of National Chiao Tung University, Hsinchu, Taiwan. R.O.C., pp.422-439.
  • 10. K-node set reliability optimization of a distributed computing system using particle swarm algorithm 33 Chen R. S., Chen, D. J. and Yel, Y. S. (1993). Reliability optimization of distributed computing systems subject to capacity constraint. International journal of Computers & Mathematics with Applications. 29(3), pp. 93-99. Cheng S. T. (1998) Topological optimization of a reliable communications network. IEEE Trans. on Reliability. Vol.47, No.3, pp. 225-233. Chiroma I. N. (2005) A genetic algorithm- based efficient optimization of K-node set reliability for distributed computing system. MSc. Thesis (Computer Science), Abubakar Tafawa Balewa University, Bauchi, Nigeria. Davis, L. and Coombs, S. (1987). Optimizing network link sizes with genetic algorithms in modelling and simulation methodology. Knowledge System’s Paradegins. Amsterdam, The Netherlands, Elsevier, pp.22-28. Gudise V. G. and Venayamooorthy G. K. (2003) Comparison of PSO and back propagation of training algorithms for neural networks”, IEEE Swarm Intelligence Symposium. Holland, J. H (1975). Adaptation in natural and artificial systems. University of Michigan Press. Jan, R.H., Hwang, F.J. and Cheng, S.T. (1993). Topological optimization of a communication network subject to a reliability constraint. IEEE Trans on Reliability. Vol. 42, N0.1, pp.63-70. Kennedy J. and Eberhart R. (1997). A discrete binary version of the particle swarm optimization”. Proceedings of IEEE International Conference on Neural Networks, Perth, Australia,Vol. 4, pp. 4104-4108. Lin, M. S. (1994). The reliability analysis on distributed computing systems. PhD Dissertation, Institute of Computer Science and Information Engineering, National Chiao Tung University, Hsinchu, Taiwan, R.O.C., pp.64-75. Pierre, S. and Legault, G. (1988). A genetic algorithm for designing distributed computer network topologies. IEEE Transactions on Systems, Man and Cybernetics. Part B: Cybernetics, Vol.28, No.2. Yeh Y. S., Chiu C. C. and Chen R. S. (2001). A genetic algorithm for K-node set optimization with capacity constraint of a distributed system. Proceedings National Science Council ROC (A), Vol. 25, No. 1, pp. 27-34. Yeh M. S., Lin J. S. and Yeh W. C. (1994). A new Monte Carlo method for estimating network reliability. Proceedings of the 16th International Conference on Computers and Industrial Engineering, pp. 723-726. Zhang W. and Liu Y. (2004). Reactive power optimization based on PSO in a practical power system”. IEEE, PES Meeting.