Ajith Abraham · Abdelkrim Haqiq Azah Kamilah Muda · Niketa .

2y ago
21 Views
4 Downloads
1.37 MB
30 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Pierre Damon
Transcription

Advances in Intelligent Systems and Computing 735Ajith Abraham · Abdelkrim HaqiqAzah Kamilah Muda · Niketa GandhiEditorsInnovations inBio-InspiredComputing andApplicationsProceedings of the 8th InternationalConference on Innovations in Bio-InspiredComputing and Applications (IBICA 2017)Held in Marrakech, Morocco,December 11–13, 2017

Advances in Intelligent Systems and ComputingVolume 735Series editorJanusz Kacprzyk, Polish Academy of Sciences, Warsaw, Polande-mail: kacprzyk@ibspan.waw.pl

The series “Advances in Intelligent Systems and Computing” contains publications on theory,applications, and design methods of Intelligent Systems and Intelligent Computing. Virtuallyall disciplines such as engineering, natural sciences, computer and information science, ICT,economics, business, e-commerce, environment, healthcare, life science are covered. The listof topics spans all the areas of modern intelligent systems and computing.The publications within “Advances in Intelligent Systems and Computing” are primarilytextbooks and proceedings of important conferences, symposia and congresses. They coversignificant recent developments in the field, both of a foundational and applicable character.An important characteristic feature of the series is the short publication time and world-widedistribution. This permits a rapid and broad dissemination of research results.Advisory BoardChairmanNikhil R. Pal, Indian Statistical Institute, Kolkata, Indiae-mail: nikhil@isical.ac.inMembersRafael Bello Perez, Universidad Central “Marta Abreu” de Las Villas, Santa Clara, Cubae-mail: rbellop@uclv.edu.cuEmilio S. Corchado, University of Salamanca, Salamanca, Spaine-mail: escorchado@usal.esHani Hagras, University of Essex, Colchester, UKe-mail: hani@essex.ac.ukLászló T. Kóczy, Széchenyi István University, Győr, Hungarye-mail: koczy@sze.huVladik Kreinovich, University of Texas at El Paso, El Paso, USAe-mail: vladik@utep.eduChin-Teng Lin, National Chiao Tung University, Hsinchu, Taiwane-mail: ctlin@mail.nctu.edu.twJie Lu, University of Technology, Sydney, Australiae-mail: Jie.Lu@uts.edu.auPatricia Melin, Tijuana Institute of Technology, Tijuana, Mexicoe-mail: epmelin@hafsamx.orgNadia Nedjah, State University of Rio de Janeiro, Rio de Janeiro, Brazile-mail: nadia@eng.uerj.brNgoc Thanh Nguyen, Wroclaw University of Technology, Wroclaw, Polande-mail: Ngoc-Thanh.Nguyen@pwr.edu.plJun Wang, The Chinese University of Hong Kong, Shatin, Hong Konge-mail: jwang@mae.cuhk.edu.hkMore information about this series at http://www.springer.com/series/11156

Ajith Abraham Abdelkrim HaqiqAzah Kamilah Muda Niketa Gandhi EditorsInnovations in Bio-InspiredComputing and ApplicationsProceedings of the 8th InternationalConference on Innovations in Bio-InspiredComputing and Applications (IBICA 2017)Held in Marrakech, Morocco,December 11–13, 2017123

EditorsAjith AbrahamMachine Intelligence Research LabsAuburn, WAUSAAbdelkrim HaqiqFaculty of Sciences and TechniquesHassan 1st UniversitySettatMoroccoAzah Kamilah MudaFaculty of Information and CommunicationTechnologyUniversiti Teknikal Malaysia MelakaDurian Tunggal, MelakaMalaysiaNiketa GandhiMachine Intelligence Research LabsAuburn, WAUSAISSN 2194-5357ISSN 2194-5365 (electronic)Advances in Intelligent Systems and ComputingISBN 978-3-319-76353-8ISBN 978-3-319-76354-5 brary of Congress Control Number: 2018935891 Springer International Publishing AG, part of Springer Nature 2018This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or partof the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmissionor information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilarmethodology now known or hereafter developed.The use of general descriptive names, registered names, trademarks, service marks, etc. in thispublication does not imply, even in the absence of a specific statement, that such names are exempt fromthe relevant protective laws and regulations and therefore free for general use.The publisher, the authors and the editors are safe to assume that the advice and information in thisbook are believed to be true and accurate at the date of publication. Neither the publisher nor theauthors or the editors give a warranty, express or implied, with respect to the material contained herein orfor any errors or omissions that may have been made. The publisher remains neutral with regard tojurisdictional claims in published maps and institutional affiliations.Printed on acid-free paperThis Springer imprint is published by the registered company Springer International Publishing AGpart of Springer NatureThe registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

