Static Security Evaluation in Power Systems using Multi-Class SVM with Different Parameter Selection Methods
|
|
|
- Gerard Collins
- 10 years ago
- Views:
Transcription
1 Static Security Evaluation in Power Systems using Multi-Class SVM with Different Parameter Selection Methods S. Kalyani, Member, IEEE and K. S. Swarup, Senior Member, IEEE Abstract Security evaluation is a major concern in real time operation of electric power systems. Traditional method of security evaluation performed by continuous load flow analysis involves long computer time and generates voluous results. This paper presents a practical and feasible Support Vector Machine Based Pattern Classification (SVMBPC) approach for static security evaluation in power systems. The proposed approach classifies the security status of any given operating condition in one of the four classes - Secure, Critically Secure, Insecure and Highly Insecure based on the computation of a numeric value called security index. The feature selection stage uses a simple and straightforward forward sequential method to select the best feature set from a large set of variables. The static security classifier is designed by a multi-class SVM with different parameter tuning methods. The proposed approach is implemented in New England 39 bus and IEEE 118 bus systems and the results are valated. Index Terms Parameter Selection, Pattern Classifier, Static Security, Support Vector Machine I. INTRODUCTION Security evaluation is the analysis performed to detere whether, and to what extent, the system is reasonably safe from serious interference to its operation. Occurrence of certain severe perturbations may move the system to an undesirable emergency state, if the system security status is not well defined beforehand. Hence, effective control of modern power systems necessitates a quic security evaluation of their operating states. Power System Security is defined as the system s ability to withstand unexpected failures and to remain secure without serious consequences to any pre-selected list of credible contingencies [1]. Security analysis may be broadly classified as Static Security Evaluation (SSE) and Transient Security Evaluation (TSE). The traditional method used for security analysis involves solving full AC load flow and rotor dynamics of machines for each contingency scenario. This procedure is highly time consug and generates voluous results, maing it inadequate for real time applications [2], [3]. A method is, therefore, required to evaluate and classify system security status using real time data in imum time and with imum accuracy. Manuscript received March 30, S. Kalyani was with Indian Institute of Technology Madras. She is now with Department of EEE, K.L.N. College of Engineering, Pottapalayam , Sivagangai District, Tamilnadu, India. (Phone: ; Fax: ; [email protected]). K.S. Swarup is with Department of Electrical Engineering, Indian Institute of Technology Madras, Chennai , Tamilnadu, India ( [email protected]). In recent years, use of many Artificial Intelligence (AI) techniques and expert systems lie fuzzy set theory has been proposed for security evaluation problem, overcog the pitfalls of traditional method. Literatures have reported the use of Artificial Neural Networ techniques [4], [5], fuzzy logic combined with neural networ [6], genetic based neural networ [7] for static security evaluation process. The performance of all these existing techniques are highly problem dependent and hence its suitability cannot be generalized. Nowadays, pattern classification is gaining more importance in solving many power system problems. In this approach, main bul of wor is done off-line to generate sufficient dataset. The classification function, designed based on the train set, helps to access the system security level in a short period of time. This paper addresses security evaluation as a pattern classification problem with the classifier function designed by Support Vector Machine (SVM). SVM is a new and promising tool for learning separating functions in PR system with the capability of handling non-linear separability. The SVM classifier is designed for multi-classification based on the calculation of a term called Static Security Index (SSI), for each specified contingency. In this paper, four class logic is used for the definition of system security viz., secure, critically secure, insecure, highly insecure. An operator lies to now exactly the severity level of disturbances for a given system operating condition. On-line security evaluation allows the operator to now the security status and helps to detere the corrective actions. This paper also addresses different heuristic optimization techniques lie Particle Swarm Optimization [8], Real Coded Genetic Algorithm [9] and Differential Evolution [10] used in the selection of SVM parameters globally. The classification approach is implemented in New England (NE) 39 bus system and IEEE 118 bus system and the results are compared. II. POWER SYSTEM SECURITY EVALUATION The term Security as defined by NERC (1997) is the ability of the electric systems to withstand sudden disturbances such as electric short-circuits or unanticipated loss of system element [11]. Security Evaluation is the process of detering, whether and to what extent, a system is reasonably safe from serious interference to its operation [12]. A set of most probable contingencies is first specified for security evaluation. This set may include outage of a line/generator, sudden increase in load, three phase fault in the system, etc. 3
2 A. Static Security Evaluation Static security is the ability of the system to reach a steady state within the specified secure region (defined by bounding limits) following a contingency [13]. Limit violation of any component may lead to cascading of outages and hence severe blacout. The violations of thermal limits of transmission lines and bus voltage limits are the main concerns for static security analysis. In conventional practice, static security evaluation is performed by analytically modelling the networ and solving the algebraic load flow equations repeatedly for all prescribed outages, one at a time. This traditional approach is not entirely satisfactory because a huge number of simulations need to be carried out. A given system operating condition is sa to be static secure, if the bus voltage magnitudes and real power generation of generator buses are well within their limits, without any occurrence of line overloads. In this paper, we define a term called Static Security Index (SSI) for evaluating static security level for a given system operating condition and a specified contingency. The SSI is defined by calculating the Line Overload Index (LOI) and Voltage Deviation Index (VDI) as given by (1) and (2) respectively. LOI S = 0 MVA S 100 if S if S > MVA MVA V V 100 if V < V V VDI = 0 if V V V (2) V V 100 if V > V V W SSI = N L LOI L B N B 1 i 2 i= 1 i= 1 N + W + N VDI where S and MVA represents the Mega Volt-Ampere (MVA) flow and MVA limit of branch -m, V, V and V the imum voltage limit, imum voltage limit and bus voltage magnitude of th bus respectively, N L and N B being number of lines and buses respectively. III. DESIGN OF STATIC SECURITY CLASSIFIER Classification of power system state is the primary stage in security monitoring process of real power system networs. A suitable pattern