Fire Evacuation using Ant Colony Optimization Algorithm
نویسندگان
چکیده
منابع مشابه
Ant Colony Optimization Algorithm
Hybrid algorithm is proposed to solve combinatorial optimization problem by using Ant Colony and Genetic programming algorithms. Evolutionary process of Ant Colony Optimization algorithm adapts genetic operations to enhance ant movement towards solution state. The algorithm converges to the optimal final solution, by accumulating the most effective sub-solutions.
متن کاملInformation Hiding Using Ant Colony Optimization Algorithm
This paper aims to find an effective and efficient information hiding method used for protecting secret information by embedding it in a cover media such as images. Finding the optimal set of the image pixel bits to be substituted by the secret message bits, such that the cover image is of high quality, is a complex process and there is an exponential number of feasible solutions. Two new ant-b...
متن کاملMulti-Objective Optimization for Massive Pedestrian Evacuation Using Ant Colony Algorithm
Evacuation route planning is one of the most crucial tasks for solving massive evacuation problem. In large public places, pedestrians should be transferred to safe areas when nature or man-made accidents happen. A multi-objective ant colony algorithm for massive pedestrian evacuation is presented in this paper. In the algorithm, three objectives, total evacuation time of all evacuees, total ro...
متن کاملEvolutionary Algorithm Ant Colony Optimization
I Which size? Trade-off I Minimum size: connectivity by recombination is achieved if at least one instance of every allele is guaranteed to be be present at each locus. Ex: if binary: P∗ 2 = (1− (0.5) ) for l = 50, it is sufficient M = 17 to guarantee P∗ 2 > 99.9%. I Often: independent, uninformed random picking from given search space. I Attempt to cover at best the search space, eg, Latin hyp...
متن کاملAn Ant Colony Optimization Algorithm for Network Vulnerability Analysis
Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2016
ISSN: 0975-8887
DOI: 10.5120/ijca2016909239