PrefaceWelcome to the Proceedings of the 8th International Conference on Innovations inBio-Inspired Computing and Applications (IBICA 2017). IBICA 2017 was organized in conjunction with 13th International Conference on Information Assuranceand Security (IAS 2017). Conferences were held at Mogador Hotels & Resorts,Marrakech, Morocco, during December 11–13, 2017. IBICA–IAS 2017 conferences are jointly organized by the Machine Intelligence Research Labs (MIR Labs),USA, and Faculty of Sciences and Techniques, Hassan 1st University, Settat,Morocco.The aim of IBICA is to provide a platform for world research leaders andpractitioners, to discuss the “full spectrum” of current theoretical developments,emerging technologies, and innovative applications of bio-inspired computing.Bio-inspired computing is currently one of the most exciting research areas, and it iscontinuously demonstrating exceptional strength in solving complex real-lifeproblems.The themes of the contributions and scientific sessions range from theories toapplications, reflecting a wide spectrum of the coverage of bio-inspired computing,intelligent systems, and its applications. IBICA 2017 received submissions fromover 18 countries, and each paper was reviewed by at least 5 reviewers in a standardpeer-review process. Based on the recommendation by 5 independent referees,finally 33 papers were accepted for publication in the proceedings published bySpringer-Verlag.Many people have collaborated and worked hard to produce a successful IBICA2017 conference. First and foremost, we would like to thank all the authors forsubmitting their papers to the conference, for their presentations and discussionsduring the conference. Our thanks go to Program Committee members andreviewers, who carried out the most difficult work by carefully evaluating thesubmitted papers. Our special thanks to Oscar Castillo (Tijuana Institute ofTechnology, Tijuana, Mexico) and Alexander Gelbukh (Instituto PolitécnicoNacional, Mexico City, Mexico) for the exciting plenary talks.v

viPrefaceWe express our sincere thanks to special session chairs and organizing committee chairs for helping us to formulate a rich technical program.Abdelkrim HaqiqAjith AbrahamIBICA 2017 - General Chairs

IBICA 2017 OrganizationHonorary ChairsAhmed NejmeddineHoussine BouayadPresident of Hassan 1st University, Settat,MoroccoActing Dean of FST, Hassan 1st University,Settat, MoroccoGeneral ChairsAbdelkrim HaqiqAjith AbrahamGREENTIC, FST, Hassan 1st University, Settat,MoroccoMIR Labs, USAGeneral Co-chairsLayth SlimanAdel M. AlimiEFREI, Paris, FranceUniversity of Sfax, TunisiaPC Co-chairsAntonio J. Tallón-BallesterosNelishia PillayMillie PantHuang DijiangNizar RokbaniGhita MezourUniversity of Seville, SpainUniversity of Pretoria, South AfricaIndian Institute of Technology Roorkee, IndiaArizona State University, USAUniversity of Sousse, TunisiaInternational University of Rabat, Moroccovii

