Design of Warship Simulation Using Variable-Chromosome Genetic Algorithm

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Variable Chromosome Length Genetic Algorithm for Structural Topology Design Optimization

This article introduces the concept of variable chromosome lengths in the context of an adaptive genetic algorithm (GA). This concept is applied to structural topology optimization with large numbers of design variables. In traditional genetic algorithms, the chromosome length is determined when the phenotype is encoded into a genotype. Subsequently, the chromosome length does not change. This ...

متن کامل

Aerodynamic Optimal Design of Wind Turbine Blades using Genetic Algorithm

Wind power has been widely considered and utilized in recent years as one of the most promising renewable energy sources. In the current research study, aerodynamic analysis of the upwind three-bladed horizontal axis turbine is carried out using blade element momentum theory (BEM), and a genetic algorithm (GA) is applied as an optimization method. Output power generation is considered as an obj...

متن کامل

Aerodynamic optimal design of wind turbine blades using genetic algorithm

Wind power has been widely considered and utilized in recent years as one of the most promising renewable energy sources. In the current research study, aerodynamic analysis of the upwind three-bladed horizontal axis turbine is carried out using blade element momentum theory (BEM), and a genetic algorithm (GA) is applied as an optimization method. Output power generation is considered as an...

متن کامل

Novel Algorithm for Hand Gesture Modeling Using Genetic Algorithm with Variable Length Chromosome

Many languages the people can exploit for them in order to communicate among them and get the message delivered, but, these languages should be known by those people in order to understand and speak, contrarily, gesture system is the common language that can be adopted for this objective and need less knowledge as compared with spoken languages that need the grammatically and semantically rules...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied Sciences

سال: 2019

ISSN: 2076-3417

DOI: 10.3390/app9194131