classifier system is developed for multi-class static security assessment problem addressed herein. The pattern classification approach is applied to reduce on-line computational requirements at the expense of an extensive off-line simulation. The design of pattern recognition system, thus, consists of an off-line simulation process called data generation followed by feature selection and classifier design. The sequence of steps carried out in designing the multi-class static security classifier through off-line process is shown in detail in Fig. 1. i (1) (3) Fig. 1. Design process of static security classifier for multi-classification A. Data Generation The success of any pattern directed inference system relies on a good training set. This set must adequately represent the entire range of power system operating states [14]. The patterns can be generated either from real time measurements or synthesized from off-line simulations. In this paper, a large number of characteristic operating points are generated by offline simulations as shown in the upper part of Fig. 1. Different operating conditions are consered by varying the system load and generation from 50% to 200% of their base case values. The variation in generation is bounded to their - generation limits. For each operating scenario consered, N-1 contingency case (single line outage) is simulated and load flow solution by Fast Decoupled Load Flow (FDLF) method is obtained. Each operating condition is termed as a pattern [3]. Each pattern is characterized by a number of attributes lie load level, bus voltages, power generation, forg the components of a vector called pattern vector XSSA, as listed in (4). X SSA = { V i, δ i, S Gi, S Li, S flow } (4) where, V i voltage magnitude at ith bus δ i voltage angle at ith bus S Gi complex power generation at ith generator bus S Li complex power load at ith load bus Sflow MVA power flow in branch -m Evaluating the Static Security Index (SSI) as given by (3), each pattern is labeled as belonging to one of the four classes as shown in Table I. In calculation of the value of SSI, weighting factors for LOI and VDI are assumed as W 1 = 3 and W 2 = 2 respectively. These weighting factors are fixed based on the order of priority in requirement of system security. SSI is a percentage measure of system security level, taing value in the range of 0 to
3 TABLE I. Static Security Index (SSI) SSI = 0 SSI > 0 & SSI < = 5 SSI > 5 & SSI < = 15 SSI > 15 TABLE I. CLASS LABELS FOR STATIC SECURITY ANALYSIS Class Category / Label Class A : Secure Class B : Critically Secure Class C : Insecure Class D : Highly Insecure B. Feature Selection The number of variables in the pattern vector is normally very large. Therefore, it becomes necessary to detere relatively small number of variables distinctive for classification [15]. Feature Selection is the process of selecting a small optimal set of attributes called features, which will give more useful information for classification. The selected features form the components of a vector called feature vector Z. In this wor, a simple and quic procedure called Sequential Forward Selection (SFS), wrapper method, is used. The SFS method starts with an empty feature set and iteratively selects one feature at a time, until no further decrease in criterion function is achieved. The criterion function, J, is the imization of misclassification rate. C. Classifier Design After selecting the desired features, the next step is to design a decision function or classifier. The classifier represents the boundary between separating classes. The classifier attempts to assign every data point in the entire feature space to one of the possible classes. The design of the classifier is based on the design (training) set of selected features. The main requirement of any classifier model is that it should prove high classification accuracy and less misclassification rate, when evaluated for unlabeled (unseen) test set samples. Support Vector Machine, a popularly used machine learning tool, has been applied for efficient pattern classifier design. 1) Multi-Class SVM Classifier: The security evaluation problem is focused as a multi-classification problem in this paper. Direct solution of multi-class problem using single SVM formulation is not possible. A better approach is to use a combination of several binary SVM classifiers to solve multi-class problems. Popular methods available are: (i) One- Versus-All (OVA) method and (ii) One-Versus-One (OVO) method. The former method constructs K SVM models, with class i against all other classes, K being number of distinct classes of the problem. The OVA method, although simple, is computationally expensive and not commonly preferred. In this paper, we use the latter method for designing the multi-class static security classifier. The OVO method also called pair-wise SVM, deteres the decision functions for all combinations of class pairs. This method constructs K(K 1)/2 binary classifiers, each being trained from data belonging to the corresponding two classes only, conserably reducing number of train data. The classification in OVO method is performed by a Max-Wins Voting (MWV) strategy. After each of the binary classifiers mae its vote, the decision function assigns an instance x to a class having largest number of votes [16]. In case, tie occurs with two classes having entical votes, the one with smallest index is selected. 2) Steps in Design of SVM Classifier 1. Data Scaling or Preprocessing The input features in train and test sets needs to be scaled properly before applying SVM. Scaling prevents the doation of any feature over the other because of higher numeric values involved and also avos numerical difficulties during calculation. We recommend each attribute to be linearly scaled to the range of [0, 1]. 2. Design of SVM Model Choice of Kernel The Radial Basis Function (RBF) ernel is chosen as a first choice because of its we nown accuracy. Further, it is capable of handling non-linear relation existing between the class labels and input attributes. The second reason is that RBF ernel, unlie other ernels, has only one ernel parameter, thereby reducing the complexity of the model. Adjusting the Kernel Parameters There are two parameters associated with SVM model designed with RBF ernel - Penalty parameter, C and RBF Kernel parameter, γ. The goal is to entify optimal (C, γ) for the classifier to accurately predict the unnown data (test data). This can be achieved by different techniques, description of which follows in the next subsection. 3. Training and Testing the SVM Model After designing the SVM model with the chosen ernel and optimal parameters, it is trained with the scaled input output train set samples. Once the performance of the SVM classifier is found satisfactory in training phase, the model is valated with test samples to access its overall performance. D. Selection of SVM Parameters 1) Gr Search (GS): Gr search is the most common and simplest method. Gr search method adopts v-fold Cross Valation technique. In a v-fold cross valation, we dive the whole training set into v subsets of equal size. Sequentially one subset is tested using the SVM classifier trained on the remaining (v-1) subsets. Thus, each instance of the train set is predicted once and the cross-valation accuracy is the percentage of data samples that are correctly classified [17]. In this wor, Gr Search using 5-fold cross valation is used. 2) Particle Swarm Optimization (PSO): Particle Swarm Optimization (PSO) is an evolutionary computation technique developed by Kennedy and Eberhart in In PSO, each single solution is called as particle. To discover the optimal solution, each particle is updated by two best values in each iteration. After finding these two best values, each particle changes its velocity and position according to the cognition part (P best ) and social part (G best ). The update equations for particle s velocity and position are given by (5) and (6). + 1 V = w V + c1 rand1 ( Pbest X ) (5) + c2 rand1 ( Gbestd X ) +1 X = X + V (6) w w w = w xcurrent Iteration (7) Max. Iterations where w is the inertia weight calculated by (7), V is the particle velocity, X is the current particle position (solution), 5
