Shahrood University of Technology
Journal of AI and Data Mining
2322-5211
2322-4444
1
2
2013
01
28
QoS-Based web service composition based on genetic algorithm
63
73
EN
Mohammad
AllamehAmiri
Yazd University
mghpass@yahoo.de
Vali
Derhami
0000-0003-4691-0643
Yazd University
vderhami@yazd.ac.ir
Mohammad
Ghasemzadeh
0000-0002-6805-4852
Yazd University
m.ghasemzadeh@yazd.ac.ir
10.22044/jadm.2013.97
Quality of service (QoS) is an important issue in the design and management of web service composition. QoS in web services consists of various non-functional factors, such as execution cost, execution time, availability, successful execution rate, and security. In recent years, the number of available web services has proliferated, and then offered the same services increasingly. The same web services are distinguished based on their quality parameters. Also, clients usually demand more value added services rather than those offered by single, isolated web services. Therefore, selecting a composition plan of web services among numerous plans satisfies client requirements and has become a challenging and time-consuming problem. This paper has proposed a new composition plan optimizer with constraints based on genetic algorithm. The proposed method can find the composition plan that satisfies user constraints efficiently. The performance of the method is evaluated in a simulated environment.
Web Service,Web Service Composition,Quality of Service,QoS,Genetic Algorithm
https://jad.shahroodut.ac.ir/article_97.html
https://jad.shahroodut.ac.ir/article_97_f7462c7ce4bf1d242d3541b625cf5037.pdf
Shahrood University of Technology
Journal of AI and Data Mining
2322-5211
2322-4444
1
2
2013
02
06
Delay-dependent stability for transparent bilateral teleoperation system: an LMI approach
75
87
EN
Alireza
Khosravi
Department of Electrical and Computer Engineering, Babol University of Technology
akhosravi@nit.ac.ir
Alireza
Alfi
Faculty of Electrical and Robotic Engineering, Shahrood University of Technology
a_alfi@shahroudut.ac.ir
Amir
Roshandel
Department of Electrical and Computer Engineering, Babol University of Technology
a.roshandel@stu.nit.ac.ir
10.22044/jadm.2013.101
There are two significant goals in teleoperation systems: Stability and performance. This paper introduces an LMI-based robust control method for bilateral transparent teleoperation systems in presence of model mismatch. The uncertainties in time delay in communication channel, task environment and model parameters of master-slave systems is called model mismatch. The time delay in communication channel is assumed to be large, unknown and unsymmetric, but the upper bound of the delay is assumed to be known. The proposed method consists of two local controllers. One local controller namely local slave controller is located on the remote site to control the motion tracking and the other one is located on the local site namely local master controller to preserve the complete transparency by ensuring force tracking and the robust stability of the closed-loop system. To reduce the peak amplitude of output signal respect to the peak amplitude of input signal in slave site, the local slave controller is designed based on a bounded peak-to-peak gain controller. In order to provide a realistic case, an external signal as a noise of force sensor is also considered. Simulation results show the effectiveness of proposed control structure.
Bilateral teleportation system,Complete Transparency,robust control,Large Time Delay,Linear Matrix Inequality
https://jad.shahroodut.ac.ir/article_101.html
https://jad.shahroodut.ac.ir/article_101_b0dd3d8871bb7629d6428f4eb236b1cf.pdf
Shahrood University of Technology
Journal of AI and Data Mining
2322-5211
2322-4444
1
2
2013
01
28
Dynamic anomaly detection by using incremental approximate PCA in AODV-based MANETs
89
101
EN
Meysam
Alikhani
Faculty of Electrical and Computer Engineering Tarbiat Modares University
m.alikhany@gmail.com
Mohammad
Ahmadi Livani
Faculty of Electrical and Computer Engineering Tarbiat Modares Univercity
mohammad.ahmadilivani@gmail.com
10.22044/jadm.2013.100
Mobile Ad-hoc Networks (MANETs) by contrast of other networks have more vulnerability because of having nature properties such as dynamic topology and no infrastructure. Therefore, a considerable challenge for these networks, is a method expansion that to be able to specify anomalies with high accuracy at network dynamic topology alternation. In this paper, two methods proposed for dynamic anomaly detection in MANETs those named IPAD and IAPAD. The anomaly detection procedure consists three main phases: Training, Detection and Updating in these methods. In the IPAD method, to create the normal profile, we use the normal feature vectors and principal components analysis, in the training phase. In detection phase, during each time window, anomaly feature vectors based on their projection distance from the first global principal component specified. In updating phase, at end of each time window, normal profile updated by using normal feature vectors in some previous time windows and increasing principal components analysis. IAPAD is similar to IPAD method with a difference that each node use approximate first global principal component to specify anomaly feature vectors. In addition, normal profile will updated by using approximate singular descriptions in some previous time windows. The simulation results by using NS2 simulator for some routing attacks show that average detection rate and average false alarm rate in IPAD method is 95.14% and 3.02% respectively, and in IAPAD method is 94.20% and 2.84% respectively.
