Design of Warship Simulation Using Variable-Chromosome Genetic Algorithm
نویسندگان
چکیده
منابع مشابه
Variable Chromosome Length Genetic Algorithm for Structural Topology Design Optimization
This article introduces the concept of variable chromosome lengths in the context of an adaptive genetic algorithm (GA). This concept is applied to structural topology optimization with large numbers of design variables. In traditional genetic algorithms, the chromosome length is determined when the phenotype is encoded into a genotype. Subsequently, the chromosome length does not change. This ...
متن کاملAerodynamic Optimal Design of Wind Turbine Blades using Genetic Algorithm
Wind power has been widely considered and utilized in recent years as one of the most promising renewable energy sources. In the current research study, aerodynamic analysis of the upwind three-bladed horizontal axis turbine is carried out using blade element momentum theory (BEM), and a genetic algorithm (GA) is applied as an optimization method. Output power generation is considered as an obj...
متن کاملAerodynamic optimal design of wind turbine blades using genetic algorithm
Wind power has been widely considered and utilized in recent years as one of the most promising renewable energy sources. In the current research study, aerodynamic analysis of the upwind three-bladed horizontal axis turbine is carried out using blade element momentum theory (BEM), and a genetic algorithm (GA) is applied as an optimization method. Output power generation is considered as an...
متن کاملNovel Algorithm for Hand Gesture Modeling Using Genetic Algorithm with Variable Length Chromosome
Many languages the people can exploit for them in order to communicate among them and get the message delivered, but, these languages should be known by those people in order to understand and speak, contrarily, gesture system is the common language that can be adopted for this objective and need less knowledge as compared with spoken languages that need the grammatically and semantically rules...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied Sciences
سال: 2019
ISSN: 2076-3417
DOI: 10.3390/app9194131