Multi-Swarm Optimizer Applied in Water Distribution Networks

Total Page:16

File Type:pdf, Size:1020Kb

Multi-Swarm Optimizer Applied in Water Distribution Networks Desalination and Water Treatment 161 (2019) 1–13 www.deswater.com September doi: 10.5004/dwt.2019.24146 Multi-swarm optimizer applied in water distribution networks Douglas F. Surcoa,b,*, Diogo H. Macowskia,b, João G. L. Coralc, Flávia A.R. Cardosoa, Thelma P.B. Vecchia, Mauro A.S.S. Ravagnanib aDepartment of Civil Engineering, Federal University of Technology, Via Rosalina Maria dos Santos, 1233 CEP 87301-899 Campo Mourão, Paraná, Brazil, emails: [email protected] (D.F. Surco), [email protected] (D.H. Macowski), [email protected] (F.A.R. Cardoso), [email protected] (T.P.B. Vecchi) bDepartment of Chemical Engineering, State University of Maringá, Av. Colombo, 5790 CEP 87020-900 Maringá, Paraná, Brazil, email: [email protected] cOperational Development, Umuarama Regional Unit, Companhia de Saneamento do Paraná, Sanepar, Av. Presidente Castelo Branco, 3525 CEP 87501-050 Umuarama, Paraná, Brazil, email: [email protected] Received 16 September 2018; Accepted 20 March 2019 abstract In the present work, a new approach is presented for the optimization of multi-modal nonlinear programming problems with constraints or a nondifferentiable objective function. The model is applied in the optimization of water distribution networks (WDN). An algorithm is proposed to solve the problem, based on multi-swarm optimization (MSO) with multiple swarms that work corpo- rately – a master swarm and several slave swarms – named multi-swarm corporative particle-swarm optimizer (MSC-PSO). There are discrete and continuous decision variables and the problem can be treated as a mixed discrete nonlinear programming (MDNLP) one. The combinations of the algo- rithm search parameters are obtained in a simple manner, allowing viable and promising solutions. A benchmark problem from the literature is studied, in which the installation costs of a WDN are to be minimized with a computational time of 50 s. The implementation of the algorithm is proven to be efficient, with reduction in pipe installation cost up to 1.08% when compared with results from the literature. The algorithm is also implemented in a primary network, installed in the town of Esperança Nova, Paraná, Brazil, with reduction of 4.28% in the total cost when compared to the current WDN in operation. The computational time for this case was 69 s. Keywords: Multi-swarm optimization algorithms; Particle-swarm optimization; Water distribution network; Optimization; MDNLP 1. Introduction demand nodes, as well as the minimum and maximum velocities in the pipes, must be considered. The optimization of a water distribution network (WDN) In the 1970s, several researchers [1–3], among others, is a multimodal nonlinear programming problem with studied WDN optimization using deterministic methods a nondifferentiable objective function and with real and such for solving linear programming (LP), nonlinear pro- discrete decision variables. The analytical solution to the gramming (NLP), and dynamic programming (DP) problems optimization problem is highly complex, requiring simul- formulations, with adaptations used in order to work around taneous analysis of the mass conservation equation in constraints or differentiability and continuity problems of the each node and of the energy conservation equation in each objective functions. In the case of the deterministic methods, network loop. Furthermore, the minimum pressures in the the solution is strongly dependent on the initial proposition. * Corresponding author. 1944-3994/1944-3986 © 2019 Desalination Publications. All rights reserved. 2 D.F. Surco et al. / Desalination and Water Treatment 161 (2019) 1–13 In the last four decades, however, heuristic methods have Multi-Swarm Optimization is an extension of the PSO been used due to their efficiency in dealing with the afore- algorithm. Interacting with several swarms, it is adequate for mentioned problems. Nevertheless, the use of hydraulic multimodal problem optimization. Chen et al. [22] presented simulators allows complex mathematical treatments to be a model inspired by mutualism, which is the occurrence avoided. of information exchange between the particles of a certain One of the most successful heuristic methods in the swarm as well as between particles from a swarm and the SI (swarm intelligence) group is PSO (particle swarm best ones from other swarms. The authors used 17 mathe- optimization). First introduced by Kennedy and Eberhart matical benchmark functions to prove the efficiency of the [4], the method is based on patterns found in the individual model. and social behaviors of certain natural species that require In the present work, a new approach is presented for communication between individuals for the survival of the the optimization of nonlinear programming problems of a group. This behavior is observed in several animal species, multi-modal nature, with