4 rand1 is a random number between (0,1), c 1 and c 2 indicates cognition and social learning factors respectively. PSO Algorithm for SVM Parameter Selection Step 1) Randomly initialize a population of particles with positions X (C,γ) and velocities V of the i th particle in dth dimension. Step 2) Set PSO parameters, C 1 =C 2 = 2, w =0.9,w =0.5. Step 3) Evaluate the fitness of each particle in the population. The SVM model is built with each particle s position (SVM parameters) and trained with 90% of samples in train set feature vector. This SVM model is valated using the remaining 10% samples and misclassification (error) rate as given by (8), called fitness, is computed for each particle. No. of samples misclassified Fitness = Total No. of Samples x100 (8) Step 4) Compare the current position with particle s previous best experience, Pbest, in terms of fitness value and hence update Pbest for each particle in the population. Step 5) After updating the Pbest, choose the best value (with less misclassification rate) among all the particles in Pbest and call it as Global best, Gbest. Step 6) Update the particle s velocity using (5) and clamp to its imum (V ) and imum (V ) limit, whichever violates. Step 7) Move to the next position of the particle using (6) bounded to its upper and lower limits. Step 8) Stop the algorithm and print the optimal solution (Final Gbest) if teration criterion, imum iterations, is reached; otherwise loop to Step 3. 3) Real Coded Genetic Algorithm (RCGA): Genetic Algorithm (GA) belongs to the class of randomized heuristic search techniques. GA is a general purpose search procedure that uses the principles inspired by natural genetic populations to evolve solution. The traditional GA uses binary representation of strings, which is not preferred in the continuous search space domain. The problem of optimal selection of SVM parameters is an optimization problem in continuous domain. Real Coded Genetic algorithm (RCGA) gives a straightforward representation of chromosomes by directly coding all variables. The chromosome X is represented as X={p 1, p 2 }, where p 1 denotes penalty the parameter C and p 2 the ernel parameter γ. Unlie traditional binary coded GA, decision variables can be directly used to compute the cross valation accuracy called fitness, same as that of the previous algorithm. The RCGA uses selection, crossover and mutation operators to reproduce offspring for the existing population [9]. The RCGA-SVM model incorporates Roulette Wheel selection to dece chromosomes for the next generation. The selected chromosomes are placed in a matting pool for crossover and mutation operations. The crossover operation enhances the global search property of GA and mutation operation prevents the permanent loss of any gene value. In this wor, Arithmetic Crossover and Polynomial Mutation, described by [18], has been used to perform crossover and mutation respectively. The detailed procedure of RCGA applied for the problem of SVM parameter selection is shown in the form of a flowchart in Fig. 2. Fig. 2. RCGA algorithm for SVM paramter selection 4) Differential Evolution (DE): Differential Evolution, one of the evolutionary optimization technique, was introduced by R. Storn and K. Price in In this paper, we have used a commonly used strategy denoted as DE/rand/1/bin. In this representation, rand indicates a random mutant vector to be chosen; 1 the number of difference vectors and bin denotes the crossover scheme. DE Algorithm for SVM Parameter Selection Step 1) Randomly initialize a population of indivuals X denoting the i th indivual in d dimension. Step 2) Specify the DE parameters; difference vector scale factor F=0.05, imum and imum crossover probability CR = 0.1 and CR = 0.9. Step 3) Evaluate the fitness value of each indivual in the population. The fitness value is error rate, given by (8), obtained by valating the trained SVM model. Step 4) Generate mutant vector for each indivual x i according to (9) v ( ) i = xs 1 + F xs2 xs3 (9) The indices s1, s2 and s3 are randomly chosen from population size. It is important to ensure that these indices are different from each other and also from the running index i. Step 5) Perform crossover by combining mutant vector v with target vector x using (10). 6
5 vij rand( j) CR or j = randn( i) uij = xij rand( j) CR or j randn( i) (10) where rand(j) [0, 1] is the jth evaluation of a uniform random generator number. Randn (i) {1, 2...D} is a randomly chosen index ensuring that ui gets atleast one element form mutant vector, v i. CR is the time-varying crossover probability constant detered using (11). ( CR CR ) CR = CR + x Iter. (11) Max. Iterations Step 6) Perform selection operations based on fitness value and generate new population. If the trial vector u i yields a better fitness, then x i is replaced by u i, else x i is retained at its old value. Step 7) If stopping criterion (. iterations) is reached, stop and print the optimized parameter set (C*, γ*); else increase iteration count and loop to Step 3. IV. RESULTS AND DISCUSSION The proposed SVM based Pattern Classification approach for the static security evaluation problem is implemented in New England 39 bus and IEEE 118 bus power system networs. The security limit for bus voltage magnitude is assumed in the range of 0.90pu to 1.10pu for all test case systems. MVA limit of system branches is assumed as 130% of base case values. The results of data generation and feature selection are shown in Table II. As seen from Table II, the number of input features for classifier design is reduced many folds, maing the application of pattern analysis to security evaluation more attractive. This is clearly event from the figure of dimensionality reduction, which gives a percentage measure of selected feature variables with respect to total number of pattern attributes. Table III that DE algorithm gives a better optimal solution for SVM parameters with less standard deviation, especially in large size systems. TABLE III. RESULTS OF SVM PARAMETERS BY DIFFERENT METHODS Parameter Selection Method GS PSO RCGA DE Best Trial Mean (μ) Std. Dev (σ) Best Trial Mean (μ) Std. Dev (σ) Best Trial Mean (μ) Std. Dev (σ) Best Trial Mean (μ) Std. Dev (σ) NE 39 Bus IEEE 118 Bus log2c log2γ log2c log2γ Fig. 3 shows the 5-fold cross valation plot of the trained SVM classifier for IEEE 118 bus system using Gr Search parameter selection method. The best values of SVM parameters obtained for a imum cross valation accuracy of 96%, as seen in Figure 3, are penalty parameter, 2 C = 2 