viiiIBICA 2017 OrganizationAdvisory BoardAlbert ZomayaBruno ApolloniHideyuki TakagiImre J. RudasJanusz KacprzykJavier MonteroKrzysztof CiosMario KoeppenPatrick SiarrySalah Al-SharhanSebastian VenturaVincenzo PiuriThe University of Sydney, AustraliaUniversity of Milano, ItalyKyushu University, JapanÓbuda University, HungaryPolish Academy of Sciences, PolandComplutense University of Madrid, SpainVirginia Commonwealth University, USAKyushu Institute of Technology, JapanUniversité Paris-Est Créteil, FranceGulf University of Science and Technology,KuwaitUniversity of Cordoba, SpainUniversità degli Studi di Milano, ItalyPublication ChairsAzah Kamilah MudaNiketa GandhiUTeM, MalaysiaMachine Intelligence Research Labs, USAWeb ServiceKun MaUniversity of Jinan, ChinaPublicity ChairBrahim OuhbiENSAM, Moulay Ismail University, Meknès,MoroccoOrganizing ChairsJaouad DabounouMohamed HaniniMohamed ChakraouiFST, Hassan 1st University, Settat, MoroccoFST, Hassan 1st University, Settat, MoroccoMultidisciplinary Faculty of Khouribga, Morocco

IBICA 2017 OrganizationixOrganizing CommitteeYoumna El HissAyman HadriAmine MaaroufAhmed BoujnouiHamid TaramitAdnane El HanjriEl Mehdi KandoussiFST, Hassan 1st University, Settat, MoroccoFST, Hassan 1st University, Settat, MoroccoxHub, Technopark, Casablanca, MoroccoFST, Hassan 1st University, Settat, MoroccoFST, Hassan 1st University, Settat, MoroccoFST, Hassan 1st University, Settat, MoroccoFST, Hassan 1st University, Settat, MoroccoInternational Program CommitteeH. El BakkaliAbdelkrim HaqiqAbderrahim Beni HssaneAjith AbrahamAlan BartonAlberto CanoAntonio J. Tallón BallesterosAswani CherukuriAzah Kamilah MudaBrahim OuhbiEnrique DominguezFrancisco MartineGhizlane OrhanouHaresh SutharJosu CeberioJulio Cesar NievolaJulio PonceKang TaiKatsuhiro HondaKelemen ArpadLeticia HernandoLin WangLubna GabrallaUniversity Mohammed V Rabat ENSIAS, Rabat,MoroccoHassan 1st University, MoroccoChouaib Doukkali University, El Jadida,MoroccoMachine Intelligence Research Labs, USACarleton University, CanadaUniversity of Córdoba, SpainUniversidad de Sevilla, SpainVIT University, IndiaUniversiti Teknikal Malaysia Melaka, MalaysiaUniversité Moulay Ismail, MoroccoUniversidad de Málaga, SpainNational Institute of Astrophysics,Optics and Electronics, FranceFaculté des Sciences, Université MohammedV-Agdal, Rabat, MoroccoPanipat Institute of Engineering & Technology,IndiaUniversity of the Basque Country, SpainPontifícia Universidade Católica do Paraná,BrazilUniversidad Autónoma de Aguascalientes,MexicoNanyang Technological University, SingaporeOsaka Prefecture University, JapanUniversity of Maryland, USAThe University of the Basque Country, SpainJinan University, ChinaSudan University of Science and Technology,Sudan

xLudwig SimoneMario I. Chacon-MurguiaMauro GaggeroMillie PantMohammad ShojafarMostafa EzziyyaniNiketa GandhiNizar RokbaniOscar CastilloOscar Gabriel Reyes PupoOtoniel Lopez GranadoPatrick SiarryPaulo CarrascoPedro Antonio GutierrezPedro CoelhoPranab MuhuriRoberto Antonio VázquezEspinoza De Los MonterosRoberto ArmeniseRung-Ching ChenRushed KanawatiSaid El HajjiSaid El KafhaliShantanu GhoshShing Chiang TanSwati VshindeTarun SharmaTzung Pei HongUwe TangenVarun Kumar OjhaVincenzo PiuriWladyslaw HomendaXianneng LiYassine MalehYi MeiYing Ping ChenZahi JarirIBICA 2017 OrganizationNorth Dakota State University, USAInstituto Tecnológico de Chihuahua II, MexicoConsiglio Nazionale delle Ricerche, ItalyIndian Institute of Technology Roorkee, IndiaSapienza University of Rome, ItalyAbdelmalek Essaadi University, MoroccoMachine Intelligence Research Labs, USAÉcole Nationale d’Ingénieurs de Sfax, TunisiaInstituto Tecnológico de Tijuana, MexicoThe University of Central Oklahoma, USAMiguel Hernandez University, SpainUniversité de Paris, FranceUniversidade do Algarve, PortugalUniversidad Loyola Andalucía, SpainUniversidade do Estado do Rio de Janeiro, BrazilSouth Asian University, IndiaLasallistas de Corazón, MexicoPoste Italiane S.p.A., ItalyChaoyang University of Technology, TaiwanUniversité Paris 13, FranceFaculté des Sciences, Université MohammedV-Agdal, Rabat, MoroccoHassan 1st University, MoroccoHarvard University, UKMultimedia University, MalaysiaPimpri Chinchwad College of Engineering, IndiaIndian Institute of Technology Roorkee, IndiaNational University of Kaohsiung, TaiwanRuhr-Universität Bochum, GermanySwiss Federal Institute of Technology,SwitzerlandUniversità degli Studi di Milano, ItalyWarsaw University of Technology, PolandDalian University of Technology, ChinaHassan 1st University, Settat, MoroccoRMIT University, AustraliaNational Chiao Tung University, TaiwanCadi Ayyad University, Morocco

