137 research outputs found

    Advances in Evolutionary Algorithms

    Get PDF
    With the recent trends towards massive data sets and significant computational power, combined with evolutionary algorithmic advances evolutionary computation is becoming much more relevant to practice. Aim of the book is to present recent improvements, innovative ideas and concepts in a part of a huge EA field

    Generative Neural Network Approach to Designing and Optimizing Dynamic Inductive Power Transfer Systems

    Get PDF
    Electric vehicles (EVs) offer many improvements over traditional combustion engines including increasing efficiency, while decreasing cost of operation and emissions. There is a need for the development of cheap and efficient charging systems for the future success of EVs. Most EVs currently utilize static plug-in charging systems. An alternative charging method of significant interest is dynamic inductive power transfer systems (DIPT). These systems utilize two coils, one placed in the vehicle and one in the roadway to wirelessly charge the vehicle as it passes over. This method removes the current limitations on EVs where they must stop and statically charge for a period of time. However, the physical designs of the charging unit coils depends on many physical parameters, which leads to complexity when determining how to design the unit. A design then needs to be judged for its quality and performance, for which there are eight proposed objective functions. These objective functions represent performance metrics but are conflicting. Some metrics, such as output power are to be maximized, while others such as stray magnetic field and volume of windings and magnetic cores are to be minimized. Different unit designs will trade off performance for these objectives. In order to address the complex issue of finding near-optimal designs, a machine-learning, Generative Neural Network (GNN) approach is presented for the rapid development of near-optimal DIPT systems. GNNs generate new examples from a trained neural network and have demonstrated remarkable power in creating novel graphic design images from text-to-image training. This stems from their ability to be creative yet constrained in a regular domain. In this case, a simulator network and evaluator generator network are implemented. The simulator is a pre-trained neural network that maps from the physical designs to the objective functions. The generator network is trained to generate the near-optimal physical designs. A design is considered successful if it passes given thresholds for each of the eight objective functions, which evaluate the quality of a design. Before training, the rate of finding successful designs is 0.005%, but within 500 training epochs the rate becomes 98% (about 30 seconds total GPU run time). Engineers and production professionals are interested in both the best performing designs as well as a diversity of configurations to build. In order to improve on these criteria, several different loss functions were developed that incorporate the objective functions. Loss functions are what the neural networks use to determine how to adjust parameters and produce a better design. The various loss functions presented greatly influence the ability of the GNN to produce diverse and high-performance design solutions

    Evolutionary Computation

    Get PDF
    This book presents several recent advances on Evolutionary Computation, specially evolution-based optimization methods and hybrid algorithms for several applications, from optimization and learning to pattern recognition and bioinformatics. This book also presents new algorithms based on several analogies and metafores, where one of them is based on philosophy, specifically on the philosophy of praxis and dialectics. In this book it is also presented interesting applications on bioinformatics, specially the use of particle swarms to discover gene expression patterns in DNA microarrays. Therefore, this book features representative work on the field of evolutionary computation and applied sciences. The intended audience is graduate, undergraduate, researchers, and anyone who wishes to become familiar with the latest research work on this field

    Evolutionary Computation 2020

    Get PDF
    Intelligent optimization is based on the mechanism of computational intelligence to refine a suitable feature model, design an effective optimization algorithm, and then to obtain an optimal or satisfactory solution to a complex problem. Intelligent algorithms are key tools to ensure global optimization quality, fast optimization efficiency and robust optimization performance. Intelligent optimization algorithms have been studied by many researchers, leading to improvements in the performance of algorithms such as the evolutionary algorithm, whale optimization algorithm, differential evolution algorithm, and particle swarm optimization. Studies in this arena have also resulted in breakthroughs in solving complex problems including the green shop scheduling problem, the severe nonlinear problem in one-dimensional geodesic electromagnetic inversion, error and bug finding problem in software, the 0-1 backpack problem, traveler problem, and logistics distribution center siting problem. The editors are confident that this book can open a new avenue for further improvement and discoveries in the area of intelligent algorithms. The book is a valuable resource for researchers interested in understanding the principles and design of intelligent algorithms

