標題: Titlebook: Applications of Evolutionary Computation; 18th European Confer Antonio M. Mora,Giovanni Squillero Conference proceedings 2015 Springer Inte [打印本頁] 作者: 搖尾乞憐 時間: 2025-3-21 16:12
書目名稱Applications of Evolutionary Computation影響因子(影響力)
書目名稱Applications of Evolutionary Computation影響因子(影響力)學科排名
書目名稱Applications of Evolutionary Computation網絡公開度
書目名稱Applications of Evolutionary Computation網絡公開度學科排名
書目名稱Applications of Evolutionary Computation被引頻次
書目名稱Applications of Evolutionary Computation被引頻次學科排名
書目名稱Applications of Evolutionary Computation年度引用
書目名稱Applications of Evolutionary Computation年度引用學科排名
書目名稱Applications of Evolutionary Computation讀者反饋
書目名稱Applications of Evolutionary Computation讀者反饋學科排名
作者: 征服 時間: 2025-3-21 20:39 作者: 經典 時間: 2025-3-22 03:13 作者: CLASP 時間: 2025-3-22 05:42
Emergence of Cooperation in the Prisoner’s Dilemma Driven by Conformity In this context, ‘imitation’ means to adopt the strategy of another agent. In order to study if and how the emergence of cooperation can be affected by a social influence, we provide agents with two different behaviors, i.e., conformity and nonconformity, they use to select their strategy. Numerica作者: DNR215 時間: 2025-3-22 09:22
Investigating Fitness Measures for the Automatic Construction of Graph Modelstically construct graph models for complex networks. The GP-based automatic inference system was used to reproduce two well-known graph models, the results of which indicated that the evolved models exemplified striking similarity when compared to their respective targets on a number of structural n作者: Callus 時間: 2025-3-22 14:06 作者: 遠地點 時間: 2025-3-22 17:48 作者: Vldl379 時間: 2025-3-22 23:56 作者: ARCHE 時間: 2025-3-23 03:53
Decimal Trading in the U.S. Stock Markets In this context, ‘imitation’ means to adopt the strategy of another agent. In order to study if and how the emergence of cooperation can be affected by a social influence, we provide agents with two different behaviors, i.e., conformity and nonconformity, they use to select their strategy. Numerica作者: Mercantile 時間: 2025-3-23 08:20
https://doi.org/10.1007/978-0-387-26336-6tically construct graph models for complex networks. The GP-based automatic inference system was used to reproduce two well-known graph models, the results of which indicated that the evolved models exemplified striking similarity when compared to their respective targets on a number of structural n作者: justify 時間: 2025-3-23 12:29
Conference proceedings 2015tation in image analysis, signal processing, and pattern recognition), EvoINDUSTRY (nature-inspired techniques in industrial settings), EvoNUM (bio-inspired algorithms for continuous parameter optimization), EvoPAR (parallel implementation of evolutionary algorithms), EvoRISK (computational intellig作者: expansive 時間: 2025-3-23 17:22 作者: 樹上結蜜糖 時間: 2025-3-23 21:28 作者: 創(chuàng)作 時間: 2025-3-23 23:19 作者: 富饒 時間: 2025-3-24 02:25
Conference proceedings 2015lications 2015, held in Copenhagen, Spain, in April 2015, colocated with the Evo 2015 events EuroGP, EvoCOP, and EvoMUSART. The 72 revised full papers presented were carefully reviewed and selected from 125 submissions. EvoApplications 2015 consisted of the following 13 tracks: EvoBIO (evolutionary 作者: FLING 時間: 2025-3-24 08:17 作者: accomplishment 時間: 2025-3-24 11:47
https://doi.org/10.1007/978-981-287-104-6ormed using the first packet carrying the application payload. In order to further reduce the latency, the circuit is optimized by Cartesian genetic programming. Using a real network data, we demonstrated viability of our approach in task of a very fast classification of three application protocols (HTTP, SMTP, SSH).作者: 知識分子 時間: 2025-3-24 18:42
A Fast FPGA-Based Classification of Application Protocols Optimized Using Cartesian GPormed using the first packet carrying the application payload. In order to further reduce the latency, the circuit is optimized by Cartesian genetic programming. Using a real network data, we demonstrated viability of our approach in task of a very fast classification of three application protocols (HTTP, SMTP, SSH).作者: stress-response 時間: 2025-3-24 19:05
A Swarm Intelligence Approach to ,D Distance-Based Indoor UWB Localization (PSO) algorithm to solve the localization problem and we compare its performance with that of the Two-Stage Maximum-Likelihood (TSML) algorithm. Simulation results show that the former allows achieving accurate position estimates even in scenarios where, because of ill-conditioning problems associated with the network topology, TSML fails.作者: 討好女人 時間: 2025-3-24 23:09 作者: 描繪 時間: 2025-3-25 05:26 作者: 冷峻 時間: 2025-3-25 08:27 作者: negotiable 時間: 2025-3-25 11:51
https://doi.org/10.1007/978-981-287-104-6ovements based on EO aim at better convergence of the algorithm and better quality of program execution in terms of the execution time. The proposed load balancing algorithm is evaluated by experiments with simulated parallelized load balancing of distributed program graphs.作者: 污點 時間: 2025-3-25 18:36
https://doi.org/10.1007/978-981-287-104-6olve the problem using a freely available data set. The results obtained are analysed considering two MO quality metrics: hypervolume and set coverage. After applying a statistical methodology widely accepted, we conclude that SPEA2 provides the best performance on average considering such data set.作者: pancreas 時間: 2025-3-25 23:15
James R. Barth,Cindy Lee,Triphon Phumiwasanaures. A broad experimental evaluation on different problems and computational scenarios featuring diverse volatility conditions shows that the combination of these two strategies leads to more robust performances, in particular in situations in which churn rates are large.作者: Nerve-Block 時間: 2025-3-26 02:25
Heat Map Based Feature Selection: A Case Study for Ovarian Cancerta without the need of pre-processing, thanks to a built-in compression mechanism based on color quantization. Results shows that our proposal is very competitive against some of the most popular algorithms and succeeds where other methodologies may fail due to the high dimensionality of the data.作者: 不真 時間: 2025-3-26 05:20
A Novel Grouping Genetic Algorithm for Assigning Resources to Users in WCDMA Networks work points out that our GGA approach exhibits a superior performance than that of the conventional method (which minimizes only the load factors), since all users receive the demanded service along with a minimum use of the assigned resources (aggregate capacity, power, and codes).作者: 伸展 時間: 2025-3-26 09:42 作者: 規(guī)章 時間: 2025-3-26 13:37
Planning the Deployment of Indoor Wireless Sensor Networks Through Multiobjective Evolutionary Technolve the problem using a freely available data set. The results obtained are analysed considering two MO quality metrics: hypervolume and set coverage. After applying a statistical methodology widely accepted, we conclude that SPEA2 provides the best performance on average considering such data set.作者: RALES 時間: 2025-3-26 20:51 作者: acrophobia 時間: 2025-3-27 00:09 作者: 無能力之人 時間: 2025-3-27 04:39
Treasury Inflation-Protected Securitieshe highest-accuracy HGS level located in attraction basins of local and global fitness minimizers. It might allow us to find more minimizers by performing local convex searches started from that points. It also delivers more information about the attraction basins of the minimizers, which can be helpful in their stability analysis.作者: commensurate 時間: 2025-3-27 06:58
Treasury Inflation-Protected Securitiesle versus multi-objective problem is also conducted. We find that of the examined algorithms, NSGAII generally produces the most desirable approximation fronts. We also demonstrate that while related, the best multi-objective solutions do not translate into the best single-objective solutions.作者: 恃強凌弱的人 時間: 2025-3-27 12:12
Combining Ensemble of Classifiers by Using Genetic Programming for Cyber Security Applicationsbined and used without any extra phase of training; furthermore, in case of changes in the data, the function can be recomputed in an incrementally way, with a moderate computational effort..Experiments conducted on unbalanced datasets and on a well-known cyber-security dataset assess the goodness of the approach.作者: CUR 時間: 2025-3-27 16:40 作者: Sputum 時間: 2025-3-27 20:26 作者: 抒情短詩 時間: 2025-3-27 22:59 作者: Addictive 時間: 2025-3-28 02:22 作者: Rheumatologist 時間: 2025-3-28 10:07 作者: 使增至最大 時間: 2025-3-28 10:38 作者: NEG 時間: 2025-3-28 16:59
Katherine Travis,Neville H. Golden particular case of cancer, the use of mass spectrometry data has become very popular but some problems arise due to that the number of mass-to-charge ratios exceed by a huge margin the number of patients in the samples. In order to deal with the high dimensionality of the data, most works agree wit作者: Antarctic 時間: 2025-3-28 20:46
Katherine Travis,Neville H. Goldendesign proteins of new functions. The Inverse Folding Problem (IFP) is in itself an important research problem, but also at the heart of most rational protein design approaches. In brief, the IFP consists in finding sequences that will fold into a given structure, rather than determining the structu作者: Crumple 時間: 2025-3-29 01:37
Encyclopedia of Feeding and Eating Disordershere numerous moving agents carry mobile devices that create a peer-to-peer network without authentication. A requirement for the proper functioning of such networks is that all the peers act legitimately, forwarding the needed messages, and concurring to the maintenance of the network connectivity.作者: Pde5-Inhibitors 時間: 2025-3-29 05:51
Katherine Travis,Neville H. Golden or users in Wideband Code Division Multiple Access (WCDMA) mobile networks. In particular, we propose: (1) A novel cost function (to be minimized) that contains, in addition to the common load factors, other utilization ratios for aggregate capacity, codes, power, and users without service. (2) A n作者: justify 時間: 2025-3-29 10:26 作者: Magisterial 時間: 2025-3-29 14:40
https://doi.org/10.1007/978-981-287-104-6is the main design constraint, the classifier is constructed as a combinational circuit in a field programmable gate array. The classification is performed using the first packet carrying the application payload. In order to further reduce the latency, the circuit is optimized by Cartesian genetic p作者: intertwine 時間: 2025-3-29 17:34
https://doi.org/10.1007/978-981-287-104-6 EO approach is used which is parallelized and extended by a guided search of next solution state. EO detects the best strategy of tasks migration leading to a reduction in program execution time. We assume a parallel improvement of the EO algorithm with guided state changes which provides a paralle作者: Kidney-Failure 時間: 2025-3-29 23:11 作者: Malcontent 時間: 2025-3-30 03:25 作者: 原諒 時間: 2025-3-30 06:00
Jennifer D. Lundgren,Ashleigh Ponas a graph. The tour is automatically designed by maximizing the number of the Points of Interest (.s) to visit as a function of both tourists’ preferences and requirements, and constraints such as opening hours, visiting times and accessibility of the .s, and weather forecasting. Since this itineray作者: 令人作嘔 時間: 2025-3-30 11:59
https://doi.org/10.1007/978-981-287-104-6structure. Thus, given a set of low-cost sensors, which can be plugged into the grid or powered by batteries, a collector node, and a building plan, including walls and plugs, the purpose is to deploy the sensors optimising three conflicting objectives: average coverage, average energy cost, and ave作者: gerrymander 時間: 2025-3-30 15:58
Treasury Inflation-Protected Securitieschic Genetic Strategy (HGS), in solving ill-conditioned, multimodal global optimization problems in continuous domains. The performed experiments range from standard benchmarks (Rastrigin and multi-peak Gaussian) to an advanced inverse parametric problem of the logging measurement inversion, associa作者: NICHE 時間: 2025-3-30 18:15
Decimal Trading in the U.S. Stock Marketswn in several works, it strongly influences many social dynamics. We consider a population of agents that evolves in accordance with a payoff matrix which embodies two main strategies: cooperation and defection. In particular, agents play a game (e.g., the Prisoner’s Dilemma) by choosing between the作者: 行為 時間: 2025-3-30 22:08
Treasury Inflation-Protected Securitiesobjective version of the critical node detection problem, which aims to minimize pairwise connectivity in a graph by removing a subset of . nodes. Interestingly, while it has been recognized that this problem is inherently multi-objective since it was formulated, until now only single-objective algo作者: 柏樹 時間: 2025-3-31 01:04 作者: CRUE 時間: 2025-3-31 07:37 作者: 打火石 時間: 2025-3-31 11:22
Heat Map Based Feature Selection: A Case Study for Ovarian Cancer particular case of cancer, the use of mass spectrometry data has become very popular but some problems arise due to that the number of mass-to-charge ratios exceed by a huge margin the number of patients in the samples. In order to deal with the high dimensionality of the data, most works agree wit作者: Microgram 時間: 2025-3-31 17:22
A Novel Multi-objectivisation Approach for Optimising the Protein Inverse Folding Problemdesign proteins of new functions. The Inverse Folding Problem (IFP) is in itself an important research problem, but also at the heart of most rational protein design approaches. In brief, the IFP consists in finding sequences that will fold into a given structure, rather than determining the structu作者: 有說服力 時間: 2025-3-31 19:10
Black Holes and Revelations: Using Evolutionary Algorithms to Uncover Vulnerabilities in Disruption-here numerous moving agents carry mobile devices that create a peer-to-peer network without authentication. A requirement for the proper functioning of such networks is that all the peers act legitimately, forwarding the needed messages, and concurring to the maintenance of the network connectivity.作者: Acclaim 時間: 2025-3-31 23:26