15 and the RBF ernel parameter, 2 γ = 2 6. TABLE II. RESULTS OF DATA GENERATION AND FEATURE SELECTION NE 39 Bus Operating Scenarios Class A : Secure (S) Class B : Critically Secure (CS) Class C : Insecure (I) Class D : Highly Insecure (HI) No. of Pattern Variables No. of Features selected IEEE 118 Bus Dimensionally Reduction % 9.515% The SVM parameters are selected by different evolutionary optimization techniques as described in the previous section. The results of different parameter selection methods adopted for the design of SVM model are shown in Table III. All evolutionary algorithms (PSO, RCGA, DE) described for SVM parameter selection use a population size of 40 and search space boundary of C = [2 5, 2 15 ], γ= [2 15, 2 5 ] in the simulation. About 50 independent trials are performed for each parameter selection algorithm. The mean and standard deviation obtained from the global solution of these trials and the best parameter values obtained for the trial yielding best fitness value are pictured in Table II for NE 39 Bus and IEEE 118 Bus systems. It can be observed from Fig. 3. SVM parameter selection by Gird Search IEEE 118 Bus Table IV shows the performance evaluation of various classifiers algorithms obtained during the testing phase. The SVM classifier is trained with the optimal parameters selected by different parameter selection methods as discussed and valated for randomly generated test set samples. About 75% of the data samples generated are randomly chosen for training and remaining 25% for testing processes. The performance measures of different SVM classifiers are compared with the other equivalent classifiers, viz., Method of Least Squares (MLS) and Probabilistic Neural Networ (PNN) classifiers. The LIBSVM software developed by C.C. Chang and C.J. Lin has been used for the design and testing of SVM model [19]. MLS and PNN classifiers are designed using the Statistical toolbox and Neural Networ toolbox in Matlab 7.6 respectively. It can be observed from Table IV that SVM pattern classifier gives a better performance in terms of high classification accuracy and less misclassification rate compared to conventional and neural networ pattern classifiers. It is important for the power system security classification problem to imize the misclassification 7
6 corresponding to class C and class D. This indicates wrong classification of insecure states, which may be lead to severe blacout. It is well seen that SVM classifiers shows a great reduction in the class C and class D misclassification rate. The high classification accuracy and less misclassification rate maes the SVM classifier suitable for application in online security monitoring system. Furthermore, the SVM+DE is traced to be a more suitable SVM classifier technique, showing an increase in classification accuracy and decrease in Class C and Class D misclassification, as shown highlighted in Table IV. TABLE IV. NE 39 Bus IEEE 118 Bus PERFORMANCE ANALYSIS OF STATIC SECURITY CLASSIFIERS CA Misclassification (%) (%) A (S) B CS) C (I) D (HI) SVM+GS SVM+PSO SVM+RCGA SVM+DE MLS PNN SVM+GS SVM+PSO SVM+RCGA SVM+DE MLS PNN V. CONCLUSIONS This paper presented the pattern analysis method of security evaluation, addressed as a classification tas in multi-class labelling environment. The classification of the system static security status in multi-class domain gives an indication of security level to the system operator and helps to initiate necessary control actions at the appropriate time, preventing system collapse. Simulation results have proven that high accuracy classifiers are realizable with SVM algorithm. Furthermore, it has been entified that Differential Evolution method can be applied to fine tune the SVM parameters in the design process in order to get an enhanced performance in the SVM model. ACKNOWLEDGMENT The first author would lie to than the Management and Principal of K.L.N. College of Engineering for sponsoring to undergo Ph.D programme in IIT Madras. Authors would also lie to than IIT Madras for proving the necessary facilities to carry out this research wor. REFERENCES [1] Daniel Kirschen, Power system security, Power Engineering Journal, vol. 16, no. 5, pp , [2] C. Pang, F. Prabhaara, A. El-Abiad, and A. Koivo, Security evaluation in power systems using pattern recognition, IEEE Trans. on PAS, vol. PAS-93, no. 3, pp , May [3] C. Pang, A. Koivo, and A. El-Abiad, Application of pattern recognition to steady-state security evaluation in a power system, IEEE Trans. on SMC, vol. 3, no. 6, pp , [4] I. Saeh and A. Khairuddin, Static security assessment using artificial neural networ, in IEEE 2nd International Power and Energy Conference, PECon 2008, 2008, pp [5] S. Tso, X. Gu, Q. Zeng, and K. Lo, Deriving a transient stability index by neural networs for power-system security assessment, Engineering Applications of Artificial Intelligence, vol. 11, no. 6, pp , [6] C. Liu, M. Su, S. Tsay, and Y. Wang, Application of a novel fuzzy neural networ to real-time transient stability swings prediction based on synchronized phasor measurements IEEE Transactions on Power Systems, vol. 14, no. 2, pp , [7] A. Mohamed, S. Maniruzzaman, and A. Hussain, Static Security Assessment of a Power System Using Genetic-Based Neural Networ Electric Power Components and Systems, vol. 29, no. 12, pp , [8] S. Lin, K. Ying, S. Chen, and Z. Lee, Particle swarm optimization for parameter deteration and feature selection of support vector machines, Expert Systems with Applications, vol. 35, no. 4, pp , [9] C. Wu, G. Tzeng, Y. Goo, and W. Fang, A real-valued genetic algorithm to optimize the parameters of support vector machine for predicting banruptcy, Expert systems with applications, vol. 32, no. 2, pp , Feb [10] S. Zhou, L. Wu, X. Yuan, and W. Tan, Parameters Selection of SVM for Function Approximation Based on Differential Evolution, in Proceedings of the international conference on intelligent systems and nowledge engineering (ISKE 2007), Chengdu, China, [11] L. L. Grigsby, Power System Stability and Control. CRC Press, [12] W. Luan, K. Lo, and Y. Yu, Ann-based pattern recognition technique for power system security assessment, in Electric Utility Deregulation and Restructuring and Power Technologies, Proceedings. DRPT Inter. Conference on, 2000, pp [13] M. Shahehpour and Y. Wang, Communication and Control in Electric Power Systems. Wiley-IEEE, [14] S. Oh, A pattern recognition and associative memory approach to power system security assessment, IEEE Transactions on Systems, Man and Cybernetics, vol. 16, no. 1, pp , [15] S. Weerasooriya and M. El-Sharawi, Feature selection for static security assessment using neural networs, in 1992 IEEE International Symposium on Circuits and Systems, ISCAS 92. Proceedings, vol. 4, 1992, pp [16] C. Hsu and C. Lin, A comparison of methods for multi-class support vector machines, IEEE transactions on Neural Networs, vol. 13, no. 2, pp , [17] J. Min and Y. Lee, Banruptcy prediction using support vector machine with optimal choice of ernel function parameter, Expert Systems with Applications, vol. 28, no. 4, pp , [18] Kalyan Moy Deb, Multi-Objective Optimization using Evolutionary Algorithms, John Wiley & Sons, [19] C. Chang and C. Lin, LIBSVM: A Library for Support Vector Machines, 2001, software available at cjlin/libsvm. S. Kalyani received her Bachelors Degree in Electrical and Electronics Engineering from A.C. College of Engg. & Tech., Karaiudi, in the year 2000 and Masters in Power Systems Engineering from Thiagarajar College of Engg., Madurai in December She has obtained her Ph.D degree from IIT Madras in the March She is currently woring as Associate Professor/EEE in K.L.N. College of Engineering, Madurai. Her research interests are power system stability, pattern recognition, neural networs and fuzzy logic applications to power system studies. K. Shanti Swarup (S 87 M 92 SM 03) is currently a Professor in the Department of Electrical Engineering, Indian Institute of Technology Madras, Chennai, India. Prior to his current position, he held positions at Mitsubishi Electric Corporation, Osaa, Japan, and Kitami Institute of Technology, Hoao, Japan, as a Visiting Research Scientist and a Visiting Professor, respectively, during 1992 to His areas of research are artificial intelligence, nowledge-based systems, computational intelligence, soft computing, and object modeling and design of electric power systems. He is a Senior Member of IEEE since
