The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The bin packing process can be modeled on optimization problems and it is widely studied due to its various applications. However, most implementation of the problem lacks of coordination in a unified optimization framework. Therefore, based on a general framework of multi-objective optimization with metaheuristics, jMetal, a novel genetic algorithm for bin packing problems is proposed in this paper...
Energy policies of today put considerable pressure on operators to eliminate losses that appear in the process of delivering electricity. Together with a new view of what a distribution network should represent, it is clear that classic distribution methods need to become smart grids. A system that responds to changing requirements in terms of energy consumption becomes more and more attractive. This...
This paper proposes a new method for the pattern synthesis of sparse concentric circular array. This method can avoid the premature and improve the poor capability of local optimization of the traditional genetic algorithm. Alternatively implementing the two kinds of genetic breeding operations can effectively alleviate the dependence of the algorithm's convergence on the choice of the initial group...
LBP coefficients are essential and determine the priority of gray differences. The objectives of this paper are to reveal this and propose a method for finding an optimal priority through the genetic algorithm. On the other hand, the genetic operators such as initialization and cross-over operators, generate invalid coefficients, defective chromosomes. This paper also recommends a rectifying method...
In the traditional loan credit risk assessment of enterprise , enterprise credit and loan risk is conflicting. That is, when trying to change the needs of either party, the credit risk will be increased necessarily. Therefore, we proposed an enterprise credit risk assessment method based on the improved genetic algorithm to establish the performance architecture of the latitude-longitude grid performance...
RGSS-Negotiation is a Repaired Genetic Security Service Negotiation approach. Security as a non-functional requirement for web service is an important trend. This is due to the different levels of security the consumer and the provider demand or supply. In a web service negotiation, researchers negotiate QoS objects (attributes). Negotiating security levels is not addressed so far. In this paper,...
In this paper, we design a hierarchical execution architecture of genetic algorithms (GAs). We present a variant of genetic algorithms known as Hierarchical GA (HGA) based on the proposed architecture. In HGA, the population is divided into several sub-populations, which are initially placed at the lowest level. When the GA process at the level terminates, the GA process goes up to the next level...
One of the type of proficient unsupervised data mining task is clustering that subdivides an input data set into a certain number of subsets in such a way that members of the same subset will have high similarity features and the members of different set have various transformations. Segmentation is piercing a digital image into small units known as pixels and is used to clarify an image when the...
Genetic-fuzzy mining (GFM) was proposed to train fuzzy membership functions, thus enhancing the final solution quality. However, it is quite time-consuming because of frequent database scans for fitness evaluation. In this paper, we propose a parallel algorithm with MapReduce architecture to further speed up the genetic-fuzzy mining process. In the proposed approach, the master processor randomly...
Following analyzing existing challenges in addressing the balance between exploration and exploitation encountered by evolutionary algorithms, this paper develops a Genetic Algorithm with speciation (GASP). It first incorporates a novel encoding scheme and recombination method for a balanced genetic divergence when locating global optima in complex applications, such as structural and dynamic design...
There are some atypical texts hidden in the Telecom's customer complaint text. These atypical complaints can be divided into several classes. Atypical items have high confidence with intergroup neighbor, but low support in full complaint set. After filtering out the high-frequency items, we can use k-means method to clustering the complaint texts. However, the clustering result is affected by the...
In this paper, the Permutation Flow Shop Problem (PFSP) with total completion time is studied. In previous papers, we proposed parallel algorithms to solve the PFSP based on load balancing Branch and Bound approach. In this work, we propose other alternatives based on Genetic Algorithms to solve this problem. However, using efficiently genetic algorithm (GA) involves a complex interaction among its...
Selecting the parameters for the classification is a delicate process. We present in this paper a method for selecting the parameters by the genetic algorithm which optimizes the choice of parameters by minimizing a cost function. This function is defined by a Trace criterion. The approach is validated on some characters images. The proposed algorithm gives a fast convergence towards the optimal solution.
In the process of satellite imaging, the observed image is blurred by optical system and atmospheric effects and corrupted by additive noise. The image restoration method known as Wiener deconvolution intervenes to estimate from the degraded image an image as close as possible to the original image. The effectiveness of this method obviously depends on the regularization term which requires a priori...
Query Optimization is principally a multifaceted exploration job that searches for best plan amongst the semantically equal plans that are obtained from any given query. The execution of any processing datasets essentially depends on the capability of query optimization procedure to acquire competent query processing approaches. A Distributed Database System (DDS) is a group of autonomous cooperating...
Feature subset selection is an important research branch in the field of pattern recognition. Due to the traditional feature selection algorithms do not take into account the feature updating case, the paper analyzes the relationship between dataset and features, proposes a new feature activity measurement that is used to determine the influence among different features on some certain conditions...
Extracting knowledge from environments with a continuous flow of data (data streams) is progressively receiving more attention. In such environments, the data distribution usually changes over time, which is known as concept drift. This paper presents a genetic algorithm aimed at adjusting the parameters of concept drift detection methods to improve their accuracies. Experiments were performed with...
Automatic test paper generation system is to automatically generate papers by computer from test database with many constraint conditions according to requirements of teachers and teaching. It could greatly reduce teachers' work, and make the difficulty coefficient of test paper reasonable. The system plays an important role in reform of examination system. Traditional genetic algorithm uses binary...
Reconstruction Method of Network Forensics Scenario has grown into a mature and rich technology that provides advanced skills to get the chain of evidence. Using statistical methods to analyze intrusion logs in order to present evidentiary values in court are often refuted as baseless and inadmissible evidences which is not considering the input spent. These spendings is to generate the reports no...
Carpooling is a means of vehicle sharing by which drivers share their cars with one or more riders whose travel itineraries are similar to their own. As such, carpooling can be an effective way to ease traffic congestion. In this paper, we first present an intelligent carpool system based on the service-oriented architecture. Second, we propose a fuzzy-controlled genetic-based carpool algorithm by...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.