The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a improved Genetic algorithm used in anti-missile systems, which is verified more efficient than the ordinary method. Experimental results simulated on 8 attacking objects was carried out. The improved Genetic algorithm improves normal Genetic algorithm by up to 6.07% in the average optimal time. These preferable results demonstrate the advantage of the adaptive Genetic algorithm...
It is an objective fact that large database has inconsistent data. This paper presents a new rule acquisition method based on rough set theory and genetic algorithm. Using rough set theory, we will divide inconsistent data table into two parts, certain data and possible data, and then standard genetic algorithm is used for mining rules set. When the algorithm is processing, the user is allowed to...
In ongoing efforts to reduce the congestion of the airspace and the cost of company, optimization stands as a fundamental research problem. This paper proposes a new method by establishing a SIMMOD simulate model and a controller workload objective function to address the dynamic slot-route assignment problem of the air traffic. Genetic Algorithms was used that offers a dynamic optimization required...
This paper studies the loading problems of Multi-category Goods under the limited loading capacity. According to the characteristics of model, hybrid heuristic algorithm is used to get the optimization solution. Firstly, adopt binary code so as to make the problem more succinctly. On the basis of cubage-weight balance algorithm, construct initial solution to improve the feasibility. Through adopting...
An attempt has been made in the paper to find globally optimal cluster centers for remote-sensed images with the proposed Rapid Genetic k-Means algorithm. The idea is to avoid the expensive crossover or fitness to produce valid clusters in pure GA and to improve the convergence time. The drawback of using pure GA in the problem is the usage of an expensive crossover or fitness to produce valid clusters...
This paper provides on effective Shuffled Embedded Technique (SET) to eliminate the drawback of substitution technique. Using the genetic algorithm, message bits are embedded into multiple, vague (blurred) and higher LSB layer in order to increase robustness, which is achieved by embedding secret messages in digital audio stream. Additional careful considerations are taken against the premeditated...
An approach to detection of phishing hyperlinks using the rule based system formed by genetic algorithm is proposed, which can be utilized as a part of an enterprise solution to anti-phishing. A legitimate webpage owner can use this approach to search the web for suspicious hyperlinks. In this approach, genetic algorithm is used to evolve rules that are used to differentiate phishing link from legitimate...
In this paper, we report a classifier ensemble technique using the search capability of genetic algorithm (GA) for Named Entity Recognition (NER) in biomedical domain. We use Maximum Entropy (ME) framework to build a number of classifiers depending upon the various representations of a set of features. The proposed technique is evaluated with the JNLPBA 2004 data sets that yield the overall recall,...
The field of digital systems has undergone a major revolution in recent decades. Circuits are shrinking in physical size while growing both in speed and range of capabilities. This rapid advancement is not without serious problems, however. Especially worrisome are verification and testing, which become more important as the system complexity increases and time-to-market decreases. Genetic algorithms...
Palmprint identification is a subcategory of biometrics identification, which can be efficiently used to identify the people. Palmprint-based identification is currently a potential alternative to human identification method of a well known fingerprint-based identification. For example, if the hand of the identified person is dirty, the accuracy of fingerprint-based identification is distorted, while...
Detecting communities from complex networks has triggered considerable attention in several application domains. Targeting this problem, a local search based genetic algorithm (GALS) which employs a graph-based representation (LAR) has been proposed in this work. The core of the GALS is a local search based mutation technique. Aiming to overcome the drawbacks of the existing mutation methods, a concept...
Swarm Intelligence is the one of the most efficient and emergent techniques for global optimization. Artificial Bee Colony Algorithm (ABCA) is one of the new swarm intelligent population-based meta-heuristic approaches, inspired by foraging behavior of bees for function optimization. To enhance the efficiency of ABCA optimizer this paper proposes a novel hybrid approach involving genetic algorithms...
Intrusion detection systems (IDS) usually trigger a great number of alarm messages that frequently overwhelm their human operators. Hierarchically clustering technique is able to help IDS operators to get meaningful overviews from the great number of alarms. A dilemma is encountered when the clusters are generated. If the clusters are obtained one by one, they cannot be prevented from overlapping...
Side information construction in Wyner-Ziv video coding is a sensible task which strongly influences the final ratedistortion performance of the scheme. This side information is usually generated through an interpolation of the previous and next images. Some of the zones of a scene however, such as the occlusions, cannot be estimated with other frames. In this paper we propose to avoid this problem...
It is well-known that wireless scheduling algorithm could exploit multi-user diversity to enhance the network capacity. With multiple transmit/receive antennas, there are additional degrees of freedom which could deliver either spatial multiplexing gain and/or spatial diversity gain. With cross layer scheduling, there is also multi-user selection diversity which contributes to both network capacity...
This paper explores website link structure considering websites as interconnected graphs and analyzing their features as a social network. Factor Analysis provides the statistical methodology to adequately extract the main website profiles in terms of their internal structure. However, due to the large number of indicators, a genetic search of their optimum number is proposed, and applied to a case...
This paper proposes an approach to find solution to the Bounded Knapsack Problem (BKP). BKP is a generalization of 0/1 knapsack problem in which multiple instances of distinct items but a single knapsack is considered. This problem occurs in many ways in real-life, such as cryptography, finance, etc. A genetic algorithm using greedy approach is proposed to solve this problem. The experiments prove...
Based on the deep research on Infrastructure as a Service (IaaS) cloud systems of open-source, we propose an optimized scheduling algorithm to achieve the optimization or sub-optimization for cloud scheduling problems. In this paper, we investigate the possibility to allocate the Virtual Machines (VMs) in a flexible way to permit the maximum usage of physical resources. We use an Improved Genetic...
In order to more accurately predict industrial emissions, the paper selected BP and GA-BP neural network to establish the prediction model between the foreign trade and industrial waste discharge. Compared of different forecasting methods and examples of analysis of results, it shows that GA-BP neural network had higher accuracy, tolerant and excellent generalization ability than other model on ecology...
Methods for the identification of temperature in intelligent building and building equipments is one of hot topics focused by lots of researchers in that research area. To implement the process of inspecting and forecasting of energy efficiency in building and its accessory, a feed forward neural network is used as the identification structure for temperature identification of internal space in building...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.