IBICA 2017 OrganizationxiAdditional ReviewersAbdelali El BouchtiArun Kumar SangaiahBrahim OuhbiEl Moukhtar ZemmouriGhizlane OrhanouHanini MohamedKamal OudidiKusum DeepMohamed HaniniMohamed MoughitMohammed RidouaniOussama MjihilSaid El KafhaliSambit BakshiTrivedi KishorYassine MalehYassine SadqiOmar IraquiJesus Benito-PicazoPrashant K. GuptaBournemouth University, UKVIT University, Tamil Nadu, IndiaMoulay Ismaïl University, Meknès, MoroccoMoulay Ismaïl University, Meknès, MoroccoMohammed V University of Rabat, MoroccoHassan 1st University, MoroccoNational School of Computer and SystemsAnalysis, Rabat, MoroccoIndian Institute of Technology Roorkee, IndiaHassan 1st University, MoroccoHassan 1st University, MoroccoGREENTIC/EST, UH2C, Casablanca, MoroccoHassan 1st University, MoroccoHassan 1st University, MoroccoNational Institute of Technology Rourkela, IndiaDuke University, NC, USAHassan 1st University, MoroccoUniversity Sultan Moulay Slimane, Beni Mellal,MoroccoUniversity of Milan, Milano, ItalyUniversity of Malaga, Málaga, SpainSouth Asian University, India

ContentsDynamic Parameter Adaptation Using Interval Type-2 FuzzyLogic in Bio-Inspired Optimization Methods . . . . . . . . . . . . . . . . . . . . .Oscar Castillo, Frumen Olivas, and Fevrier ValdezReducing Blackhole Effect in WSN . . . . . . . . . . . . . . . . . . . . . . . . . . . .Sana Akourmis, Youssef Fakhri, and Moulay Driss RahmaniMinimum Spanning Tree in Trapezoidal Fuzzy NeutrosophicEnvironment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Said Broumi, Assia Bakali, Mohamed Talea, Florentin Smarandache,and Vakkas UluçayDifferential Evolution Assisted MUD for MC-CDMA SystemsUsing Non-orthogonal Spreading Codes . . . . . . . . . . . . . . . . . . . . . . . . .Atta-ur-Rahman, Kiran Sultan, Nahier Aldhafferi,and Abdullah AlqahtaniSolving the Problem of Distribution of Fiscal Couponsby Using a Steady State Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . .Qëndresë Hyseni, Sule Yildirim Yayilgan, Bujar Krasniqi,and Kadri Sylejmani113253649A Survey of Cross-Layer Design for Wireless VisualSensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Afaf Mosaif and Said Rakrak60An IPv6 Flow Label Based Approach for Mobile IPTV Qualityof Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Mohamed Matoui, Noureddine Moumkine, and Abdellah Adib69NWP Model Revisions Using Polynomial Similarity Solutionsof the General Partial Differential Equation . . . . . . . . . . . . . . . . . . . . . .Ladislav Zjavka, Stanislav Mišák, and Lukáš Prokop81xiii