STUDY OF NEURAL NETWORK MODELS FOR SECURITY ASSESSMENT IN POWER SYSTEMS
STUDY OF NEURAL NETWORK MODELS FOR SECURITY ASSESSMENT IN POWER SYSTEMS S. KALYANI and K. SHANTI SWARUP Department of Electrical Engineering, Indian Institute of Technology Madras, Chennai, India. ABSTRACT
Optimal PID Controller Design for AVR System
Tamkang Journal of Science and Engineering, Vol. 2, No. 3, pp. 259 270 (2009) 259 Optimal PID Controller Design for AVR System Ching-Chang Wong*, Shih-An Li and Hou-Yi Wang Department of Electrical Engineering,
A Novel Binary Particle Swarm Optimization
Proceedings of the 5th Mediterranean Conference on T33- A Novel Binary Particle Swarm Optimization Motaba Ahmadieh Khanesar, Member, IEEE, Mohammad Teshnehlab and Mahdi Aliyari Shoorehdeli K. N. Toosi
International Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
Application of GA for Optimal Location of FACTS Devices for Steady State Voltage Stability Enhancement of Power System
I.J. Intelligent Systems and Applications, 2014, 03, 69-75 Published Online February 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijisa.2014.03.07 Application of GA for Optimal Location of Devices
Optimization of PID parameters with an improved simplex PSO
Li et al. Journal of Inequalities and Applications (2015) 2015:325 DOI 10.1186/s13660-015-0785-2 R E S E A R C H Open Access Optimization of PID parameters with an improved simplex PSO Ji-min Li 1, Yeong-Cheng
An ACO Approach to Solve a Variant of TSP
An ACO Approach to Solve a Variant of TSP Bharat V. Chawda, Nitesh M. Sureja Abstract This study is an investigation on the application of Ant Colony Optimization to a variant of TSP. This paper presents
Feature Selection using Integer and Binary coded Genetic Algorithm to improve the performance of SVM Classifier
Feature Selection using Integer and Binary coded Genetic Algorithm to improve the performance of SVM Classifier D.Nithya a, *, V.Suganya b,1, R.Saranya Irudaya Mary c,1 Abstract - This paper presents,
Email: [email protected]. 2Azerbaijan Shahid Madani University. This paper is extracted from the M.Sc. Thesis
Introduce an Optimal Pricing Strategy Using the Parameter of "Contingency Analysis" Neplan Software in the Power Market Case Study (Azerbaijan Electricity Network) ABSTRACT Jalil Modabe 1, Navid Taghizadegan
ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 3, May 2013
Transistor Level Fault Finding in VLSI Circuits using Genetic Algorithm Lalit A. Patel, Sarman K. Hadia CSPIT, CHARUSAT, Changa., CSPIT, CHARUSAT, Changa Abstract This paper presents, genetic based algorithm
PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION
PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION Introduction In the previous chapter, we explored a class of regression models having particularly simple analytical
Predict Influencers in the Social Network
Predict Influencers in the Social Network Ruishan Liu, Yang Zhao and Liuyu Zhou Email: rliu2, yzhao2, [email protected] Department of Electrical Engineering, Stanford University Abstract Given two persons
GA as a Data Optimization Tool for Predictive Analytics
GA as a Data Optimization Tool for Predictive Analytics Chandra.J 1, Dr.Nachamai.M 2,Dr.Anitha.S.Pillai 3 1Assistant Professor, Department of computer Science, Christ University, Bangalore,India, [email protected]
AN OPTIMIZATION FRAMEWORK FOR CLOUD-BASED DATA MANAGEMENT MODEL IN SMART GRID
IJRET: International Journal of Research in Engineering and Technology ein: 239-63 pin: 232-7308 AN OTIMIZATION FRAMEWORK FOR CLOUD-AED DATA MANAGEMENT MODEL IN MART GRID.M.Devie,.Kalyani 2 Assistant rofessor,
Introduction To Genetic Algorithms
1 Introduction To Genetic Algorithms Dr. Rajib Kumar Bhattacharjya Department of Civil Engineering IIT Guwahati Email: [email protected] References 2 D. E. Goldberg, Genetic Algorithm In Search, Optimization
A hybrid Approach of Genetic Algorithm and Particle Swarm Technique to Software Test Case Generation
A hybrid Approach of Genetic Algorithm and Particle Swarm Technique to Software Test Case Generation Abhishek Singh Department of Information Technology Amity School of Engineering and Technology Amity
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering
DOI: 10.15662/ijareeie.2014.0307061 Economic Dispatch of Power System Optimization with Power Generation Schedule Using Evolutionary Technique Girish Kumar 1, Rameshwar singh 2 PG Student [Control system],
CLOUD DATABASE ROUTE SCHEDULING USING COMBANATION OF PARTICLE SWARM OPTIMIZATION AND GENETIC ALGORITHM
CLOUD DATABASE ROUTE SCHEDULING USING COMBANATION OF PARTICLE SWARM OPTIMIZATION AND GENETIC ALGORITHM *Shabnam Ghasemi 1 and Mohammad Kalantari 2 1 Deparment of Computer Engineering, Islamic Azad University,
Constrained Classification of Large Imbalanced Data by Logistic Regression and Genetic Algorithm
Constrained Classification of Large Imbalanced Data by Logistic Regression and Genetic Algorithm Martin Hlosta, Rostislav Stríž, Jan Kupčík, Jaroslav Zendulka, and Tomáš Hruška A. Imbalanced Data Classification
Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm
Journal of Al-Nahrain University Vol.15 (2), June, 2012, pp.161-168 Science Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm Manal F. Younis Computer Department, College
Optimal Tuning of PID Controller Using Meta Heuristic Approach
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 2 (2014), pp. 171-176 International Research Publication House http://www.irphouse.com Optimal Tuning of
A Robust Method for Solving Transcendental Equations
www.ijcsi.org 413 A Robust Method for Solving Transcendental Equations Md. Golam Moazzam, Amita Chakraborty and Md. Al-Amin Bhuiyan Department of Computer Science and Engineering, Jahangirnagar University,
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
Genetic Algorithm Based Interconnection Network Topology Optimization Analysis
Genetic Algorithm Based Interconnection Network Topology Optimization Analysis 1 WANG Peng, 2 Wang XueFei, 3 Wu YaMing 1,3 College of Information Engineering, Suihua University, Suihua Heilongjiang, 152061
Search Taxonomy. Web Search. Search Engine Optimization. Information Retrieval
Information Retrieval INFO 4300 / CS 4300! Retrieval models Older models» Boolean retrieval» Vector Space model Probabilistic Models» BM25» Language models Web search» Learning to Rank Search Taxonomy!
