{"title":"A Novel Quasi-Oppositional Jaya Algorithm for Optimal Power Flow Solution","authors":"W. Warid, H. Hizam, N. Mariun, N. A. Abdul Wahab","doi":"10.1109/ICCSE1.2018.8373995","DOIUrl":"https://doi.org/10.1109/ICCSE1.2018.8373995","url":null,"abstract":"This article introduces a new meta-heuristic algorithm, namely quasi-oppositional Jaya (QOJaya) algorithm for solving the optimal power flow (OPF) problem. In this approach, an intelligence strategy, namely quasi-oppositional based learning (QOBL) is integrated into the original Jaya algorithm to enhance its convergence rapidity and solution optimality. The suggested QOJaya algorithm to deal with single objective OPF problem is scrutinized and validated using the IEEE 30-bus test network. The obtained results reveal the supremacy of the proposed QOJaya algorithm over the basic Jaya algorithm in terms of solution quality and execution time. In addition, the results show the superiority of the proposed QOJaya algorithm over many existing heuristics optimization algorithms introduced in the literature in terms of solution feasibility and optimality.","PeriodicalId":383579,"journal":{"name":"2018 International Conference on Computing Sciences and Engineering (ICCSE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132045524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big Data Storage and Its Future","authors":"Azzah Al Ghamdi, Thomas Thomson","doi":"10.1109/ICCSE1.2018.8374206","DOIUrl":"https://doi.org/10.1109/ICCSE1.2018.8374206","url":null,"abstract":"The age of big data has emerged. These data are generated from online transactions, emails, posts, videos, search queries, etc. People also produce data by using the Internet of Things (IoT) applications and devices. Storing these massive quantities of data has become one of the most important and critical issues for big companies like Google, LinkedIn, Yahoo, and for the digital society in general. Traditional data storage methods such as Relational Database Management Systems (RDBMSs) are coming under increase pressure due to their capability limitations. However, many of new technical solutions have proved their efficiency in storing big data for large companies; some examples of these solutions include NetApp, Hadoop, SAN, the cloud, data centres, etc. The storage, accessibility, and security of big data issues are not only a computer science concern; it has become a topic of interest in many fields such as healthcare, E- commerce, and business in general. This project is investigating the data storage methods and future requirements for one of the largest oil companies in the world, Saudi SA Oil Company. A survey was carried out to understand current storage problems, and collect requirements to implement effective storage methodologies that overcome most of SA's storage difficulties.","PeriodicalId":383579,"journal":{"name":"2018 International Conference on Computing Sciences and Engineering (ICCSE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130040306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Probabilistic Image Authentication Methodbased on Universal Hash Function for Rgb Images","authors":"Fatih Ozyurt, T. Tuncer, E. Avci","doi":"10.1109/ICCSE1.2018.8373994","DOIUrl":"https://doi.org/10.1109/ICCSE1.2018.8373994","url":null,"abstract":"In this paper, a novel hash based image authentication for RGB (Red, Green, Blue) images is proposed. Firstly, universal hash function is modified according to R, G and B layers and 3 different function is obtained to watermarking generation then, watermark generation is performed by using these equations. In this method, one layer is used for watermark embedding. Modulo based data hiding method is used for watermark embedding. To provide confidentiality of the proposed method, chaotic random number generator that is logistic map is used. The embedding layer and watermark generation function are selected by using logistic map. In watermark extraction, modulo operator is used. Watermark generation step is repeated for tamper detection. The extracted watermark and generated watermark are compared with each other. If these watermarks are equal, image is authenticated, otherwise tamper detection is detected. In the proposed method, DWT (Discrete Wavelet Transform) and SVD (Singular Value Decomposition) are used for generating perceptual hash of images and recovering images. Experimental result showed that the proposed method achieved high image authentication ability with minimum distortion.","PeriodicalId":383579,"journal":{"name":"2018 International Conference on Computing Sciences and Engineering (ICCSE)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134377517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}