8 research outputs found

    Performance of Turbulent Flow of Water Optimization on Economic Load Dispatch Problem

    Get PDF

    Identification of parameters in photovoltaic models through a runge kutta optimizer

    Get PDF
    Recently, the resources of renewable energy have been in intensive use due to their environmental and technical merits. The identification of unknown parameters in photovoltaic (PV) models is one of the main issues in simulation and modeling of renewable energy sources. Due to the random behavior of weather, the change in output current from a PV model is nonlinear. In this regard, a new optimization algorithm called Runge–Kutta optimizer (RUN) is applied for estimating the parameters of three PV models. The RUN algorithm is applied for the R.T.C France solar cell, as a case study. Moreover, the root mean square error (RMSE) between the calculated and measured current is used as the objective function for identifying solar cell parameters. The proposed RUN algorithm is superior compared with the Hunger Games Search (HGS) algorithm, the Chameleon Swarm Algorithm (CSA), the Tunicate Swarm Algorithm (TSA), Harris Hawk’s Optimization (HHO), the Sine–Cosine Algorithm (SCA) and the Grey Wolf Optimization (GWO) algorithm. Three solar cell models—single diode, double diode and triple diode solar cell models (SDSCM, DDSCM and TDSCM)—are applied to check the performance of the RUN algorithm to extract the parameters. the best RMSE from the RUN algorithm is 0.00098624, 0.00098717 and 0.000989133 for SDSCM, DDSCM and TDSCM, respectively

    A deep facial recognition system using computational intelligent algorithms.

    No full text
    The development of biometric applications, such as facial recognition (FR), has recently become important in smart cities. Many scientists and engineers around the world have focused on establishing increasingly robust and accurate algorithms and methods for these types of systems and their applications in everyday life. FR is developing technology with multiple real-time applications. The goal of this paper is to develop a complete FR system using transfer learning in fog computing and cloud computing. The developed system uses deep convolutional neural networks (DCNN) because of the dominant representation; there are some conditions including occlusions, expressions, illuminations, and pose, which can affect the deep FR performance. DCNN is used to extract relevant facial features. These features allow us to compare faces between them in an efficient way. The system can be trained to recognize a set of people and to learn via an online method, by integrating the new people it processes and improving its predictions on the ones it already has. The proposed recognition method was tested with different three standard machine learning algorithms (Decision Tree (DT), K Nearest Neighbor(KNN), Support Vector Machine (SVM)). The proposed system has been evaluated using three datasets of face images (SDUMLA-HMT, 113, and CASIA) via performance metrics of accuracy, precision, sensitivity, specificity, and time. The experimental results show that the proposed method achieves superiority over other algorithms according to all parameters. The suggested algorithm results in higher accuracy (99.06%), higher precision (99.12%), higher recall (99.07%), and higher specificity (99.10%) than the comparison algorithms

    Recent Methodology-Based Gradient-Based Optimizer for Economic Load Dispatch Problem

    No full text

    Analysis the patients’ careflows using process mining

    No full text
    Recently, The Egyptian health sector whether it is public or private; utilizes emerging technologies such as data mining, business intelligence, Internet of Things (IoT), among many others to enhance the service and to deal with increasing costs and growing pressures. However, process mining has not yet been used in the Egyptian organizations, whereas the process mining can enable the domain experts in many fields to achieve a realistic view of the problems that are currently happening in the undertaken field, and thus solve it. This paper presents application of the process mining techniques in the healthcare field to obtain meaningful insights about its careflows, e.g., to discover typical paths followed by certain patient groups. Also, to analyze careflows that have a high degree of dynamic and complexity. The proposed methodology starts by the preprocess step on the event logs to eliminate outliers and clean the event log. And then apply a set of the popular discovery miner algorithms to discover the process model. Then careflows processes are analyzed from three main perspectives: the control-flow perspective, the performance perspective and, the organizational perspective. That contributes with many insights for the domain experts to improve the existing careflows. Through evaluating the simplicity metric of extracted models; the paper suggested a method to quantify the simplicity metric. The paper used a dataset from a cardiac surgery unit in an Egyptian hospital. The results of the applied process mining techniques provide the hospital managers a real analysis and insights to make the patient journey easier

    Analysis the patients' careflows using process mining.