xivContentsEnergy Consumption and Cost Analysis for Data Centerswith Workload Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Abdellah Ouammou, Mohamed Hanini, Said El Kafhali,and Abdelghani Ben Tahar92A Stochastic Game Analysis of the Slotted ALOHA MechanismCombined with ZigZag Decoding and Transmission Cost . . . . . . . . . . . 102Ahmed Boujnoui, Abdellah Zaaloul, and Abdelkrim HaqiqAnalytic Approach Using Continuous Markov Chain to Improvethe QoS of a Wireless Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113Adnane El Hanjri, Abdellah Zaaloul, and Abdelkrim HaqiqDetermining and Evaluating the Most Route Lifetimeas the Most Stable Route Between Two Vehicles in VANET . . . . . . . . . 125Mohamed Nabil, Abdelmajid Hajami, and Abdelkrim HaqiqReverse Extraction of Early-Age Hydration Kinetic Equationof Portland Cement Using Gene Expression Programmingwith Similarity Weight Tournament Selection . . . . . . . . . . . . . . . . . . . . 133Mengfan Zhi, Ziqiang Yu, Bo Yang, Lin Wang, Liangliang Zhang,Jifeng Guo, and Xuehui ZhuPerformance Improvement of Bio-Inspired StrategiesThrough Feedback Laws . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143Lairenjam Obiroy Singh and R. DevanathanA Semantic Approach Towards Online Social NetworksMulti-aspects Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157Asmae El Kassiri and Fatima-Zahra BelouadhaTowards a New Generation of Wheelchairs Sensitiveto Emotional Behavior of Disabled People . . . . . . . . . . . . . . . . . . . . . . . 169Mohamed Moncef Ben Khelifa, Hachem A. Lamti,and Adel M. AlimiA Comprehensive Technical Review on Security Techniquesand Low Power Target Architectures for Wireless Sensor Networks . . . 178Abdulfattah M. Obeid, Manel Elleuchi, Mohamed Wassim Jmal,Manel Boujelben, Mohamed Abid, and Mohammed S. BenSalehA Closed Form Expression for the Bit Error Probabilityfor Majority Logic Decoding of CSOC Codes over CC Channels . . . . . . 200Souad Labghough, Fouad Ayoub, and Mostafa BelkasmiStraightforward MAAS to Ensure Interoperabilityin Heterogeneous Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211Majda Elhozmari and Ahmed Ettalbi

ContentsxvA Capability Maturity Framework for IT Security Governancein Organizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221Yassine Maleh, Abdelkbir Sahid, Abdellah Ezzati,and Mustapha BelaissaouiSystem Multi Agents for Automatic Negotiation of SLAin Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234Zineb Bakraouy, Amine Baina, and Mostafa BellafkihA Comparison Between Modeling a Normal and an EpilepticState Using the FHN and the Epileptor Model . . . . . . . . . . . . . . . . . . . . 245R. Jarray, N. Jmail, A. Hadriche, and T. FrikhaModeling the Effect of Security Measures on ElectronicPayment Risks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255Marie Ndaw, Gervais Mendy, and Samuel OuyaModeling an Anomaly-Based Intrusion Prevention SystemUsing Game Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266El Mehdi Kandoussi, Iman El Mir, Mohamed Hanini,and Abdelkrim HaqiqOptimized Security as a Service Platforms via StochasticModeling and Dynamic Programming . . . . . . . . . . . . . . . . . . . . . . . . . . 277Oussama Mjihil, Hamid Taramit, Abdelkrim Haqiq,and Dijiang HuangMulti-view Web Services as a Key Security Layer in Internetof Things Architecture Within a Cloud Infrastructure . . . . . . . . . . . . . . 288Anass Misbah and Ahmed EttalbiAccess Domain-Based Approach for Anomaly Detectionand Resolution in XACML Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298Maryem Ait El Hadj, Yahya Benkaouz, Ahmed Khoumsi,and Mohammed ErradiBiometric Template Privacy Using Visual Cryptography . . . . . . . . . . . . 309Sana Ibjaoun, Anas Abou El Kalam, Vincent Poirriez,and Abdellah Ait OuahmanScalable and Dynamic Network Intrusion Detectionand Prevention System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318Safaa Mahrach, Oussama Mjihil, and Abdelkrim HaqiqA Hybrid Feature Selection for MRI Brain Tumor Classification . . . . . 329Ahmed Kharrat and Mahmoud NejiA Statistical Analysis for High-Speed Stream Ciphers . . . . . . . . . . . . . . 339Youssef Harmouch and Rachid El Kouch