constraints or a nondifferentiable some examples being schools of fish, flights of birds, and objective function, where variables are mixed (discrete and swarms of bees. Each particle (bird, bee, fish) represents a continuous numbers). The model is then used to optimize potential solution to the system, mathematically represented WDN at small and large scales. An algorithm based on MSO by a vector, xi, whose N components are the decision vari- is proposed in order to solve the problem. A new model is ables of the problem. At a certain instant, when the particle proposed, named Multi-Swarm Corporative Particle Swarm reaches its best position (best evaluation of the objective func- Optimizer (MSC-PSO). An initialization strategy for the par- tion), its coordinates are named Personal Best (Pbest) and are ticles is also employed for better distribution throughout the represented by vector pi. The best position reached by any search space, increasing the particles search of exploration. particle in the group is named Global Best (Gbest) and is Results obtained for a case study from the literature shown represented by vector g. The future location of particle i in the applicability of the proposed approach in finding better the search space will be directed by these vectors pi and g. optima when compared to previous evolutive algorithms. The particles of the PSO algorithm move towards a global or local optimum. When the leader particle (Gbest) stops 2. PSO algorithm at a local optimum, the group converges prematurely. This causes the search for the global optimum solution to be chal- The coordinates of particle i are represented by the lenging, especially in highly nonlinear multimodal problems. components of vector xi = (xi,1,…,xi,j,…,xi,N) in N-dimensional According to Xu et al. [5], PSO convergence is quicker space. When component xi,j is a real number (continuous), L U than other evolutionary algorithms [6], such as genetic it is limited by xj (lower limit) and xj (upper limit), that is, L U algorithms (GA), developed by Holland [7] inspired by the xi,j ∈ [xj ,xj ]. When xi,j is a discrete number, it belongs to SET theory of evolution; ant colony optimizations (ACO), devel- the set xj = {xj1, xj2,…,xjND}, which has ND elements. oped by Dorigo [8], based on ant foraging; simulated anneal- According to Kennedy and Eberhart [4], the new position ing (SA), developed by Kirkpatrick et al. [9], based on metal of particle i at (t + 1) is represented by Eq. (1): annealing; shuffled complex evolution (SCE), developed by Duan et al. [10]; harmony search (HS), the algorithm that xtij,,()+ 11= xtij()++vtij, () (1) mimics the musical harmony phenomenon, created by Geem et al. [11] inspired by the improvisation process of musicians; where vi,j(t + 1) is the velocity of component j of particle i, memetic algorithms (MA), developed by Dawkins, [12], given by Eq. (2): inspired in GA with na individual learning procedure able to refine local search and the shuffled frog leaping algorithm vt()+ 1 = vt()+−cr px()tc+−rg xt() (2) (SFLA), developed by Eusuff and Lansey [13] was inspired ij,,ij 11()ij,,ij 22()ji,j in MA and PSO in global optima search. where c and c are, respectively, the cognitive and social Being one of the most used optimization heuristic methods, 1 2 acceleration coefficients and r and r are uniformly particle swarm optimization (PSO) was used Trigueros et al. 1 2 distributed random numbers in the interval (0,1). The use of [14] and Ravagnani et al. [15] for the optimization of reuse Eq. (2) requires prior knowledge of the values of variables water networks. Several studies presented solutions to the p (component j of vector Pbest) and g (component j of WDN optimization problem using PSO, such as [16] and [17]. i,j j vector Gbest). The velocity of the particles is limited, that is, Surco et al. [18] presented a modified PSO algorithm, poten- v ∈ [v ,v ], where v and v are the predetermined lower tializing the particles for better exploration of the search i,j L U L U and upper limits. space and described the influence of the parameters in the Kennedy and Eberhart [23] implemented the PSO algorithm optimization process. for discrete binary variables by introducing Eq. (3): Considering other evolutive algorithms applied on WDN optimization, Zheng et al. [19] used ACO with parameters < adaptive strategies in searching better results. Reca et al. [20] 1 if rand() Sv()ij, developed a GA jointly with search space reduction meth- xij, = (3) 0 if rand ≥ Sv ods by limiting pipe diameters. El-Ghandour and Elbeltagi () ()ij, [21], used five evolutionary algorithms (GA, PSO, ACO, MA and SFLA) to solve the WDN optimization and concluded where S(vi,j) is a sigmoid limiting transformation represented that PSO has the best performance in achieving the better by Eq. (4) and rand( ) is a uniformly distributed random results. number in the interval (0,1). D.F. Surco et al. / Desalination and Water Treatment 161 (2019) 1–13 3 1 SM = 0 GbestG< best Sv()ij, v (4) 1+ e ij, Φ=05.