    No full text
    Recently, The Egyptian health sector whether it is public or private; utilizes emerging technologies such as data mining, business intelligence, Internet of Things (IoT), among many others to enhance the service and to deal with increasing costs and growing pressures. However, process mining has not yet been used in the Egyptian organizations, whereas the process mining can enable the domain experts in many fields to achieve a realistic view of the problems that are currently happening in the undertaken field, and thus solve it. This paper presents application of the process mining techniques in the healthcare field to obtain meaningful insights about its careflows, e.g., to discover typical paths followed by certain patient groups. Also, to analyze careflows that have a high degree of dynamic and complexity. The proposed methodology starts by the preprocess step on the event logs to eliminate outliers and clean the event log. And then apply a set of the popular discovery miner algorithms to discover the process model. Then careflows processes are analyzed from three main perspectives: the control-flow perspective, the performance perspective and, the organizational perspective. That contributes with many insights for the domain experts to improve the existing careflows. Through evaluating the simplicity metric of extracted models; the paper suggested a method to quantify the simplicity metric. The paper used a dataset from a cardiac surgery unit in an Egyptian hospital. The results of the applied process mining techniques provide the hospital managers a real analysis and insights to make the patient journey easier

    CoAID-DEEP: An Optimized Intelligent Framework for Automated Detecting COVID-19 Misleading Information on Twitter

    No full text
    COVID-19 has affected all peoples' lives. Though COVID-19 is on the rising, the existence of misinformation about the virus also grows in parallel. Additionally, the spread of misinformation has created confusion among people, caused disturbances in society, and even led to deaths. Social media is central to our daily lives. The Internet has become a significant source of knowledge. Owing to the widespread damage caused by fake news, it is important to build computerized systems to detect fake news. The paper proposes an updated deep neural network for identification of false news. The deep learning techniques are The Modified-LSTM (one to three layers) and The Modified GRU (one to three layers). In particular, we carry out investigations of a large dataset of tweets passing on data with respect to COVID-19. In our study, we separate the dubious claims into two categories: true and false. We compare the performance of the various algorithms in terms of prediction accuracy. The six machine learning techniques are decision trees, logistic regression, k nearest neighbors, random forests, support vector machines, and naïve Bayes (NB). The parameters of deep learning techniques are optimized using Keras-tuner. Four Benchmark datasets were used. Two feature extraction methods were used (TF-ID with N-gram) to extract essential features from the four benchmark datasets for the baseline machine learning model and word embedding feature extraction method for the proposed deep neural network methods. The results obtained with the proposed framework reveal high accuracy in detecting Fake and non-Fake tweets containing COVID-19 information. These results demonstrate significant improvement as compared to the existing state of art results of baseline machine learning models. In our approach, we classify the data into two categories: fake or nonfake. We compare the execution of the proposed approaches with Six machine learning procedures. The six machine learning procedures are Decision Tree (DT), Logistic Regression (LR), K Nearest Neighbor (KNN), Random Forest (RF), Support Vector Machine (SVM), and Naive Bayes (NB). The parameters of deep learning techniques are optimized using Keras-tuner. Four Benchmark datasets were used. Two feature extraction methods were used (TF-ID with N-gram) to extract essential features from the four benchmark datasets for the baseline machine learning model and word embedding feature extraction method for the proposed deep neural network methods. The results obtained with the proposed framework reveal high accuracy in detecting Fake and non-Fake tweets containing COVID-19 information. These results demonstrate significant improvement as compared to the existing state of art results of baseline machine learning models

    Performance Evaluation Of New Hybrid Encryption Algorithms To Be Used For Mobile Cloud Computing

    No full text
    ABSTRACT: Mobile cloud applications move the computing power and data storage away from the mobile devices and into powerful and centralized computing platforms located in clouds, which are then accessed over the wireless connection based on a thin native client to overcome on the limitation of mobile devices and uses the main advantage of cloud computing. As mobile cloud computing continues to grow, so does the need for effective security mechanisms because data offloaded and moved from mobile to unknown destination. Encryption algorithms play good roles in information security systems (ISS). Those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. At present, various types of cryptographic algorithms provide high security to information on networks, but there are also has some drawbacks. The present asymmetric encryption methods and symmetric encryption methods can offer the security levels but with many limitations. For instance key maintenance is a great problem faced in symmetric encryption methods and less security level is the problem of asymmetric encryption methods even though key maintenance is easy. To improve the strength of these algorithms, we propose a new hybrid cryptographic algorithm in this paper. The algorithm is designed using combination of two symmetric cryptographic techniques and two Asymmetric cryptographic techniques. This protocol provides three cryptographic primitives, integrity, confidentiality and authentication. It is a hybrid encryption method where elliptical curve cryptography (ECC) an
    corecore