2,754 research outputs found

    Genetic optimization of energy- and failure-aware continuous production scheduling in pasta manufacturing

    Get PDF
    Energy and failure are separately managed in scheduling problems despite the commonalities between these optimization problems. In this paper, an energy- and failure-aware continuous production scheduling problem (EFACPS) at the unit process level is investigated, starting from the construction of a centralized combinatorial optimization model combining energy saving and failure reduction. Traditional deterministic scheduling methods are difficult to rapidly acquire an optimal or near-optimal schedule in the face of frequent machine failures. An improved genetic algorithm (IGA) using a customized microbial genetic evolution strategy is proposed to solve the EFACPS problem. The IGA is integrated with three features: Memory search, problem-based randomization, and result evaluation. Based on real production cases from Soubry N.V., a large pasta manufacturer in Belgium, Monte Carlo simulations (MCS) are carried out to compare the performance of IGA with a conventional genetic algorithm (CGA) and a baseline random choice algorithm (RCA). Simulation results demonstrate a good performance of IGA and the feasibility to apply it to EFACPS problems. Large-scale experiments are further conducted to validate the effectiveness of IGA

    Collaborative spectrum sensing optimisation algorithms for cognitive radio networks

    Get PDF
    The main challenge for a cognitive radio is to detect the existence of primary users reliably in order to minimise the interference to licensed communications. Hence, spectrum sensing is a most important requirement of a cognitive radio. However, due to the channel uncertainties, local observations are not reliable and collaboration among users is required. Selection of fusion rule at a common receiver has a direct impact on the overall spectrum sensing performance. In this paper, optimisation of collaborative spectrum sensing in terms of optimum decision fusion is studied for hard and soft decision combining. It is concluded that for optimum fusion, the fusion centre must incorporate signal-to-noise ratio values of cognitive users and the channel conditions. A genetic algorithm-based weighted optimisation strategy is presented for the case of soft decision combining. Numerical results show that the proposed optimised collaborative spectrum sensing schemes give better spectrum sensing performance

    New Anomaly Network Intrusion Detection System in Cloud Environment Based on Optimized Back Propagation Neural Network Using Improved Genetic Algorithm

    Get PDF
    Cloud computing is distributed architecture, providing computing facilities and storage resource as a service over an open environment (Internet), this lead to different matters related to the security and privacy in cloud computing. Thus, defending network accessible Cloud resources and services from various threats and attacks is of great concern. To address this issue, it is essential to create an efficient and effective Network Intrusion System (NIDS) to detect both outsider and insider intruders with high detection precision in the cloud environment. NIDS has become popular as an important component of the network security infrastructure, which detects malicious activities by monitoring network traffic. In this work, we propose to optimize a very popular soft computing tool widely used for intrusion detection namely, Back Propagation Neural Network (BPNN) using an Improved Genetic Algorithm (IGA). Genetic Algorithm (GA) is improved through optimization strategies, namely Parallel Processing and Fitness Value Hashing, which reduce execution time, convergence time and save processing power. Since,  Learning rate and Momentum term are among the most relevant parameters that impact the performance of BPNN classifier, we have employed IGA to find the optimal or near-optimal values of these two parameters which ensure high detection rate, high accuracy and low false alarm rate. The CloudSim simulator 4.0 and DARPA’s KDD cup datasets 1999 are used for simulation. From the detailed performance analysis, it is clear that the proposed system called “ANIDS BPNN-IGA” (Anomaly NIDS based on BPNN and IGA) outperforms several state-of-art methods and it is more suitable for network anomaly detection

    Optimisation of Mobile Communication Networks - OMCO NET

    Get PDF
    The mini conference “Optimisation of Mobile Communication Networks” focuses on advanced methods for search and optimisation applied to wireless communication networks. It is sponsored by Research & Enterprise Fund Southampton Solent University. The conference strives to widen knowledge on advanced search methods capable of optimisation of wireless communications networks. The aim is to provide a forum for exchange of recent knowledge, new ideas and trends in this progressive and challenging area. The conference will popularise new successful approaches on resolving hard tasks such as minimisation of transmit power, cooperative and optimal routing