MANETs,Dynamic Anomaly Detection,Routing attacks,Incremental Principal Component Analyses
https://jad.shahroodut.ac.ir/article_100.html
https://jad.shahroodut.ac.ir/article_100_c45350f81d03479610401dc8295ea787.pdf
Shahrood University of Technology
Journal of AI and Data Mining
2322-5211
2322-4444
1
2
2013
02
20
Using the Modified Shuffled Frog Leaping Algorithm for Optimal Sizing and location of Distributed Generation Resources for Reliability Improvement
103
110
EN
Morteza
Haydari
Shahrood Uinversity of Technology
morteza.heydari88@gmail.com
Mahdi
Banejad
Shahrood Uinversity of Technology
m.banejad@gmail.com
Amin
Hahizadeh
0000-0001-7067-1318
Shahrood Uinversity of Technology
aminhajizadeh@gmail.com
10.22044/jadm.2013.114
Restructuring the recent developments in the power system and problems arising from construction as well as the maintenance of large power plants lead to increase in using the Distributed Generation (DG) resources. DG units due to its specifications, technology and location network connectivity can improve system and load point reliability indices. In this paper, the allocation and sizing of distributed generators in distribution electricity networks are determined through using an optimization method. The objective function of the proposed method is based on improving the reliability indices, such as a System Average Interruption Duration Index (SAIDI), and Average Energy Not Supplied (AENS) per customer index at the lowest cost. The optimization is based on the Modified Shuffled Frog Leaping Algorithm (MSFLA) aiming at determining the optimal DG allocation and sizing in the distribution network. The MSFLA is a new mimetic meta-heuristic algorithm with efficient mathematical function and global search capability. To evaluate the proposed algorithm, the 34-bus IEEE test system is used. In addition, the finding of comparative studies indicates the better capability of the proposed method compared with the genetic algorithm in finding the optimal sizing and location of DG’s with respect to the used objective function.
Distributed Generation,Reliability,Optimization,Modified Shuffled Frog Leaping Algorithm
https://jad.shahroodut.ac.ir/article_114.html
https://jad.shahroodut.ac.ir/article_114_246d99eeacade15fd09a93c7a802b7d4.pdf
Shahrood University of Technology
Journal of AI and Data Mining
2322-5211
2322-4444
1
2
2013
02
20
Estimation of LPC coefficients using Evolutionary Algorithms
111
118
EN
Hossein
Marvi
Electrical engineering department, Shahrood university of technology, Shahrood, Iran
h.marvi@shahroodut.ac.ir
Zeynab
Esmaileyan
Electrical engineering department science and research branch, Islamic Azad Univercity, Shahrood, Iran
z.esmaileyan@gmail.com
Ali
Harimi
Department of electrical engineering, Shahrood Branch, Islamic Azad University, Shahrood, Iran
a.harimi@gmail.com
10.22044/jadm.2013.115
The vast use of Linear Prediction Coefficients (LPC) in speech processing systems has intensified the importance of their accurate computation. This paper is concerned with computing LPC coefficients using evolutionary algorithms: Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Dif-ferential Evolution (DE) and Particle Swarm Optimization with Differentially perturbed Velocity (PSO-DV). In this method, evolutionary algorithms try to find the LPC coefficients which can predict the origi-nal signal with minimum prediction error. To this end, the fitness function is defined as the maximum prediction error in all evolutionary algorithms. The coefficients computed by these algorithms compared to coefficients obtained by traditional autocorrelation method in term of prediction accuracy. Our results showed that coefficients obtained by evolutionary algorithms predict the original signal with less prediction error than autocorrelation methods. The maximum prediction error achieved by autocorrelation method, GA, PSO, DE and PSO-DV are 0.35, 0.06, 0.02, 0.07 and 0.001, respectively. This shows that the hybrid algorithm, PSO-DV, is superior to other algorithms in computing linear prediction coefficients.
Linear prediction coefficients,Evolutionary Algorithms,PSO,DE,PSO-DV
https://jad.shahroodut.ac.ir/article_115.html
https://jad.shahroodut.ac.ir/article_115_7cbbc9e97af590d331cd4b8cf3a56ecc.pdf
Shahrood University of Technology
Journal of AI and Data Mining
2322-5211
2322-4444
1
2
2013
04
09
Credit scoring in banks and financial institutions via data mining techniques:
A literature review
119
129
EN
Seyed Mahdi
sadatrasoul
Iran University of Science and Technology(IUST)
sadatrasoul@chmail.ir
Mohammadreza
gholamian
Iran University of Science and Technology(IUST)
gholamian@iust.ac.ir
Mohammad
Siami
Iran University of Science and Technology(IUST)
siamimohammad@yahoo.com
Zeynab
Hajimohammadi
Amirkabir University of Technology
zhajimohammadi@aut.ac.ir
10.22044/jadm.2013.124
This paper presents a comprehensive review of the works done, during the 2000–2012, in the application of data mining techniques in Credit scoring. Yet there isn’t any literature in the field of data mining applications in credit scoring. Using a novel research approach, this paper investigates academic and systematic literature review and includes all of the journals in the Science direct online journal database. The articles are categorized and classified into enterprise, individual and small and midsized (SME) companies credit scoring. Data mining techniques is also categorized to single classifier, Hybrid methods and Ensembles. Variable selection methods are also investigated separately because it’s a major issue in credit scoring problem. The findings of the review reveals that data mining techniques are mostly applied to individual credit score and there are a few researches on enterprise and SME credit scoring. Also ensemble methods, support vector machines and neural network methods are the most favorite techniques used recently. Hybrid methods are investigated in four categories and two of them which are “classification and classification” and “clustering and classification” combinations are used more. Paper analysis provides a guide to future researches and concludes with several suggestions for further studies.
Credit scoring,Banks and financial institutions,Literature review,data mining
https://jad.shahroodut.ac.ir/article_124.html
https://jad.shahroodut.ac.ir/article_124_d11cd26875b6d5e6b2f785de341e924c.pdf