Estimation of the COCOMO Model Parameters Using Genetic Algorithms for NASA Software Projects
Journal of Computer Science 2 (2): 118-123, 2006 ISSN 1549-3636 2006 Science Publications Estimation of the COCOMO Model Parameters Using Genetic Algorithms for NASA Software Projects Alaa F. Sheta Computers
CHAPTER 3 SECURITY CONSTRAINED OPTIMAL SHORT-TERM HYDROTHERMAL SCHEDULING
60 CHAPTER 3 SECURITY CONSTRAINED OPTIMAL SHORT-TERM HYDROTHERMAL SCHEDULING 3.1 INTRODUCTION Optimal short-term hydrothermal scheduling of power systems aims at determining optimal hydro and thermal generations
Dynamic Security Assessment in the Future Grid. Vijay Vittal Ira A. Fulton Chair Professor Arizona State University
1 Dynamic Security Assessment in the Future Grid Vijay Vittal Ira A. Fulton Chair Professor Arizona State University 2 Key requirements for DSA Need to perform DSA as close to real time as possible Need
Hybrid processing of SCADA and synchronized phasor measurements for tracking network state
IEEE PES General Meeting, Denver, USA, July 2015 1 Hybrid processing of SCADA and synchronized phasor measurements for tracking network state Boris Alcaide-Moreno Claudio Fuerte-Esquivel Universidad Michoacana
Dynamic Generation of Test Cases with Metaheuristics
Dynamic Generation of Test Cases with Metaheuristics Laura Lanzarini, Juan Pablo La Battaglia III-LIDI (Institute of Research in Computer Science LIDI) Faculty of Computer Sciences. National University
A RANDOMIZED LOAD BALANCING ALGORITHM IN GRID USING MAX MIN PSO ALGORITHM
International Journal of Research in Computer Science eissn 2249-8265 Volume 2 Issue 3 (212) pp. 17-23 White Globe Publications A RANDOMIZED LOAD BALANCING ALGORITHM IN GRID USING MAX MIN ALGORITHM C.Kalpana
BMOA: Binary Magnetic Optimization Algorithm
International Journal of Machine Learning and Computing Vol. 2 No. 3 June 22 BMOA: Binary Magnetic Optimization Algorithm SeyedAli Mirjalili and Siti Zaiton Mohd Hashim Abstract Recently the behavior of
A Novel Constraint Handling Strategy for Expensive Optimization Problems
th World Congress on Structural and Multidisciplinary Optimization 7 th - 2 th, June 25, Sydney Australia A Novel Constraint Handling Strategy for Expensive Optimization Problems Kalyan Shankar Bhattacharjee,
A Binary Model on the Basis of Imperialist Competitive Algorithm in Order to Solve the Problem of Knapsack 1-0
212 International Conference on System Engineering and Modeling (ICSEM 212) IPCSIT vol. 34 (212) (212) IACSIT Press, Singapore A Binary Model on the Basis of Imperialist Competitive Algorithm in Order
A New Quantitative Behavioral Model for Financial Prediction
2011 3rd International Conference on Information and Financial Engineering IPEDR vol.12 (2011) (2011) IACSIT Press, Singapore A New Quantitative Behavioral Model for Financial Prediction Thimmaraya Ramesh
Phase Balancing of Distribution Systems Using a Heuristic Search Approach
Phase Balancing of Distribution Systems Using a Heuristic Search Approach Lin, Chia-Hung*, Kang, Meei-Song**, Chuang, Hui-Jen**, and Ho, Chin-Ying** *National Kaohsiung University of Applied Sciences **Kao
Practical Applications of Evolutionary Computation to Financial Engineering
Hitoshi Iba and Claus C. Aranha Practical Applications of Evolutionary Computation to Financial Engineering Robust Techniques for Forecasting, Trading and Hedging 4Q Springer Contents 1 Introduction to
Manjeet Kaur Bhullar, Kiranbir Kaur Department of CSE, GNDU, Amritsar, Punjab, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Multiple Pheromone
Numerical Research on Distributed Genetic Algorithm with Redundant
Numerical Research on Distributed Genetic Algorithm with Redundant Binary Number 1 Sayori Seto, 2 Akinori Kanasugi 1,2 Graduate School of Engineering, Tokyo Denki University, Japan [email protected],
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION Power systems form the largest man made complex system. It basically consists of generating sources, transmission network and distribution centers. Secure and economic operation
A fast multi-class SVM learning method for huge databases
www.ijcsi.org 544 A fast multi-class SVM learning method for huge databases Djeffal Abdelhamid 1, Babahenini Mohamed Chaouki 2 and Taleb-Ahmed Abdelmalik 3 1,2 Computer science department, LESIA Laboratory,
Comparative Analysis of Load Balancing Algorithms in Cloud Computing
Comparative Analysis of Load Balancing Algorithms in Cloud Computing Anoop Yadav Department of Computer Science and Engineering, JIIT, Noida Sec-62, Uttar Pradesh, India ABSTRACT Cloud computing, now a
D-optimal plans in observational studies
D-optimal plans in observational studies Constanze Pumplün Stefan Rüping Katharina Morik Claus Weihs October 11, 2005 Abstract This paper investigates the use of Design of Experiments in observational
IMPROVED NETWORK PARAMETER ERROR IDENTIFICATION USING MULTIPLE MEASUREMENT SCANS
IMPROVED NETWORK PARAMETER ERROR IDENTIFICATION USING MULTIPLE MEASUREMENT SCANS Liuxi Zhang and Ali Abur Department of Electrical and Computer Engineering Northeastern University Boston, MA, USA [email protected]
APPLICATION OF ADVANCED SEARCH- METHODS FOR AUTOMOTIVE DATA-BUS SYSTEM SIGNAL INTEGRITY OPTIMIZATION
APPLICATION OF ADVANCED SEARCH- METHODS FOR AUTOMOTIVE DATA-BUS SYSTEM SIGNAL INTEGRITY OPTIMIZATION Harald Günther 1, Stephan Frei 1, Thomas Wenzel, Wolfgang Mickisch 1 Technische Universität Dortmund,
Stock price prediction using genetic algorithms and evolution strategies
Stock price prediction using genetic algorithms and evolution strategies Ganesh Bonde Institute of Artificial Intelligence University Of Georgia Athens,GA-30601 Email: [email protected] Rasheed Khaled Institute
Support Vector Machines for Dynamic Biometric Handwriting Classification
Support Vector Machines for Dynamic Biometric Handwriting Classification Tobias Scheidat, Marcus Leich, Mark Alexander, and Claus Vielhauer Abstract Biometric user authentication is a recent topic in the