    A Multi Agent System for Flow-Based Intrusion Detection

    Get PDF
    The detection and elimination of threats to cyber security is essential for system functionality, protection of valuable information, and preventing costly destruction of assets. This thesis presents a Mobile Multi-Agent Flow-Based IDS called MFIREv3 that provides network anomaly detection of intrusions and automated defense. This version of the MFIRE system includes the development and testing of a Multi-Objective Evolutionary Algorithm (MOEA) for feature selection that provides agents with the optimal set of features for classifying the state of the network. Feature selection provides separable data points for the selected attacks: Worm, Distributed Denial of Service, Man-in-the-Middle, Scan, and Trojan. This investigation develops three techniques of self-organization for multiple distributed agents in an intrusion detection system: Reputation, Stochastic, and Maximum Cover. These three movement models are tested for effectiveness in locating good agent vantage points within the network to classify the state of the network. MFIREv3 also introduces the design of defensive measures to limit the effects of network attacks. Defensive measures included in this research are rate-limiting and elimination of infected nodes. The results of this research provide an optimistic outlook for flow-based multi-agent systems for cyber security. The impact of this research illustrates how feature selection in cooperation with movement models for multi agent systems provides excellent attack detection and classification

    Preventing premature convergence and proving the optimality in evolutionary algorithms

    Get PDF
    http://ea2013.inria.fr//proceedings.pdfInternational audienceEvolutionary Algorithms (EA) usually carry out an efficient exploration of the search-space, but get often trapped in local minima and do not prove the optimality of the solution. Interval-based techniques, on the other hand, yield a numerical proof of optimality of the solution. However, they may fail to converge within a reasonable time due to their inability to quickly compute a good approximation of the global minimum and their exponential complexity. The contribution of this paper is a hybrid algorithm called Charibde in which a particular EA, Differential Evolution, cooperates with a Branch and Bound algorithm endowed with interval propagation techniques. It prevents premature convergence toward local optima and outperforms both deterministic and stochastic existing approaches. We demonstrate its efficiency on a benchmark of highly multimodal problems, for which we provide previously unknown global minima and certification of optimality

    Nature-inspired optimisation: Improvements to the Particle Swarm Optimisation Algorithm and the Bees Algorithm

    Get PDF
    This research focuses on nature-inspired optimisation algorithms, in particular, the Particle Swarm Optimisation (PSO) Algorithm and the Bees Algorithm. The PSO Algorithm is a population-based stochastic optimisation technique first invented in 1995. It was inspired by the social behaviour of birds flocking or a school of fish. The Bees Algorithm is a population-based search algorithm initially proposed in 2005. It mimics the food foraging behaviour of swarms of honey bees. The thesis presents three algorithms. The first algorithm called the PSO-Bees Algorithm is a cross between the PSO Algorithm and the Bees Algorithm. The PSO-Bees Algorithm enhanced the PSO Algorithm with techniques derived from the Bees Algorithm. The second algorithm called the improved Bees Algorithm is a version of the Bees Algorithm that incorporates techniques derived from the PSO Algorithm. The third algorithm called the SNTO-Bees Algorithm enhanced the Bees Algorithm using techniques derived from the Sequential Number-Theoretic Optimisation (SNTO) Algorithm. To demonstrate the capability of the proposed algorithms, they were applied to different optimisation problems. The PSO-Bees Algorithm is used to train neural networks for two problems, Control Chart Pattern Recognition and Wood Defect Classification. The results obtained and those from tests on well known benchmark functions provide an indication of the performance of the algorithm relative to that of other swarm-based stochastic optimisation algorithms. The improved Bees Algorithm was applied to mechanical design optimisation problems (design of welded beams and coil springs) and the mathematical benchmark problems used previously to test the PSO-Bees Algorithm. The algorithm incorporates cooperation and communication between different neighbourhoods. The results obtained show that the proposed cooperation and communication strategies adopted enhanced the performance and convergence of the algorithm. The SNTO-Bees Algorithm was applied to a set of mechanical design optimisation problems (design of welded beams, coil springs and pressure vessel) and mathematical benchmark functions used previously to test the PSO-Bees Algorithm and the improved Bees Algorithm. In addition, the algorithm was tested with a number of deceptive multi modal benchmark functions. The results obtained help to validate the SNTO-Bees Algorithm as an effective global optimiser capable of handling problems that are deceptive in nature with high dimensions

    Entropy maximizing evolutionary design optimization of water distribution networks under multiple operating conditions