Recommended publications
  • Download Here
    Seminar Nasional Sistem Informasi Indonesia, 1 Nopember 2016 SECURE REAL TIME PROTOCOL: SOLUSI ALTERNATIF PENGAMANAN CHATTING 1) Donny Seftyanto 1Sekolah Teknik Elektro dan Informatika, Institut Teknologi Bandung Jatinangor, Sumedang, 45363 Telp : (022) 7798600, Fax: (022) 7798617 1) E-mail : [email protected] Abstrak Off The Record (OTR) merupakan protokol kriptografi yang digunakan untuk menjamin keamanan chatting pada banyak aplikasi, seperti Xabber. Tetapi terdapat kelemahan pada protokol ini, yaitu kegagalan otentikasi, penipuan, dan penyangkalan. Untuk memberikan solusi alternatif dalam pengamanan chatting, maka dirancang protokol bernama Secure Real Time (SRT). SRT terdiri dari tiga tahap, yaitu Trusted Public Key Distribution, Key Exchange with Digital Signature, dan Signed and Encrypted Message Transmission with Key Derivation Function. Tahapan tersebut diterapkan dengan algoritma ECDSA-384, ECDH-384, AES-256, dan SHA-384 pada aplikasi Xabber, sehingga memberikan kekuatan keamanan algoritma yang lebih tinggi dari OTR. Lalu berdasarkan hasil evaluasi yang meliputi uji keamanan komunikasi dan pembandingan performa aplikasi Xabber, diketahui bahwa protokol SRT dapat menjamin kerahasiaan, keutuhan, keotentikan, nir-penyangkalan, dan tahan replay attack terhadap data penting di ketiga tahap SRT. Sedangkan tingkat kecepatan dan kemudahan aplikasi Xabber dengan SRT relatif lebih tinggi dari aplikasi Xabber dengan OTR. Kata kunci: chatting, kriptografi, OTR, SRT. Abstract Off The Record (OTR) is cryptographic protocol that is used to ensure the chatting safety in many applications, like Xabber. But there are weaknesses in this protocol, namely authentication failure, fraud, and repudiation. To provide alternative solution in securing chatting, then designed a protocol called Secure Real Time (SRT). SRT consists of three stages, namely The Trusted Public Key Distribution, Key Exchange with Digital Signature, and Signed and Encrypted Message Transmission with Key Derivation Function.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Versacool-Manual-Multilingual.Pdf
    User Manual User VersaCool Refrigerated Bath Circulator Manual Part Number U01265, April 4, 2016 Multilingual Setup Wizards Multilingual Essential Safety Instructions Installation Operation Preventive Maintenance Troubleshooting Table of Contents Preface ........................................................................................................................................... P-1 Compliance ......................................................................................................................... P-1 Unpacking ........................................................................................................................... P-2 After-Sale Support ............................................................................................................... P-2 Sample Nameplate ............................................................................................................... P-2 Feedback............................................................................................................................. P-3 Chapter 1 Safety ................................................................................................................................ 1-1 Safety Factors ...................................................................................................................... 1-1 Personal Protective Equipment.............................................................................................. 1-3 Training ..............................................................................................................................
