منابع مشابه
Slope Stability Analysis Using a Self-Adaptive Genetic Algorithm
This paper introduces a methodology for soil slope stability analysis based on optimization, limit equilibrium principles and method of slices. In this study, the slope stability analysis problem is transformed into a constrained nonlinear optimization problem. To solve that, a Self-Adaptive Genetic Algorithm (GA) is utilized. In this study, the slope stability safety factors are the objective ...
متن کاملPlant Variety Protection: A Consideration of Genetic Relationships
Increased interest and debate over ownership of intellectual property (e.g., plant proprietary rights) has arisen in agriculture because the protection of research products is necessary to provide incentive for investment. Any unique, documentable invention (a product, service, or process) having potential use in commerce can be considered intellectual property. Intellectual property is any rec...
متن کاملA comparative analysis of synthetic genetic oscillators.
Synthetic biology is a rapidly expanding discipline at the interface between engineering and biology. Much research in this area has focused on gene regulatory networks that function as biological switches and oscillators. Here we review the state of the art in the design and construction of oscillators, comparing the features of each of the main networks published to date, the models used for ...
متن کاملSYNTHETIC BIOLOGY. Emergent genetic oscillations in a synthetic microbial consortium.
A challenge of synthetic biology is the creation of cooperative microbial systems that exhibit population-level behaviors. Such systems use cellular signaling mechanisms to regulate gene expression across multiple cell types. We describe the construction of a synthetic microbial consortium consisting of two distinct cell types—an "activator" strain and a "repressor" strain. These strains produc...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Phyton
سال: 2017
ISSN: 1851-5657
DOI: 10.32604/phyton.2017.86.224