scholarly journals Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks

Sensors ◽  
2019 ◽  
Vol 19 (18) ◽  
pp. 3886 ◽  
Author(s):  
Jie Ji ◽  
Guohua Wu ◽  
Jinguo Shuai ◽  
Zhen Zhang ◽  
Zhen Wang ◽  
...  

The privacy and security of the Internet of Things (IoT) are emerging as popular issues in the IoT. At present, there exist several pieces of research on network analysis on the IoT network, and malicious network analysis may threaten the privacy and security of the leader in the IoT networks. With this in mind, we focus on how to avoid malicious network analysis by modifying the topology of the IoT network and we choose closeness centrality as the network analysis tool. This paper makes three key contributions toward this problem: (1) An optimization problem of removing k edges to minimize (maximize) the closeness value (rank) of the leader; (2) A greedy (greedy and simulated annealing) algorithm to solve the closeness value (rank) case of the proposed optimization problem in polynomial time; and (3)UpdateCloseness (FastTopRank)—algorithm for computing closeness value (rank) efficiently. Experimental results prove the efficiency of our pruning algorithms and show that our heuristic algorithms can obtain accurate solutions compared with the optimal solution (the approximation ratio in the worst case is 0.85) and outperform the solutions obtained by other baseline algorithms (e.g., choose k edges with the highest degree sum).

Author(s):  
Jonathan Cagan ◽  
Thomas R. Kurfess

Abstract We introduce a methodology for concurrent design that considers the allocation of tolerances and manufacturing processes for minimum cost. Cost is approximated as a hyperbolic function over tolerance, and worst-case stack-up tolerance is assumed. Two simulated annealing techniques are introduced to solve the optimization problem. The first assumes independent, unordered, manufacturing processes and uses a Monte-Carlo simulation; the second assumes well known individual process cost functions which can be manipulated to create a single continuous function of cost versus tolerance with discontinuous derivatives solved with a continuous simulated annealing algorithm. An example utilizing a system of friction wheels over the manufacturing processes of turning, grinding, and saw cutting bar stock demonstrates excellent results.


Author(s):  
Jiantao Liu ◽  
Hae Chang Gea ◽  
Ping An Du

Robust structural design optimization with non-probabilistic uncertainties is often formulated as a two-level optimization problem. The top level optimization problem is simply to minimize a specified objective function while the optimized solution at the second level solution is within bounds. The second level optimization problem is to find the worst case design under non-probabilistic uncertainty. Although the second level optimization problem is a non-convex problem, the global optimal solution must be assured in order to guarantee the solution robustness at the first level. In this paper, a new approach is proposed to solve the robust structural optimization problems with non-probabilistic uncertainties. The WCDO problems at the second level are solved directly by the monotonocity analysis and the global optimality is assured. Then, the robust structural optimization problem is reduced to a single level problem and can be easily solved by any gradient based method. To illustrate the proposed approach, truss examples with non-probabilistic uncertainties on stiffness and loading are presented.


2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Junxia Li ◽  
Hui Zhao ◽  
Xueyan Chen ◽  
Zheng Chu ◽  
Li Zhen ◽  
...  

This paper investigates a secure wireless-powered sensor network (WPSN) with the aid of a cooperative jammer (CJ). A power station (PS) wirelessly charges for a user equipment (UE) and the CJ to securely transmit information to an access point (AP) in the presence of multiple eavesdroppers. Also, the CJ are deployed, which can introduce more interference to degrade the performance of the malicious eavesdroppers. In order to improve the secure performance, we formulate an optimization problem for maximizing the secrecy rate at the AP to jointly design the secure beamformer and the energy time allocation. Since the formulated problem is not convex, we first propose a global optimal solution which employs the semidefinite programming (SDP) relaxation. Also, the tightness of the SDP relaxed solution is evaluated. In addition, we investigate a worst-case scenario, where the energy time allocation is achieved in a closed form. Finally, numerical results are presented to confirm effectiveness of the proposed scheme in comparison to the benchmark scheme.


2015 ◽  
Vol 07 (03) ◽  
pp. 1550032 ◽  
Author(s):  
Abdullah N. Arslan ◽  
Betsy George ◽  
Kirsten Stor

The pattern matching with wildcards and length constraints problem is an interesting problem in the literature whose computational complexity is still open. There are polynomial time exact algorithms for its special cases. There are heuristic algorithms, and online algorithms that do not guarantee an optimal solution to the original problem. We consider two special cases of the problem for which we develop offline solutions. We give an algorithm for one case with provably better worst case time complexity compared to existing algorithms. We present the first exact algorithm for the second case. This algorithm uses integer linear programming (ILP) and it takes polynomial time under certain conditions.


2018 ◽  
Vol 7 (2.4) ◽  
pp. 165
Author(s):  
Shilpa Kukreja ◽  
Surjeet Dalal ◽  
. .

Optimizing a problem is common among the researchers in all the fields. The worst case of the optimization problem is that when it is not solved by putting lots of efforts and human capital is spoiled in dealing with the problem. So, to search for the optimal solution of a problem is becoming a tedious job for the scholars. Many algorithms have been applied to solve these long-standing complex problems. In this paper, Drosophila Food search optimization (DFO) Algorithm is applied, which explores its vision foraging behavior in the global optimization process. The objective behind the use of DFOA is to achieve fast computation, maximizing resource utilization and minimizing makespan. The survey of our work presents the state-of-the-art in recent research.  