xviContentsWeighted Access Control Policies Cohabitationin Distributed Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350Asmaa El Kandoussi and Hanan El BakkaliA Comparative Study on Access Control Modelsand Security Requirements in Workflow Systems . . . . . . . . . . . . . . . . . 361Monsef Boughrous and Hanan El BakkaliAuthor Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375

Dynamic Parameter Adaptation Using IntervalType-2 Fuzzy Logic in Bio-InspiredOptimization MethodsOscar Castillo , Frumen Olivas, and Fevrier Valdez()Tijuana Institute of Technology, Calzada Tecnologico s/n, Tomas Aquino, 22379 Tijuana, Mexico{ocastillo,fevrier}@tectijuana.mx, frumen@msn.comAbstract. In this paper we perform a comparison of the use of type-2 fuzzy logicin two bio-inspired methods: Ant Colony Optimization (ACO) and GravitationalSearch Algorithm (GSA). Each of these methods is enhanced with a methodologyfor parameter adaptation using interval type-2 fuzzy logic, where based on somemetrics about the algorithm, like the percentage of iterations elapsed or the diver‐sity of the population, we aim at controlling their behavior and therefore controltheir abilities to perform a global or a local search. To test these methods twobenchmark control problems were used in which a fuzzy controller is optimizedto minimize the error in the simulation with nonlinear complex plants.Keywords: Interval type-2 fuzzy logic · Ant Colony OptimizationGravitational Search Algorithm · Dynamic parameter adaptation1IntroductionBio-inspired optimization algorithms can be applied to most combinatorial and continuousoptimization problems, but for different problems need different parameter values, in orderto obtain better results. There are in the literature, several methods aim at modeling betterthe behavior of these algorithms by adapting some of their parameters [18, 19], introducingdifferent parameters in the equations of the algorithms [4], performing a hybridization withother algorithm [17], and using fuzzy logic [5–9, 14, 16].In this paper a methodology for parameter adaptation using an interval type-2 fuzzysystem is presented, where on each method a better model of the behavior is used inorder to obtain better quality results.The proposed methodology has been previously successfully applied to different bioinspired optimization methods like BCO (Bee Colony Optimization) in [1], CSA(Cuckoo Search Algorithm) in [3], PSO (Particle Swarm optimization) in [5, 7], ACO(Ant Colony Optimization) in [6, 8], GSA (Gravitational Search Algorithm) in [9, 16],DE (Differential Evolution) in [10], HSA (Harmony Search Algorithm) in [11], BA (batAlgorithm) in [12] and in FA (Firefly Algorithm) in [15].The algorithms used in this research are ACO (Ant Colony Optimization) from [8]and GSA (Gravitational Search Algorithm) from [9], each one with dynamic param‐eter adaptation using an interval type-2 fuzzy system. Fuzzy logic proposed by Zadeh Springer International Publishing AG, part of Springer Nature 2018A. Abraham et al. (Eds.): IBICA 2017, AISC 735, pp. 1–12, 2018.https://doi.org/10.1007/978-3-319-76354-5 1