    [Show full text]
  • On Using the Two-Level Model As the Basis of Morphological Analysis and Synthesis of Estonian
    On Using the Two-level Model as the Basis of Morphological Analysis and Synthesis of Estonian Heli Uibo Institute of Computer Science, University of Tartu, Estonia heli [email protected] The paper deals with the problems of describing the Estonian morphological system in the two-level formalism, developed by Kimmo Koskenniemi, The outlines of Estonian morphology are drawn. The basics of the two-level model are given and illustrated with real examples from the experimental Estonian two-level morphology (EETwoLM) composed by the author. A detailed example of step-by-step morphological synthesis is given referring to all the relevant lexicons and rules. The compilation and testing processes using the XEROX finite-state software tools are described. Examples of morphological analysis and synthesis are demonstrated. The present stage of the system is characterised and the future perspectives are drawn. Finally, the suitability of the two-level model for the description of Estonian morphology is discussed. 1. Introduction The module of morphological analysis and/or synthesis is unavoidable in any language engineering tool for Estonian because of its rich morphology. For example, in information retrieval systems, it is usually desirable to make queries using semantic entities, not using special morphological forms of a word. As the word stem often has several shapes in Estonian, the morphological component should belong to any information retrieval system. Example 1. To make a query for all occurrences of the word “rida” (“row”), without a morphological synthesiser, three different queries are needed (we assume the possibility to add star (*) to the end of the stem instead of inflectional suffices): Proceedings of NODALIDA 1999, pages 228-242 229 rida* Cstem in strong grade) rea* Cstein in weak grade) ritta (singular additive (“to the row”), quite often used with this word) The development of EETwoLM is not the first attempt to computerise the morphological analysis and synthesis of Estonian.
    [Show full text]
  • A Historical-Comparative Study of the Tani (Mirish) Branch in Tibeto-Burman
    A Historical-Comparative Study of the Tani (Mirish) Branch in Tibeto-Burman t y Tianshin Jackson Sun B.A. (National Taiwan Normal University) 1979 MA. (National Taiwan Normal University) 1982 M A. (University of California at Berkeley) 1990 A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Linguistics in the GRADUATE DIVISION of the UNIVERSITY of CALIFORNIA a t BERKELEY Committee in charge: Professor James A Matisoff, Chair Professor Ting Pang-hsin Professor Gary Holland 1993 Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. The dissertation of Tianshin Jackson Sun is approved: >/, ///3 Chair I I Date J ZlaM j ff. tkU os*o t _____________ AftAxk 7.*), /99J Date Date University of California at Berkeley 1993 Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. Table of Contents M aps .......................................................................................................................vii Acknowledgements ...............................................................................................x Chapter I. Introduction ................................................................................ 1 1.0. Preliminaries ............................................................................................1 1.0.1. Objectives and Limitations ......................................................1 1.0.2. Why a New Name? ....................................................................
    [Show full text]
  • Open Source Software for Integrated Library Systems Relative Appropriateness in the Indian Context
    OPEN SOURCE SOFTWARE FOR INTEGRATED LIBRARY SYSTEMS RELATIVE APPROPRIATENESS IN THE INDIAN CONTEXT Thesis Submitted to the Mahatma Gandhi University for the award of the degree of DOCTOR OF PHILOSOPHY in Library and Information Science by Mr. GIREESH KUMAR. T. K. Research Guide Dr. R. RAMAN NAIR Centre for Advanced Research in Library and Information Science (CARLIS) SCHOOL OF SOCIAL SCIENCES Mahatma Gandhi University, Kottayam, Kerala September 2016 ‘In India Open Source Software will have to come and stay in a big way for the benefit of our billions of people’ -Dr. A.P.J. Abdul Kalam ACKNOWLEDGEMENT I received immense support and inspiration from numerous sources I had approached in connection with my research work which I record here with a deep feeling of gratitude. I remember with deep gratitude my research supervisor Dr. R. Raman Nair, Centre for Advanced Research in Library and Information Science (CARLIS), Mahatma Gandhi University, Kottayam, Kerala whose valuable guidance and advice, inspiration, immense patience, constructive criticism and constant support at every stage helped me do this work to the best of my abilities. I am very thankful to eminent professors like Prof. Marshal Breeding; Prof. B. Ramesha, Bangalore University; Dr. Badan Barman, KKOUS University and other professional friends from India and abroad for extending their valuable suggestions, advice and positive criticism on building a precise online questionnaire covering all aspects of the objectives of the study. I extend my sincere thanks to Centre for Advanced Research in Library and Information Science (CARLIS) and School of Social Science, Mahatma Gandhi University, Kottayam, Kerala for accommodating me to pursue my research work, National Science Library and other library professionals in the country and abroad for sharing their valuable resources related to the study.
