Design of holographic structures using genetic algorithms

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Economic Design of T2 −V SSC Chart Using Genetic Algorithms

The principal function of a control chart is to help management distinguish different sources of variation in a process. Control charts are widely used as a graphical tool to monitor a process in order to improve the quality of the product. Chen and Hsieh (2007) have designed a T2 control chart using a Variable Sampling Size and Control limits (V SSC) scheme. They have shown that using the V SSC...

متن کامل

Design of Truss-Structures for Minimum Weight using Genetic Algorithms

Optimization of truss-structures for finding optimal cross-sectional size, topology, and configuration of 2-D and 3-D trusses to achieve minimum weight is carried out using real-coded genetic algorithms (GAs). All the above three optimization techniques have been made possible by using a novel representation scheme. Although the proposed GA uses a fixed-length vector of design variables represe...

متن کامل

Preliminary Design of Concrete Structures Using Genetic Algorithms and Spreadsheets

This paper presents the application of the genetic algorithm to the design of some common concrete structures in Hong Kong, namely, tall reinforced concrete building frameworks, long-span concrete portal frames and prestressed concrete beams or bridges using spreadsheet. Cross-sectional dimensions of member groups are treated as discrete design variables and the method aims to minimize the weig...

متن کامل

Design using Genetic Algorithms -- Some Results for Composite Material Structures

This paper reviews an approach to design using Genetic Algorithms as applied to the domain of composite material structures. We first discuss the concept of a Genetic Algorithm (GA) and the role it can play in design, namely as an evolutionary search optimizer based on simulation results. We then discuss the composite structure design problem and how GA’s can be used for design in this domain. ...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Optics Express

سال: 2006

ISSN: 1094-4087

DOI: 10.1364/oe.14.009909