    Get PDF
    The informational entropy model for flow networks was formulated over 30 years ago by Tanyimboh and Templeman (University of Liverpool, UK) for a single discrete operating condition that typically comprises the maximum daily demands and was undefined for water distribution networks (WDNs) under multiple operating conditions. Its extension to include multiple independent discrete operating conditions was investigated experimentally herein considering the relationships between flow entropy and hydraulic capacity reliability and redundancy. A novel penalty-free multi-objective genetic algorithm was developed to minimize the initial construction cost and maximize the flow entropy subject to the design constraints. Furthermore, optimized designs derived from the maximum daily demands as a single discrete operating condition were compared to those derived from a combination of discrete operating conditions. Optimized designs from a combination of discrete operating conditions outperformed those from a single operating condition in terms of performance and initial construction cost. The best results overall were achieved by maximizing the sum of the flow entropies of the discrete operating conditions. The logical inference from the results is that the flow entropy of multiple discrete operating conditions is the sum of their respective entropies. In addition, a crucial property of the resulting flow entropy model is that it is bias free with respect to the individual operating conditions; hitherto a fundamental weakness concerning the practical application of the flow entropy model to WDNs is thus addressed

    Intelligent network intrusion detection using an evolutionary computation approach

    Get PDF
    With the enormous growth of users\u27 reliance on the Internet, the need for secure and reliable computer networks also increases. Availability of effective automatic tools for carrying out different types of network attacks raises the need for effective intrusion detection systems. Generally, a comprehensive defence mechanism consists of three phases, namely, preparation, detection and reaction. In the preparation phase, network administrators aim to find and fix security vulnerabilities (e.g., insecure protocol and vulnerable computer systems or firewalls), that can be exploited to launch attacks. Although the preparation phase increases the level of security in a network, this will never completely remove the threat of network attacks. A good security mechanism requires an Intrusion Detection System (IDS) in order to monitor security breaches when the prevention schemes in the preparation phase are bypassed. To be able to react to network attacks as fast as possible, an automatic detection system is of paramount importance. The later an attack is detected, the less time network administrators have to update their signatures and reconfigure their detection and remediation systems. An IDS is a tool for monitoring the system with the aim of detecting and alerting intrusive activities in networks. These tools are classified into two major categories of signature-based and anomaly-based. A signature-based IDS stores the signature of known attacks in a database and discovers occurrences of attacks by monitoring and comparing each communication in the network against the database of signatures. On the other hand, mechanisms that deploy anomaly detection have a model of normal behaviour of system and any significant deviation from this model is reported as anomaly. This thesis aims at addressing the major issues in the process of developing signature based IDSs. These are: i) their dependency on experts to create signatures, ii) the complexity of their models, iii) the inflexibility of their models, and iv) their inability to adapt to the changes in the real environment and detect new attacks. To meet the requirements of a good IDS, computational intelligence methods have attracted considerable interest from the research community. This thesis explores a solution to automatically generate compact rulesets for network intrusion detection utilising evolutionary computation techniques. The proposed framework is called ESR-NID (Evolving Statistical Rulesets for Network Intrusion Detection). Using an interval-based structure, this method can be deployed for any continuous-valued input data. Therefore, by choosing appropriate statistical measures (i.e. continuous-valued features) of network trafc as the input to ESRNID, it can effectively detect varied types of attacks since it is not dependent on the signatures of network packets. In ESR-NID, several innovations in the genetic algorithm were developed to keep the ruleset small. A two-stage evaluation component in the evolutionary process takes the cooperation of rules into consideration and results into very compact, easily understood rulesets. The effectiveness of this approach is evaluated against several sources of data for both detection of normal and abnormal behaviour. The results are found to be comparable to those achieved using other machine learning methods from both categories of GA-based and non-GA-based methods. One of the significant advantages of ESR-NIS is that it can be tailored to specific problem domains and the characteristics of the dataset by the use of different fitness and performance functions. This makes the system a more flexible model compared to other learning techniques. Additionally, an IDS must adapt itself to the changing environment with the least amount of configurations. ESR-NID uses an incremental learning approach as new flow of traffic become available. The incremental learning approach benefits from less required storage because it only keeps the generated rules in its database. This is in contrast to the infinitely growing size of repository of raw training data required for traditional learning
    • …
    corecore