    [Show full text]
  • Achieving Energy Saving Through Proxying Applications on Behalf Of
    Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 83 ( 2016 ) 187 – 194 The 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016) Achieving Energy Saving through Proxying Applications on behalf of Idle Devices Rafiullah Khana,∗, Sarmad Ullah Khanb aQueen’s University Belfast, Belfast, United Kingdom, Email:rafi[email protected] bCECOS University of IT and Emerging Sciences, Peshawar, Pakistan, Email: [email protected] Abstract Several studies in the past have revealed that network end user devices are left powered up 24/7 even when idle just for the sake of maintaining Internet connectivity. Network devices normally support low power states but are kept inactive due to their inability to maintain network connectivity. The Network Connectivity Proxy (NCP) has recently been proposed as an effective mechanism to impersonate network connectivity on behalf of high power devices and enable them to sleep when idle without losing network presence. The NCP can efficiently proxy basic networking protocol, however, proxying of Internet based applications have no absolute solution due to dynamic and non-predictable nature of the packets they are sending and receiving periodically. This paper proposes an approach for proxying Internet based applications and presents the basic software architectures and capabilities. Further, this paper also practically evaluates the proposed framework and analyzes expected energy savings achievable under- different realistic conditions. ©c 20162016 TheRafiullah Authors. Khan Publishedet al. by Published Elsevier byB.V. Elsevier This is an B.V. open access article under the CC BY-NC-ND license (Peer-reviehttp://creativecommons.org/licenses/by-nc-nd/4.0/w under responsibility of the Conference).
    [Show full text]
  • Comparative Linguistics in Southeast Asia
    Comparative linguistics in Southeast Asia Peiros, I. Comparative Linguistics in Southeast Asia. C-142, x + 329 pages. Pacific Linguistics, The Australian National University, 1998. DOI:10.15144/PL-C142.cover ©1998 Pacific Linguistics and/or the author(s). Online edition licensed 2015 CC BY-SA 4.0, with permission of PL. A sealang.net/CRCL initiative. PACIFIC LINGUISTICS FOUNDING EDITOR: Stephen A. Wurm EDITORIAL BOARD: Malcolm D. Ross and Darrell T. Tryon (Managing Editors), Thomas E. Dutton, Andrew K. Pawley Pacific Linguistics is a publisher specialising in linguistic descriptions, dictionaries, atlases and other material on languages of the Pacific, the Philippines, Indonesia and southeast Asia. The authors and editors of Pacific Linguistics publications are drawn from a wide range of institutions around the world. Pacific Linguistics is associated with the Research School of Pacific and Asian Studies at the Australian National University. Pacific Linguistics was established in 1963 through an initial grant from the Hunter Douglas Fund. It is a non-profit-making body financed largely from the sales of its books to libraries and individuals throughout the world, with some assistance from the School. The Editorial Board of Pacific Linguistics is made up of the academic staff of the School's Department of Linguistics. The Board also appoints a body of editorial advisors drawn from the international community of linguists. Publications in Series A, B and C and textbooks in Series D are refereed by scholars with relevant expertise who are normally not members of the editorial board. To date Pacific Linguistics has published over 400 volumes in four series: • Series A: Occasional Papers; collections of shorter papers, usually on a single topic or area.