    Using Automated Algorithm Configuration for Parameter Control

    Full text link
    Dynamic Algorithm Configuration (DAC) tackles the question of how to automatically learn policies to control parameters of algorithms in a data-driven fashion. This question has received considerable attention from the evolutionary community in recent years. Having a good benchmark collection to gain structural understanding on the effectiveness and limitations of different solution methods for DAC is therefore strongly desirable. Following recent work on proposing DAC benchmarks with well-understood theoretical properties and ground truth information, in this work, we suggest as a new DAC benchmark the controlling of the key parameter λ\lambda in the (1+(λ,λ))(1+(\lambda,\lambda))~Genetic Algorithm for solving OneMax problems. We conduct a study on how to solve the DAC problem via the use of (static) automated algorithm configuration on the benchmark, and propose techniques to significantly improve the performance of the approach. Our approach is able to consistently outperform the default parameter control policy of the benchmark derived from previous theoretical work on sufficiently large problem sizes. We also present new findings on the landscape of the parameter-control search policies and propose methods to compute stronger baselines for the benchmark via numerical approximations of the true optimal policies.Comment: To appear in the Proc. of the ACM/SIGEVO Conference on Foundations of Genetic Algorithms (FOGA XVII

    A Survey on Load Balancing Algorithms for VM Placement in Cloud Computing

    Get PDF
    The emergence of cloud computing based on virtualization technologies brings huge opportunities to host virtual resource at low cost without the need of owning any infrastructure. Virtualization technologies enable users to acquire, configure and be charged on pay-per-use basis. However, Cloud data centers mostly comprise heterogeneous commodity servers hosting multiple virtual machines (VMs) with potential various specifications and fluctuating resource usages, which may cause imbalanced resource utilization within servers that may lead to performance degradation and service level agreements (SLAs) violations. To achieve efficient scheduling, these challenges should be addressed and solved by using load balancing strategies, which have been proved to be NP-hard problem. From multiple perspectives, this work identifies the challenges and analyzes existing algorithms for allocating VMs to PMs in infrastructure Clouds, especially focuses on load balancing. A detailed classification targeting load balancing algorithms for VM placement in cloud data centers is investigated and the surveyed algorithms are classified according to the classification. The goal of this paper is to provide a comprehensive and comparative understanding of existing literature and aid researchers by providing an insight for potential future enhancements.Comment: 22 Pages, 4 Figures, 4 Tables, in pres

    Genotypic differences and migration policies in an island model

    Get PDF
    ABSTRACT In this paper we compare different policies to select individuals to migrate in an island model. Our thesis is that choosing individuals in a way that exploits genotypic differences between populations can enhance diversity, and improve the system performance. This has lead us to propose a family of policies that we call multikulti, in which nodes exchange individuals different "enough" among them. In this paper we present a policy according to which the receiver node chooses the most different individual among the sample received from the sending node. This sample is randomly built but only using individuals with a fitness above a threshold. This threshold is previously established by the receiving node. We have tested our system in two problems previously used in the evaluation of parallel systems, presenting different degree of difficulty. The multikulti policy presented herein has been proved to be more robust than other usual migration policies, such as sending the best or a random individual

    Identifying and Detecting Attacks in Industrial Control Systems

    Get PDF
    The integrity of industrial control systems (ICS) found in utilities, oil and natural gas pipelines, manufacturing plants and transportation is critical to national wellbeing and security. Such systems depend on hundreds of field devices to manage and monitor a physical process. Previously, these devices were specific to ICS but they are now being replaced by general purpose computing technologies and, increasingly, these are being augmented with Internet of Things (IoT) nodes. Whilst there are benefits to this approach in terms of cost and flexibility, it has attracted a wider community of adversaries. These include those with significant domain knowledge, such as those responsible for attacks on Iran’s Nuclear Facilities, a Steel Mill in Germany, and Ukraine’s power grid; however, non specialist attackers are becoming increasingly interested in the physical damage it is possible to cause. At the same time, the approach increases the number and range of vulnerabilities to which ICS are subject; regrettably, conventional techniques for analysing such a large attack space are inadequate, a cause of major national concern. In this thesis we introduce a generalisable approach based on evolutionary multiobjective algorithms to assist in identifying vulnerabilities in complex heterogeneous ICS systems. This is both challenging and an area that is currently lacking research. Our approach has been to review the security of currently deployed ICS systems, and then to make use of an internationally recognised ICS simulation testbed for experiments, assuming that the attacking community largely lack specific ICS knowledge. Using the simulator, we identified vulnerabilities in individual components and then made use of these to generate attacks. A defence against these attacks in the form of novel intrusion detection systems were developed, based on a range of machine learning models. Finally, this was further subject to attacks created using the evolutionary multiobjective algorithms, demonstrating, for the first time, the feasibility of creating sophisticated attacks against a well-protected adversary using automated mechanisms

    Integration of production, maintenance and quality : Modelling and solution approaches