Author(s):  
M. N. Abdullah ◽  
A. F. A. Manan ◽  
J. J. Jamian ◽  
S. A. Jumaat ◽  
N. H. Radzi

Non-convex Optimal Economic Dispatch (OED) problem is a complex optimization problem in power system operation that must be optimized economically to meet the power demand and system constraints. The non-convex OED is due to the generator characteristic such as prohibited operation zones, valve point effects (VPE) or multiple fuel options. This paper proposes a Gbest Artificial Bee Colony (GABC) algorithm based on global best particle (gbest) guided of Particle Swarm Optimization (PSO) in Artificial bee colony (ABC) algorithm for solving non-convex OED with VPE. In order to investigate the effectiveness and performance of GABC algorithm, the IEEE 14-bus 5 unit generators and IEEE 30-bus 6 unit generators test systems are considered. The comparison of optimal solution, convergence characteristic and robustness are also highlighted to reveal the advantages of GABC. Moreover, the optimal results obtained by proposed GABC are compared with other reported results of meta-heuristic algorithms. It found that the GABC capable to obtain lowest cost as compared to others. Thus, it has great potential to be implemented in  different types of power system optimization problem.


Author(s):  
Ali Ahmid ◽  
Thien-My Dao ◽  
Van LÊ

This paper presents the performance comparison of five meta-heuristic algorithms to solve a discrete optimization problem. The comparison is undertaken for a case of simply supported plate subjected to biaxial loading conditions. Furthermore, the optimization objective is to determine the optimal stacking sequence design of a laminate that maximizes the critical buckling load factor (λcb). The chosen meta-heuristics have been implemented using MATLAB with the same convergence criteria and the same maximum number of iterations to ensure a fair comparison. The implemented assessment criterion has performance measures of average CPU time, solution price, reliability, and normalized price. The results have demonstrated the outperformance of the Ant Colony Optimization Algorithm (ACOA) over other algorithms, which confirms the findings of previous studies. Moreover, the Tabu search algorithm (TS) and the Discrete Particle Swarm Optimization algorithm (DPSO) performed poorly due to their limited exploration capability. Additionally, the Genetic Algorithm (GA) and the Simulated Annealing algorithm (SA) exhibited a high level of reliability but showed an expensive solution cost. This study presents an adequate comparison approach of meta-heuristics, where it extends the comparison scope to cover the performance analysis of meta-heuristics more than that previously done in the domain of stacking sequence design optimization.


Author(s):  
Igor Kozin ◽  
Natalia Maksyshko ◽  
Yaroslav Tereshko

The paper proposes a modification of the simulated annealing algorithm as applied to problems that have a fragmented structure. An algorithm for simulating annealing for the traveling salesman problem is considered and its applicability to the optimization problem on a set of permutations is shown. It is proved that the problem of equilibrium placement of point objects on a plane has a fragmentary structure and, therefore, reduces to an optimization problem on a set of permutations. The results of numerical experiments for various types of algorithms for finding the optimal solution in the equilibrium placement problem are presented.


2014 ◽  
Vol 2014 ◽  
pp. 1-9 ◽  
Author(s):  
Hui Huang ◽  
Yan Jin ◽  
Bo Huang ◽  
Han-Guang Qiu

Timely components replenishment is the key to ATO (assemble-to-order) supply chain operating successfully. We developed a production and replenishment model of ATO supply chain, where the ATO manufacturer adopts both JIT and (Q,r) replenishment mode simultaneously to replenish components. The ATO manufacturer’s mixed replenishment policy and component suppliers’ production policies are studied. Furthermore, combining the rapid global searching ability of genetic algorithm and the local searching ability of simulated annealing algorithm, a hybrid genetic simulated annealing algorithm (HGSAA) is proposed to search for the optimal solution of the model. An experiment is given to illustrate the rapid convergence of the HGSAA and the good quality of optimal mixed replenishment policy obtained by the HGSAA. Finally, by comparing the HGSAA with GA, it is proved that the HGSAA is a more effective and reliable algorithm than GA for solving the optimization problem of mixed replenishment policy for ATO supply chain.


2021 ◽  
Vol 47 (3) ◽  
pp. 1236-1242
Author(s):  
Collether John

Portfolio can be defined as a collection of investments. Portfolio optimization usually is about maximizing expected return and/or minimising risk of a portfolio. The mean-variance model makes simplifying assumptions to solve portfolio optimization problem. Presence of realistic constraints leads to a significant different and complex problem. Also, the optimal solution under realistic constraints cannot always be derived from the solution for the frictionless market. The heuristic algorithms are alternative approaches to solve the extended problem. In this research, a heuristic algorithm is presented and improved for higher efficiency and speed. It is a hill climbing algorithm to tackle the extended portfolio optimization problem. The improved algorithm is Hill Climbing Simple–with Reducing Thresh-hold Percentage, named HC-S-R. It is applied in standard portfolio optimization problem and benchmarked with the quadratic programing method and the Threshold Accepting algorithm, a well-known heuristic algorithm for portfolio optimization problem. The results are also compared with its original algorithm HC-S. HC-S-R proves to be a lot faster than HC-S and TA and more effective and efficient than TA. Keywords: Portfolio optimization; Hill climbing algorithm; Threshold percentage; Reducing sequence; Threshold Acceptance algorithm


Sign in / Sign up

Export Citation Format

Share Document