2O. Castillo et al.in [20–22] help us to model a complex problem, with the use of membership func‐tions and fuzzy rules, with the knowledge of a problem from an expert, fuzzy logiccan bring tools to create a model and attack a complex problem.The contribution of this paper is the comparison between the bio-inspired methodswhich use an interval type-2 fuzzy system for dynamic parameter adaptation, in theoptimization of fuzzy controllers for nonlinear complex plants. The adaptation ofparameters with fuzzy logic helps to perform a better design of the fuzzy controllers,based on the results which are better than the original algorithms.2Bio-Inspired Optimization MethodsACO is a bio-inspired algorithm based on swarm intelligence of the ants, proposed byDorigo in [2], where each individual helps each other to find the best route from theirnest to a food source. Artificial ants represent the solutions to a particular problem, whereeach ant is a tour and each node is a dimension or a component of the problem. Biologicalants use pheromone trails to communicate to other ants which path is the best and theartificial ant tries to mimic that behavior in the algorithm.Artificial ants use probability to select the next node using Eq. 1, where with thisequation calculate the probability of an ant k to select the node j from node i.Pkij[ ]𝛼 [ ]𝛽𝜏ij 𝜂ij [ ]𝛼 [ ]𝛽 ,k𝜏il 𝜂il Nliif j Nik(1)The components of Eq. 1 are: Pk is the probability of an ant k to select the node j fromnode i, τij represents the pheromone in the arc that joins the nodes i and j and ηij repre‐sents the visibility from node i to node j, with the condition that node j must be in theneighborhood of node i. Also like in nature the pheromone trail evaporates over time, andthe ACO algorithm uses Eq. 2 to simulate the evaporation of pheromone in the trails.𝜏ij (1 𝜌)𝜏ij , (i, j) L(2)The components of Eq. 2 are: τij representing the pheromone trail in the arc that joinsthe nodes i and j, ρ represents the percentage of evaporation of pheromone, and thisequation is applied to all arcs in the graph L.There are more equations for ACO, but these two equations are the most importantin the dynamics of the algorithm, also these equations contain the parameters used tomodel a better behavior of the algorithm using an interval type-2 fuzzy system.GSA proposed by Rashedi in [13], is a population based algorithm that uses laws ofphysics to update its individuals, more particularly uses the Newtonian law of gravityand the second motion law. In this algorithm each individual is considered as an agent,where each one represent a solution to a problem and each agent has its own mass andcan move to another agent. The mass of an agent is given by the fitness function, agentswith bigger mass are better. Each agent applies some gravitational force to all otheragents, and is calculated using Eq. 3.

Dynamic Parameter Adaptation Using Interval Type-2 Fuzzy LogicFijd (t) G(t)Mpi (t) Maj (t)Rij (t) 𝜀(xjd (t) xid (t))3(3)The components of Eq. 3 are: Fijd is the gravity force between agents i and j, G is thegravitational constant, Mpi is the mass of agent i or passive mass, and Maj is the mass ofagent j or active mass, Rij is the distance between agents i and j, ε is an small number usedto avoid division by zero, xjd is the position of agent j and xid is the position of agent j.The gravitational force is used to calculate the acceleration of the agent using Eq. 4.adi (t) Fid (t)Mii (t)(4)The components of Eq. 4 are: adi is the acceleration force of agent i, Fid is the gravi‐tational force of agent i, and Mii is the inertial mass of agent i.In GSA the gravitational constant G from Eq. 3, unlike in real life here it can bevariable and is given by Eq. 5. 𝛼 t TG(t) G0(5)The components of Eq. 5 are: G is the gravitational constant, G0 is the initial gravi‐tational constant, α is a parameter defined by the user of GSA and is used to control thechange in the gravitational constant, t is the actual iteration and T is the total number ofiterations. To control the elitism GSA uses Eq. 6 to allow only the best agents to applytheir force to other agents, and in initial iterations all the agents apply their force butKbest will decrease over time until only a few agents are allowed to apply their force.Fid (t) randi Fijd (t)j Kbest,j 1(6)The components of Eq. 6 are: Fid is the new gravity force of agent i, Kbest is thenumber of agents allowed to apply their force, sorted by their fitness the best Kbest agentcan apply their force to all other agents, in this equation j is the number of dimension ofagent i.3Methodology for Parameter AdaptationThe optimization methods involved in this comparison have dynamic parameter adap‐tation using interval type-2 fuzzy systems, and each of these adaptations are describedin details for ACO in [8] and for GSA in [9]. The way in which this adaptation ofparameters was performed is as follows: first a metric about the performance of thealgorithms needs to be created, in this case the metrics are a percentage of iterationelapsed described by Eq. 7 and the diversity of individuals described by Eq. 8, then afterthe metrics are defined we need to select the best parameters to be dynamically adjusted,