    [Show full text]
  • Official Copy
    OFFICIAL COPY Piedmont r^ii Natural Gas September 21y 2018 FILE Ms. Martha Lynn Jarvis Chief Clerk SEP 2 8 2018 North Carolina Utilities Commission 430 North Salisbury Street, Dobbs Building Clerk's Office Raleigh, NC 27603-5918 N.C. Utilities Commission Re: Docket No. G-9, Sub 727 Dear Ms. Jarvis: I am enclosing for filing proof of publication for the required newspaper notice in the above referenced docket. Sincerely, Laura Hager ^ Senior Regulatory Analyst Enclosures P.O. Box 33068 • Charlotte, North Carolina 28233 piedmontng.com MEDIA Piedmont POWER Natural Gas ADVERTISING r^i Ran Week of Ran Week of Newspapers 8/20 8/27 Anson County Record 8/22/18 8/29/18 Bladen Journal 8/21/18 8/28/18 Daily Advance 8/22/18 8/29/18 g^p 2 8 Chowan Herald -Edenton 8/22/18 8/29/18 Fayetteville Observer-Times 8/22/18 8/29/18 C\erk's Office Goldsboro News Arqus 8/22/18 8/29/18 N.C.Utl«tles commission Greenville Daily Reflector 8/22/18 8/29/18 Jacksonville Dally News 8/22/18 8/29/18 Kinston Free Press 8/22/18 8/29/18 Laurinburq Exchange 8/22/18 8/29/18 Monroe Enquirer Journal 8/22/18 8/29/18 Nashville Graphic 8/23/18 8/30/18 New Bem Sun-Joumal 8/22/18 8/29/18 Perquimans Weekly 8/22/18 8/29/18 Richmond Cty Dly JrnI 8/22/18 8/29/18 Roanoke-Chowan News-Herald 8/21/18 8/28/18 Robesonian, Lumberton 8/22/18 8/29/18 Sampson Independent 8/22/18 8/29/18 Raleigh News and Observer South Zone 8/22/18 8/29/18 Standard Laconic 8/22/18 8/29/18 Stanly News & Press 8/21/18 8/28/18 State Port Pilot 8/22/18 8/29/18 Washington Daily News 8/22/18 8/29/18 Wilmington Star 8/22/18 8/29/18 Wilson Daily Times 8/22/18 .
    [Show full text]
  • Multi Protocol Cross Platform Communication Middleware
    International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 5, May - 2014 Multi Protocol Cross Platform Communication Middleware Dhruv Sangvikar Vikas Tekale Department of Computer Engineering Department of Computer Engineering AISSMS's Insitute of Information Technology AISSMS's Insitute of Information Technology Pune, Maharashtra, India Pune, Maharashtra, India Abstract— With the introduction of multiple communication 5. In large scale environments, when installation on platforms available, the internet messaging user community is multiple devices is necessary, the whole process of setting up fragmented into users of different platforms and services. Each becomes time consuming and redundant. service provider has it's own protocol and client implementation. Thus a standard client for instant messaging is lacking. There is 6. Functionality provided by one platform may be absent in a need to standardize communication platforms so that the the other client. These results in user confusion. fragmentation can be reduced and ultimately reducing the data 7. Completely different interface on the smart phone and and storage redundancy. XMPP is an open technology for real- tablet devices also leads to the same problems stated above. time communication[1]. At present the user has to rely on completely different clients, platforms and technologies. This 8. On resource restricted machines, multiple clients cannot leads to extra usage of computing resources like storage and be run (systems like thin clients, etc). processing. In short, heterogeneous systems for the same task are present. A common solution to this is a Message Oriented 9. With more and more services, and each having separate Middleware (MOM).
    [Show full text]
  • Mokilese-English Dictionary Sheldon P
    (Continued from inside front cover) Mokilese-English Dictionary Sheldon P. Harrison and Salich Albert 192 pages, 1977, ISBN 0–8248–0512–7 $5.50 Mokilese Reference Grammar Sheldon P. Harrison 400 pages, 1976, ISBN 0–8248–0412–0 $14.50 Palauan-English Dictionary Edwin G. McManus, Lewis S. Josephs, and Masa-aki Emesiochel 512 pages, 1976, ISBN 0–8248–0450–3 $11.00 Palauan Reference Grammar Lewis S. Josephs 574 pages, 1975, ISBN 0–8248–0331–0 $9.00 Woleaian-English Dictionary Ho-min Sohn and Anthony F. Tawerilmang 384 pages, 1976, ISBN 0–8248–0415–5 $8.50 Woleaian Reference Grammar Ho-min Sohn 328 pages, 1975, ISBN 0–8248–0356–6 $11.00 Yapese Reference Grammar John Thayer Jensen 512 pages, 1977, ISBN 0–8248–0476–7 price not set Other volumes in preparation. Available at your bookseller, or from: THE UNIVERSITY PRESS OF HAWAII 2840 Kolowalu Street Honolulu, Hawaii 96822 Payment must be enclosed with order. Please add $.30 postage and handling for orders under $5.00. ISBN 0–8248–0512–7 $5.50 The MOKILESE-ENGLISH DICTIONARY contains approx- imately 5,000 Mokilese entries with English glosses, gram- matical information, and illustrative sentences for selected en- tries. This is the first formal compilation of words in Mokilese to be published. All data given in the dictionary are from native speakers of Mokilese who were living in Honolulu or on Mokil Atoll during the period when the research was being conducted. Created to fill the need for a dictionary in programs of bilingual education in the schools Mokilese children attend, this work will also be of use to anthropologists and linguists special- izing in the Pacific.
