نتایج جستجو برای: continuous and binary genetic algorithm

تعداد نتایج: 17019497  

Journal: :Computers & Electrical Engineering 2000
Carlos A. Coello Coello Alan D. Christiansen Arturo Hernández Aguirre

In this paper we propose a methodology based on a genetic algorithm (GA) to automate the design of combinational logic circuits in which we aim to minimize the total number of gates used. Our results are compared against those produced by human designers and by another GA-based approach. We also analyze the importance of using a non-binary representation in this problem despite the commonly acc...

Farzaneh Sadeghian, Hadiseh Hasani, Marzieh Jafari,

Background: Autism Spectrum Disorder (ASD) occurs based on the continuous deficit in a person’s verbal skills, visual, auditory, touch, and social behavior. Over the last two decades, one of the most important approaches in studying brain functions in autistic persons is using functional Magnetic Resonance Imaging (fMRI). Objectives: It is common to use all brain regions in functional extracti...

Journal: :iranian journal of chemistry and chemical engineering (ijcce) 2007
davood rashtchian saeed ovaysi vahid taghikhani cirous ghotbi

a method based on the genetic algorithm (ga) was developed to study the phase behavior of multicomponent and multiphase systems. upon application of the ga to the thermodynamic models which are commonly used to study the vle, vlle and lle phase equilibria, the physically meaningful values for the binary interaction parameters (bip) of the models were obtained. using the method proposed in this ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تحصیلات تکمیلی علوم پایه زنجان - دانشکده ریاضی 1393

in this thesis, a structured hierarchical methodology based on petri nets is used to introduce a task model for a soccer goalkeeper robot. in real or robot soccer, goalkeeper is an important element which has a key role and challenging features in the game. goalkeeper aims at defending goal from scoring goals by opponent team, actually to prevent the goal from the opponent player’s attacks. thi...

2004
Qinzhen Xu Qiangfu Zhao Wenjiang Pei Luxi Yang Zhenya He

Neural network tree (NNTree) is a hybrid learning model. Currently We have proposed a simplified multiple objective optimization based genetic algorithm for evolving such kind of NNTrees and shown through experments that an NNTree can be interpreted easily if the number of inputs for each expert neural network (ENN) is limited. One problem remained is that for those problems the input features ...

F. Azarsina, M. Abdoli M.H. Givian Rad

Today due to increasing development and importance of petroleum activities andmarine transport as well as due to the mining of seabed, building activities such as construction of docks, platforms and structures as those in coastal areas and oceans has increased significantly. Concrete strength as one of the most important necessary parameters for designing, depends on many factors such as mixtu...

1996
Kalyanmoy Deb Mayank Goyal

In this paper, a exible yet eecient algorithm for solving engineering design optimization problems is presented. The algorithm is developed based on both binary-coded and real-coded genetic algorithms (GAs). Since both GAs are used, the variables involving discrete, continuous, and zero-one variables are handled quite eeciently. The algorithm restricts its search only to the permissible values ...

Mohammad Masoori Ramin Bozorgmehry Boozarjomehry Shohreh Fatemi

This study is focused on the development of a systematic computational approach which implements Genetic Algorithm (GA) to find the optimal rigorous kinetic models.A general Kinetic model for hydrogenolysis of dibenzothiophene (DBT) based on Langmuir-Hinshelwood type has been obtained from open literature. This model consists of eight continuous parameters(e.g., Arrhenus  and Van't...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :Inf. Sci. 2012
Shuming Wang Junzo Watada

This paper studies a facility location model with fuzzy random parameters and its swarm intelligence approach. A Value-at-Risk (VaR) based fuzzy random facility location model (VaR-FRFLM) is built in which both the costs and demands are assumed to be fuzzy random variables, and the capacity of each facility is unfixed but a decision variable assuming continuous values. Under this setting, the V...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید