• OpenAccess
    • List of Articles PSO

      • Open Access Article

        1 - Optimal LO Selection in E-Learning Environment Using PSO Algorithm
        gholamali montazer
        One of the key issues in e-learning is to identify needs, educational behavior and learning speed of the learners and design a suitable curriculum commensurate to their abilities. This goal is achieved by identifying the learners’ different dimension of personality and More
        One of the key issues in e-learning is to identify needs, educational behavior and learning speed of the learners and design a suitable curriculum commensurate to their abilities. This goal is achieved by identifying the learners’ different dimension of personality and ability and assigning suitable learning material to them according these features. In this paper, an intelligent tutoring system is proposed which optimizes the LO selection in e-learning environment. In order to evaluate the proposed method, the designed system has been used in a web-based instruction system in different conditions and the results of the "Academically success", "Satisfactory learning achievement" and "Time of the learners’ attendance" have been analyzed. The obtained results show a significant efficiency compared to other applied methods. Manuscript profile
      • Open Access Article

        2 - Using a Hybrid PSO-GA Method for Capacitor Placement in Distribution Systems
        mohammadmahdi Varahram amir mohammadi
        In this paper, we have proposed a new algorithm which combines PSO and GA in such a way that the new algorithm is more effective and efficient.The particle swarm optimization (PSO) algorithm has shown rapid convergence during the initial stages of a global search but ar More
        In this paper, we have proposed a new algorithm which combines PSO and GA in such a way that the new algorithm is more effective and efficient.The particle swarm optimization (PSO) algorithm has shown rapid convergence during the initial stages of a global search but around global optimum, the search process will become very slow. On the other hand, genetic algorithm is very sensitive to the initial population. In fact, the random nature of the GA operators makes the algorithm sensitive to the initial population. This dependence to the initial population is in such a manner that the algorithm may not converge if the initial population is not well selected. This new algorithm can perform faster and does not depend on initial population and can find optimal solutions with acceptable accuracy. Optimal capacitor placement and sizing have been found using this hybrid PSO-GA algorithm. We have also found the optimal place and size of capacitors using GA and PSO separately and compared the results. Manuscript profile
      • Open Access Article

        3 - Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm
        Fereidoon Rezaei Mohamad Ali Afshar Kazemi Mohammad Ali Keramati
        Today, considering technology development, increased use of Internet in businesses, and movement of business types from physical to virtual and internet, attacks and anomalies have also changed from physical to virtual. That is, instead of thieving a store or market, th More
        Today, considering technology development, increased use of Internet in businesses, and movement of business types from physical to virtual and internet, attacks and anomalies have also changed from physical to virtual. That is, instead of thieving a store or market, the individuals intrude the websites and virtual markets through cyberattacks and disrupt them. Detection of attacks and anomalies is one of the new challenges in promoting e-commerce technologies. Detecting anomalies of a network and the process of detecting destructive activities in e-commerce can be executed by analyzing the behavior of network traffic. Data mining systems/techniques are used extensively in intrusion detection systems (IDS) in order to detect anomalies. Reducing the size/dimensions of features plays an important role in intrusion detection since detecting anomalies, which are features of network traffic with high dimensions, is a time-consuming process. Choosing suitable and accurate features influences the speed of the proposed task/work analysis, resulting in an improved speed of detection. In this article, by using data mining algorithms such as J48 and PSO, we were able to significantly improve the accuracy of detecting anomalies and attacks. Manuscript profile
      • Open Access Article

        4 - Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm
        Fereidoon Rezaei Mohamad Ali Afshar Kazemi Mohammad Ali Keramati
        Today, considering technology development, increased use of Internet in businesses, and movement of business types from physical to virtual and internet, attacks and anomalies have also changed from physical to virtual. That is, instead of thieving a store or market, th More
        Today, considering technology development, increased use of Internet in businesses, and movement of business types from physical to virtual and internet, attacks and anomalies have also changed from physical to virtual. That is, instead of thieving a store or market, the individuals intrude the websites and virtual markets through cyberattacks and disrupt them. Detection of attacks and anomalies is one of the new challenges in promoting e-commerce technologies. Detecting anomalies of a network and the process of detecting destructive activities in e-commerce can be executed by analyzing the behavior of network traffic. Data mining systems/techniques are used extensively in intrusion detection systems (IDS) in order to detect anomalies. Reducing the size/dimensions of features plays an important role in intrusion detection since detecting anomalies, which are features of network traffic with high dimensions, is a time-consuming process. Choosing suitable and accurate features influences the speed of the proposed task/work analysis, resulting in an improved speed of detection. In this article, by using data mining algorithms such as Bayesian, Multilayer Perceptron, CFS, Best First, J48 and PSO, we were able to increase the accuracy of detecting anomalies and attacks to 0.996 and the error rate to 0.004. Manuscript profile