    [Show full text]
  • Vlk/Kj.K EXTRAORDINARY Hkkx I—[K.M 1 PART I—Section 1 Izkf/Dkj Ls Izdkf'kr PUBLISHED by AUTHORITY ¢¢¢
    jftLVªh laö Mhö ,yö&33004@99 REGD. NO. D. L.-33004/99 vlk/kj.k EXTRAORDINARY Hkkx I—[k.M 1 PART I—Section 1 izkf/dkj ls izdkf'kr PUBLISHED BY AUTHORITY â¢â¢â¢... 152] ubZ fnYyh] c`gLifrokj] twu 19] 2014@T;s"B 29] 1936 No. 152] NEW DELHI, THURSDAY, JUNE 19, 2014/JYAISTHA 29, 1936 dk£ed] yksd f'kdk;r rFkk isa'ku ea=kky; (13) Hkkjrh; jsyos ys[kk lsok] xzqi ¶d¸ (dk£ed vkSj izf'k{k.k foHkkx) (14) Hkkjrh; jsyos dk£ed lsok] xzqi ¶d¸ vf/lwpuk (15) jsyos lqj{kk cy esa xzqi ¶d¸ ds lgk;d lqj{kk vk;qDr ubZ fnYyh] 31 ebZ] 2014 ds in fu;e (16) Hkkjrh; j{kk lEink lsok] xzqi ¶d¸ iQk- la- 13018@01@2014—v-Hkk-ls- (I)-—fuEufyf[kr (17) Hkkjrh; lwpuk lsok] xzqi ¶d¸ (dfu"B xzsM) lsokvksa@inksa esa fjfDr;ksa dks Hkjus ds fy, 2014 esa la?k yksd lsok (18) Hkkjrh; O;kikj lsok] xqzi ¶d¸ (xzsM&III) vk;ksx }kjk yh tkus okyh izfr;ksfxrk ijh{kk flfoy lsok ijh{kk ds (19) Hkkjrh; dkWiksZjsV fof/ lsok] xzqi ¶d¸ fu;e lacaf/r ea=kky;ksa vkSj Hkkjrh; ys[kk ijh{kk vkSj ys[kk lsok (20) l'kL=k lsuk eq[;ky; flfoy lsok] xzqi ¶[k¸ (vuqHkkx ds laca/ esa Hkkjr ds fu;a=kd vkSj egkys[kk ijh{kd dh lgefr ls vf/dkjh xzsM) vke tkudkjh ds fy, izdkf'kr fd, tkrs gSa % (21) fnYyh] vaMeku ,oa fudksckj }hi lewg] y{k}hi] neu (1) Hkkjrh; iz'kklfud lsok o nho ,oa nknjk o uxj gosyh flfoy lsok] xzqi ¶[k¸ (2) Hkkjrh; fons'k lsok (22) fnYyh] vaMeku ,oa fudksckj }hi lewg] y{k}hi] neu (3) Hkkjrh; iqfyl lsok o nho ,oa nknjk o uxj gosyh iqfyl lsok] xzqi ¶[k¸ (4) Hkkjrh; Mkd rkj ys[kk vkSj foÙk lsok] xzqi ¶d¸ (23) ikafMpsjh flfoy lsok] xzqi ¶[k¸ (5) Hkkjrh; ys[kk ijh{kk vkSj ys[kk lsok] xzqi ¶d¸ 1- ;g ijh{kk
    [Show full text]