A Fast Computational Genetic Algorithm for Economic Load Dispatch
A Fast Computational Genetic Algorithm for Economic Load Dispatch M.Sailaja Kumari 1, M.Sydulu 2 Email: 1 [email protected] 1, 2 Department of Electrical Engineering National Institute of Technology,
DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES
DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES Vijayalakshmi Mahanra Rao 1, Yashwant Prasad Singh 2 Multimedia University, Cyberjaya, MALAYSIA 1 [email protected]
A Reactive Tabu Search for Service Restoration in Electric Power Distribution Systems
IEEE International Conference on Evolutionary Computation May 4-11 1998, Anchorage, Alaska A Reactive Tabu Search for Service Restoration in Electric Power Distribution Systems Sakae Toune, Hiroyuki Fudo,
A Direct Numerical Method for Observability Analysis
IEEE TRANSACTIONS ON POWER SYSTEMS, VOL 15, NO 2, MAY 2000 625 A Direct Numerical Method for Observability Analysis Bei Gou and Ali Abur, Senior Member, IEEE Abstract This paper presents an algebraic method
Image Normalization for Illumination Compensation in Facial Images
Image Normalization for Illumination Compensation in Facial Images by Martin D. Levine, Maulin R. Gandhi, Jisnu Bhattacharyya Department of Electrical & Computer Engineering & Center for Intelligent Machines
A Review And Evaluations Of Shortest Path Algorithms
A Review And Evaluations Of Shortest Path Algorithms Kairanbay Magzhan, Hajar Mat Jani Abstract: Nowadays, in computer networks, the routing is based on the shortest path problem. This will help in minimizing
Solving Method for a Class of Bilevel Linear Programming based on Genetic Algorithms
Solving Method for a Class of Bilevel Linear Programming based on Genetic Algorithms G. Wang, Z. Wan and X. Wang Abstract The paper studies and designs an genetic algorithm (GA) of the bilevel linear programming
Improved PSO-based Task Scheduling Algorithm in Cloud Computing
Journal of Information & Computational Science 9: 13 (2012) 3821 3829 Available at http://www.joics.com Improved PSO-based Tas Scheduling Algorithm in Cloud Computing Shaobin Zhan, Hongying Huo Shenzhen
Chapter 6. The stacking ensemble approach
82 This chapter proposes the stacking ensemble approach for combining different data mining classifiers to get better performance. Other combination techniques like voting, bagging etc are also described
Scalable Developments for Big Data Analytics in Remote Sensing
Scalable Developments for Big Data Analytics in Remote Sensing Federated Systems and Data Division Research Group High Productivity Data Processing Dr.-Ing. Morris Riedel et al. Research Group Leader,
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Fabian Grüning Carl von Ossietzky Universität Oldenburg, Germany, [email protected] Abstract: Independent
A Method of Cloud Resource Load Balancing Scheduling Based on Improved Adaptive Genetic Algorithm
Journal of Information & Computational Science 9: 16 (2012) 4801 4809 Available at http://www.joics.com A Method of Cloud Resource Load Balancing Scheduling Based on Improved Adaptive Genetic Algorithm
Predictive Analytics using Genetic Algorithm for Efficient Supply Chain Inventory Optimization
182 IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.3, March 2010 Predictive Analytics using Genetic Algorithm for Efficient Supply Chain Inventory Optimization P.Radhakrishnan
A New Method for Traffic Forecasting Based on the Data Mining Technology with Artificial Intelligent Algorithms
Research Journal of Applied Sciences, Engineering and Technology 5(12): 3417-3422, 213 ISSN: 24-7459; e-issn: 24-7467 Maxwell Scientific Organization, 213 Submitted: October 17, 212 Accepted: November
Application of Event Based Decision Tree and Ensemble of Data Driven Methods for Maintenance Action Recommendation
Application of Event Based Decision Tree and Ensemble of Data Driven Methods for Maintenance Action Recommendation James K. Kimotho, Christoph Sondermann-Woelke, Tobias Meyer, and Walter Sextro Department
Bagged Ensemble Classifiers for Sentiment Classification of Movie Reviews
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3951-3961 Bagged Ensemble Classifiers for Sentiment Classification of Movie
Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm
, pp. 99-108 http://dx.doi.org/10.1457/ijfgcn.015.8.1.11 Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm Wang DaWei and Wang Changliang Zhejiang Industry Polytechnic College
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique Aida Parbaleh 1, Dr. Heirsh Soltanpanah 2* 1 Department of Computer Engineering, Islamic Azad University, Sanandaj
A Genetic Algorithm Approach for Solving a Flexible Job Shop Scheduling Problem
A Genetic Algorithm Approach for Solving a Flexible Job Shop Scheduling Problem Sayedmohammadreza Vaghefinezhad 1, Kuan Yew Wong 2 1 Department of Manufacturing & Industrial Engineering, Faculty of Mechanical
Feature Selection for Stock Market Analysis
Feature Selection for Stock Market Analysis Yuqinq He, Kamaladdin Fataliyev, and Lipo Wang School of Electrical and Electronic Engineering Nanyang Technological University Singapore Abstract. The analysis
Evolutionary Detection of Rules for Text Categorization. Application to Spam Filtering
Advances in Intelligent Systems and Technologies Proceedings ECIT2004 - Third European Conference on Intelligent Systems and Technologies Iasi, Romania, July 21-23, 2004 Evolutionary Detection of Rules
Power System Security Monitoring, Analysis, and Control. George Gross
ECE 573 Power System Operations and Control Power System Security Monitoring, Analysis, and Control George Gross Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
Biogeography Based Optimization (BBO) Approach for Sensor Selection in Aircraft Engine