    Get PDF
    Dans cette thèse, nous analysons le problème de l'intégration de la planification de production et de la maintenance préventive, ainsi que l'élaboration du système de contrôle de la qualité. Premièrement, on considère un système de production composé d'une machine et de plusieurs produits dans un contexte incertain, dont les prix et le coût changent d'une période à l'autre. La machine se détériore avec le temps et sa probabilité de défaillance, ainsi que le risque de passage à un état hors contrôle augmentent. Le taux de défaillance dans un état dégradé est plus élevé et donc, des coûts liés à la qualité s’imposent. Lorsque la machine tombe en panne, une maintenance corrective ou une réparation minimale seront initiées pour la remettre en marche sans influer ses conditions ou le processus de détérioration. L'augmentation du nombre de défaillances de la machine se traduit par un temps d'arrêt supérieur et un taux de disponibilité inférieur. D'autre part, la réalisation des plans de production est fortement influencée par la disponibilité et la fiabilité de la machine. Les interactions entre la planification de la maintenance et celle de la production sont incorporées dans notre modèle mathématique. Dans la première étape, l'effet de maintenance sur la qualité est pris en compte. La maintenance préventive est considérée comme imparfaite. La condition de la machine est définie par l’âge actuel, et la machine dispose de plusieurs niveaux de maintenance avec des caractéristiques différentes (coûts, délais d'exécution et impacts sur les conditions du système). La détermination des niveaux de maintenance préventive optimaux conduit à un problème d’optimisation difficile. Un modèle de maximisation du profit est développé, dans lequel la vente des produits conformes et non conformes, les coûts de la production, les stocks tenus, la rupture de stock, la configuration de la machine, la maintenance préventive et corrective, le remplacement de la machine et le coût de la qualité sont considérés dans la fonction de l’objectif. De plus, un système composé de plusieurs machines est étudié. Dans cette extension, les nombres optimaux d’inspections est également considéré. La fonction de l’objectif consiste à minimiser le coût total qui est la somme des coûts liés à la maintenance, la production et la qualité. Ensuite, en tenant compte de la complexité des modèles préposés, nous développons des méthodes de résolution efficaces qui sont fondées sur la combinaison d'algorithmes génétiques avec des méthodes de recherches locales. On présente un algorithme mimétique qui emploi l’algorithme Nelder-Mead, avec un logiciel d'optimisation pour déterminer les valeurs exactes de plusieurs variables de décisions à chaque évaluation. La méthode de résolution proposée est comparée, en termes de temps d’exécution et de qualités des solutions, avec plusieurs méthodes Métaheuristiques. Mots-clés : Planification de la production, Maintenance préventive imparfaite, Inspection, Qualité, Modèles intégrés, MétaheuristiquesIn this thesis, we study the integrated planning of production, maintenance, and quality in multi-product, multi-period imperfect systems. First, we consider a production system composed of one machine and several products in a time-varying context. The machine deteriorates with time and so, the probability of machine failure, or the risk of a shift to an out-of-control state, increases. The defective rate in the shifted state is higher and so, quality related costs will be imposed. When the machine fails, a corrective maintenance or a minimal repair will be initiated to bring the machine in operation without influencing on its conditions or on the deterioration process. Increasing the expected number of machine failures results in a higher downtime and a lower availability rate. On the other hand, realization of the production plans is significantly influenced by the machine availability and reliability. The interactions between maintenance scheduling and production planning are incorporated in the mathematical model. In the first step, the impact of maintenance on the expected quality level is addressed. The maintenance is also imperfect and the machine conditions after maintenance can be anywhere between as-good-as-new and as-bad-as-old situations. Machine conditions are stated by its effective age, and the machine has several maintenance levels with different costs, execution times, and impacts on the system conditions. High level maintenances on the one hand have greater influences on the improvement of the system state and on the other hand, they occupy more the available production time. The optimal determination of such preventive maintenance levels to be performed at each maintenance intrusion is a challenging problem. A profit maximization model is developed, where the sale of conforming and non-conforming products, costs of production, inventory holding, backorder, setup, preventive and corrective maintenance, machine replacement, and the quality cost are addressed in the objective function. Then, a system with multiple machines is taken into account. In this extension, the number of quality inspections is involved in the joint model. The objective function minimizes the total cost which is the sum of maintenance, production and quality costs. In order to reduce the gap between the theory and the application of joint models, and taking into account the complexity of the integrated problems, we have developed an efficient solution method that is based on the combination of genetic algorithms with local search and problem specific methods. The proposed memetic algorithm employs Nelder-Mead algorithm along with an optimization package for exact determination of the values of several decision variables in each chromosome evolution. The method extracts not only the positive knowledge in good solutions, but also the negative knowledge in poor individuals to determine the algorithm transitions. The method is compared in terms of the solution time and quality to several heuristic methods. Keywords : Multi-period production planning, Imperfect preventive maintenance, Inspection, Quality, Integrated model, Metaheuristic
    • …
    corecore