4O. Castillo et al.and this was done based on experimentation with different levels of all the parametersof each optimization method.Iteration Current IterationMaximum of Iterations(7)The components of Eq. 7 are: Iteration is a percentage of the elapsed iterations,current iteration is the number of elapsed iterations, and maximum of iterations is thetotal number iterations set for the optimization algorithm to find the best possiblesolution. ns nx ( )21 Diversity(S(t)) xij (t) x̄ j (t)ns i 1j 1(8)The components of Eq. 8 are: Diversity(S) is a degree of dispersion of the populationS, ns is the number of individuals in the population S, nx is the number of dimensions ineach individual from the population, xij is the j dimension of the individual i, tested xj isthe j dimension of the best individual in the population. After the metrics are definedand the parameters selected, a fuzzy system is created to adjust just one parameter, andwith this obtain a fuzzy rule set to control this parameter, and for all the parameters weneed to do the same, and at the end only one fuzzy system will be created to control allthe parameters at the same time combining all the created fuzzy systems. The proposedmethodology for parameter adaptation is illustrated in Fig. 1, where it has the optimi‐zation method, which has an interval type-2 fuzzy system for parameter adaptation.Fig. 1. General scheme of the proposal for parameter adaptationFigure 1 illustrates the general scheme for parameter adaptation, in which the bioinspired optimization algorithm is evaluated by the metrics and these are used as inputs

Dynamic Parameter Adaptation Using Interval Type-2 Fuzzy Logic5for the interval type-2 fuzzy system, which will adapt some parameters of the

Ajith Abraham · Abdelkrim Haqiq . Nikhil R. Pal, Indian Statistical Institute, Kolkata, India e-mail: nikhil@isical.ac.in Members Rafael Bello Perez, Universidad Central “Marta Abreu” de

Related Documents:

Ajith Abraham Niketa Gandhi Maria Leonilde Varela Editors Hybrid Intelligent Systems 18th International Conference . Nikhil R. Pal, Indian Statistical Institute, Kolkata, India Rafael Bello Perez, Faculty of Mathematics, Physic

Evolving Turbo Code Interleavers by Genetic Algorithms Ajith Abraham IITA Professorship Program, School of Computer Science and Engineering, Yonsei University1 134 Shinchon-dong, Sudaemoon-ku, Seoul 120-749, Republic of Korea ajith.abraham@ieee.org Pavel Krömer, Václav Snášel Dept. of Computer Science, Faculty of Electrical Engineering

Particle Swarm Optimization Using Sobol Mutation Millie Pant1, Radha Thangaraj1, Ved Pal Singh1 and Ajith Abraham2 1Department. of Paper Technology, IIT Roorkee, India 2Center of Excellence for Quantifiable Quality of Service, Norwegian University of Science and Technology, Norway millifpt@iitr.ernet.in, t.radha@ieee.org, singhf

Intelligent web traffic mining and analysis Xiaozhe Wanga,*, Ajith Abrahamb, Kate A. Smitha aSchool of Business Systems, Faculty of Information Technology, Monash University, Clayton, Victoria 3800, Australia bDepartment of Computer Science, Oklahoma State University, 700 N Greenwood Avenue, Tulsa, OK 74106-0

Melchizedek was a priest to God Most High. Melchizedek blessed Abraham and said, “God has blessed Abraham. Let everyone bless God, who created heaven and earth, because He has handed over Abraham’s enemies.” Then Abraham gave Melchizedek a gift: one-tenth of everything he had. Christ Connection:

uppEr ELEmENtary LESSON 15 preparing to teach teachinG points Abraham knew God would be faithful— When Abraham was old he wanted to send his servant on a journey to find a wife for Isaac. Abraham knew God would provide a wife for his son. There was no doubt in Abraham's mind about that. Abraham's faith came from remembering

32 19lawc1002684 gur rattan pal singh prabhjot singh kingra ur 910505020060 lc-2 male . 41 19lawc1079143 ajith kumar g bhagya ajith ur 910517010058 lc-2 female 42 19lawc1026970 go

Pile properties: The pile is modeled with structural beam elements and can be assigned either linear-elastic or elastic-perfectly plastic material properties. Up to ten different pile sections can be included in a single analysis. Soil p-y curves: The soil is modeled as a collection of independent (Winkler) springs. The load-