Biogeography Based Optimization (BBO) Approach for Sensor Selection in Aircraft Engine V.Hymavathi, B.Abdul Rahim, Fahimuddin.Shaik P.G Scholar, (M.Tech), Department of Electronics and Communication Engineering,
Comparing the Results of Support Vector Machines with Traditional Data Mining Algorithms
Comparing the Results of Support Vector Machines with Traditional Data Mining Algorithms Scott Pion and Lutz Hamel Abstract This paper presents the results of a series of analyses performed on direct mail
A Service Revenue-oriented Task Scheduling Model of Cloud Computing
Journal of Information & Computational Science 10:10 (2013) 3153 3161 July 1, 2013 Available at http://www.joics.com A Service Revenue-oriented Task Scheduling Model of Cloud Computing Jianguang Deng a,b,,
A Brief Study of the Nurse Scheduling Problem (NSP)
A Brief Study of the Nurse Scheduling Problem (NSP) Lizzy Augustine, Morgan Faer, Andreas Kavountzis, Reema Patel Submitted Tuesday December 15, 2009 0. Introduction and Background Our interest in the
Optimal Branch Exchange for Feeder Reconfiguration in Distribution Networks
Optimal Branch Exchange for Feeder Reconfiguration in Distribution Networks Qiuyu Peng and Steven H. Low Engr. & App. Sci., Caltech, CA Abstract The feeder reconfiguration problem chooses the on/off status
Standardization and Its Effects on K-Means Clustering Algorithm
Research Journal of Applied Sciences, Engineering and Technology 6(7): 399-3303, 03 ISSN: 040-7459; e-issn: 040-7467 Maxwell Scientific Organization, 03 Submitted: January 3, 03 Accepted: February 5, 03
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
A Hybrid Model of Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) Algorithm for Test Case Optimization
A Hybrid Model of Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) Algorithm for Test Case Optimization Abraham Kiran Joseph a, Dr. G. Radhamani b * a Research Scholar, Dr.G.R Damodaran
XOR-based artificial bee colony algorithm for binary optimization
Turkish Journal of Electrical Engineering & Computer Sciences http:// journals. tubitak. gov. tr/ elektrik/ Research Article Turk J Elec Eng & Comp Sci (2013) 21: 2307 2328 c TÜBİTAK doi:10.3906/elk-1203-104
PLAANN as a Classification Tool for Customer Intelligence in Banking
PLAANN as a Classification Tool for Customer Intelligence in Banking EUNITE World Competition in domain of Intelligent Technologies The Research Report Ireneusz Czarnowski and Piotr Jedrzejowicz Department
Introduction to Support Vector Machines. Colin Campbell, Bristol University
Introduction to Support Vector Machines Colin Campbell, Bristol University 1 Outline of talk. Part 1. An Introduction to SVMs 1.1. SVMs for binary classification. 1.2. Soft margins and multi-class classification.
Online Tuning of Artificial Neural Networks for Induction Motor Control
Online Tuning of Artificial Neural Networks for Induction Motor Control A THESIS Submitted by RAMA KRISHNA MAYIRI (M060156EE) In partial fulfillment of the requirements for the award of the Degree of MASTER
Offline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: [email protected] 2 IBM India Research Lab, New Delhi. email: [email protected]
Model-based Parameter Optimization of an Engine Control Unit using Genetic Algorithms
Symposium on Automotive/Avionics Avionics Systems Engineering (SAASE) 2009, UC San Diego Model-based Parameter Optimization of an Engine Control Unit using Genetic Algorithms Dipl.-Inform. Malte Lochau
SURVIVABILITY OF COMPLEX SYSTEM SUPPORT VECTOR MACHINE BASED APPROACH
1 SURVIVABILITY OF COMPLEX SYSTEM SUPPORT VECTOR MACHINE BASED APPROACH Y, HONG, N. GAUTAM, S. R. T. KUMARA, A. SURANA, H. GUPTA, S. LEE, V. NARAYANAN, H. THADAKAMALLA The Dept. of Industrial Engineering,
14.10.2014. Overview. Swarms in nature. Fish, birds, ants, termites, Introduction to swarm intelligence principles Particle Swarm Optimization (PSO)
Overview Kyrre Glette kyrrehg@ifi INF3490 Swarm Intelligence Particle Swarm Optimization Introduction to swarm intelligence principles Particle Swarm Optimization (PSO) 3 Swarms in nature Fish, birds,
Data Mining - Evaluation of Classifiers
Data Mining - Evaluation of Classifiers Lecturer: JERZY STEFANOWSKI Institute of Computing Sciences Poznan University of Technology Poznan, Poland Lecture 4 SE Master Course 2008/2009 revised for 2010
A New Approach For Estimating Software Effort Using RBFN Network
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.7, July 008 37 A New Approach For Estimating Software Using RBFN Network Ch. Satyananda Reddy, P. Sankara Rao, KVSVN Raju,
An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015
An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content
Which Is the Best Multiclass SVM Method? An Empirical Study
Which Is the Best Multiclass SVM Method? An Empirical Study Kai-Bo Duan 1 and S. Sathiya Keerthi 2 1 BioInformatics Research Centre, Nanyang Technological University, Nanyang Avenue, Singapore 639798 [email protected]
Dynamic Task Scheduling with Load Balancing using Hybrid Particle Swarm Optimization
Int. J. Open Problems Compt. Math., Vol. 2, No. 3, September 2009 ISSN 1998-6262; Copyright ICSRS Publication, 2009 www.i-csrs.org Dynamic Task Scheduling with Load Balancing using Hybrid Particle Swarm
D A T A M I N I N G C L A S S I F I C A T I O N
D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.
Making Sense of the Mayhem: Machine Learning and March Madness
Making Sense of the Mayhem: Machine Learning and March Madness Alex Tran and Adam Ginzberg Stanford University [email protected] [email protected] I. Introduction III. Model The goal of our research
Web Service Selection using Particle Swarm Optimization and Genetic Algorithms
Web Service Selection using Particle Swarm Optimization and Genetic Algorithms Simone A. Ludwig Department of Computer Science North Dakota State University Fargo, ND, USA [email protected] Thomas
