CFP last date
20 January 2025
Reseach Article

Simple League Championship Algorithm

by M. James Stephen, Prasad Reddy P. V. G. D
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 75 - Number 6
Year of Publication: 2013
Authors: M. James Stephen, Prasad Reddy P. V. G. D
10.5120/13117-0466

M. James Stephen, Prasad Reddy P. V. G. D . Simple League Championship Algorithm. International Journal of Computer Applications. 75, 6 ( August 2013), 28-32. DOI=10.5120/13117-0466

@article{ 10.5120/13117-0466,
author = { M. James Stephen, Prasad Reddy P. V. G. D },
title = { Simple League Championship Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 75 },
number = { 6 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 28-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume75/number6/13117-0466/ },
doi = { 10.5120/13117-0466 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:43:34.269940+05:30
%A M. James Stephen
%A Prasad Reddy P. V. G. D
%T Simple League Championship Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 75
%N 6
%P 28-32
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

There is a lot of discussion in the literature on the advantages of one soft computing technique over the other. Number of new meta heuristic algorithms are made available for solving different optimization problems. But always there is some ambiguity in deciding which technique is better than the other to solve a specific optimization problem in a particular context. A new methodology has been proposed in this paper which provides some theoretical frame work to use multiple optimization techniques at the same time onto a single optimization problem. This new approach has been implemented to solve image enhancement problem in a fingerprint. First the methodology of this new approach has been described then the application of the proposed methodology is presented with some experimental results.

References
  1. Watson, G. I. , Garris, M. D. , et al. (2004). User's guide to NIST fingerprint image software 2 (NFIS2) / (NBIS) National Institute of Standards and Technology.
  2. Ali Husseinzadeh Kashan, An efficient algorithm for constrained global optimization and application to mechanical engineering design: League championship algorithm (LCA), Computer-Aided Design 43 (2011) 1769–1792.
  3. J. Galbally, J. Fierrez, F. Alonso-Fernandez and M. Martinez-Diaz, "Evaluation of Direct Attacks to Fingerprint Verification Systems",Telecommunication Systems, Special Issue on Biometrics, Vol. 47, n. 3, pp. 243-254, January 2011.
  4. Yang XS (2008) Nature-inspired Metaheuristic Algorithms. Luniver Press.
  5. Blum C and Roli A (2003) Metaheuristics in combinatorial optimization: Overview and conceptural comparison. ACM Comput. Surv. , 35:268-308.
  6. Dorigo M and Blum C (2005) Ant colony optimization theory: A survey. Theor. Comput. Sci. , 344:243-278.
  7. Wolpert DH and Macready WG (1997). No free lunch theorems for optimization. IEEE Transaction on Evolutionary Computation, 1:67-82.
  8. Yang XS (2008) Mathematical Optimization: From Linear Programming to Metaheuristics, Cambridge Int. Science Publishing, UK.
  9. James M Stephen, Prasad Reddy PVGD, Article: Fingerprint Image Enhancement through Particle Swarm Optimization. International Journal of Computer Applications 66(21):34-40, March 2013.
  10. D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman and A. K. Jain, "FVC2002: Second Fingerprint Verification Competition", in proceedings 16th International Conference on Pattern Recognition, Québec City, vol. 3, pp. 811-814, 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Multi optimization technique Transformation function Fingerprint image enhancement objective criterion