The semantic web has been proceeding as a future generation web since it provides the various opportunities to enhance the overall performance of the existing web. Ontology creation is the primary step in order to ach...
详细信息
ISBN:
(纸本)9781467372312
The semantic web has been proceeding as a future generation web since it provides the various opportunities to enhance the overall performance of the existing web. Ontology creation is the primary step in order to achieve the intelligent web as well as to extract the information by using distinct websites and also for the growth of subject content. In this paper, we define the concepts of evolutionary computation with the help of evolutionary computation ontology. Our focal point is to develop and implement the knowledge content of the evolutionary computation subject using ontology for the learner. This evolutionary computation ontology helps the learner to enhance their knowledge level in the subject of evolutionary computation and it facilitates the learner to use the visualization feature and query feature.
One of the main purposes of Metabolic Engineering is the quantitative prediction of cell behaviour under selected genetic modifications. These methods can then be used to support adequate strain optimization algorithm...
详细信息
ISBN:
(纸本)9781479904549;9781479904532
One of the main purposes of Metabolic Engineering is the quantitative prediction of cell behaviour under selected genetic modifications. These methods can then be used to support adequate strain optimization algorithms in a outer layer. The purpose of the present study is to explore methods in which dynamical models provide for phenotype simulation methods, that will be used as a basis for strain optimization algorithms to indicate enzyme under/over expression or deletion of a few reactions as to maximize the production of compounds with industrial interest. This work details the developed optimization algorithms, based on evolutionary computation approaches, to enhance the production of a target metabolite by finding an adequate set of reaction deletions or by changing the levels of expression of a set of enzymes. To properly evaluate the strains, the ratio of the flux value associated with the target metabolite divided by the wild-type counterpart was employed as a fitness function. The devised algorithms were applied to the maximization of Serine production by Escherichia coli, using a dynamic kinetic model of the central carbon metabolism. In this case study, the proposed algorithms reached a set of solutions with higher quality, as compared to the ones described in the literature using distinct optimization techniques.
This work explores the optimization of a real-valued parameter, assigned to each network node running the Distributed Exponentially-weighted Flow Splitting (DEFT) routing protocol, in order to address changes on traff...
详细信息
ISBN:
(纸本)9781450349390
This work explores the optimization of a real-valued parameter, assigned to each network node running the Distributed Exponentially-weighted Flow Splitting (DEFT) routing protocol, in order to address changes on traffic conditions. This new proposal avoids the need to alter link weights and forwarding paths, by adjusting traffic splitting. In this context, we explore the use of evolutionary Algorithms both in single and multi-objective optimization problems, to obtain solutions that minimize network's congestion.
In this paper we present the results on applying evolutionary computation techniques to construction of several cryptographic attacks. In particular, SAT-based guess-and-determine attacks studied in the context of alg...
详细信息
ISBN:
(数字)9783030166922
ISBN:
(纸本)9783030166915;9783030166922
In this paper we present the results on applying evolutionary computation techniques to construction of several cryptographic attacks. In particular, SAT-based guess-and-determine attacks studied in the context of algebraic cryptanalysis. Each of these attacks is built upon some set of Boolean variables, thus it can be specified by a Boolean vector. We use two general evolutionary strategies to find an optimal vector: (1+1)-EA and GA. Based on these strategies parallel algorithms (based on modern SAT-solvers) for solving the problem of minimization of a special pseudo-Boolean function are implemented. This function is a fitness function used to evaluate the runtime of a guess-and-determine attack. We compare the efficiency of (1+1)-EA and GA with the algorithm from the Tabu search class, that was earlier used to solve related problems. Our GA-based solution showed the best results on a number of test instances, namely, cryptanalysis problems of several stream ciphers (cryptographic keystream generators).
In this paper, we present an evolutionary computation on the fuzzy mSTP (multicriteria solid transportation problem) in which the coefficients of objective function are represented as fuzzy numbers. The ranking fuzzy ...
详细信息
ISBN:
(纸本)0780329031
In this paper, we present an evolutionary computation on the fuzzy mSTP (multicriteria solid transportation problem) in which the coefficients of objective function are represented as fuzzy numbers. The ranking fuzzy numbers with integral value are used in the evaluation and selection. The proposed algorithm is incorporated with problem-specific knowledge and conductive to find out the set of nondominated points in the criteria space based on decision maker degree of optimism.
A multitenant cloud-application that is designed to use several components needs to implement the required degree of isolation between the components when the workload changes. The highest degree of isolation results ...
详细信息
ISBN:
(纸本)9781538651506
A multitenant cloud-application that is designed to use several components needs to implement the required degree of isolation between the components when the workload changes. The highest degree of isolation results in high resource consumption and running cost per component. A low degree of isolation allows sharing of resources, but leads to degradation in performance and to increased security vulnerability. This paper presents a simulation-based approach operating on computational metaheuristics that search for optimal ways of deploying components of a cloud-hosted application to guarantee multitenancy isolation When the workload changes, an open multiclass Queuing Network model is used to determine the average number of component access requests, followed by a metaheuristic search for the optimal deployment solutions of the components in question. The simulation-based evaluation of optimization performance showed that the solutions obtained were very close to the target solution. Various recommendations and best practice guidelines for deploying components in a way that guarantees the required degree of isolation are also provided.
Production Process Planning (PPP) problem is abundant among manufacturing systems. In general the problem can be approached by the network analysis or dynamic programming. But in the case of the multicriteria Producti...
详细信息
ISBN:
(纸本)0780339495
Production Process Planning (PPP) problem is abundant among manufacturing systems. In general the problem can be approached by the network analysis or dynamic programming. But in the case of the multicriteria Production Process Planning (mPPP for short) problem, it is difficult for those traditional optimization techniques to cope with. In this paper, a new evolutionary computation (EC) approach is developed to deal with the PPP problems with both single or multiple objective criteria. The proposed EC approach adopts a new simple state permutation encoding and combines with the neighborhood search technique in mutation operation to improve the evolutionary process in finding the optimal solution of the PPP problems. The numerical analysis shows that the proposed EC is both effective and efficient to the PPP problems.
The field of evolutionary computation has experienced tremendous growth over the past 20 years, resulting in a wide variety of evolutionary algorithms and applications. The result poses an interesting dilemma for many...
详细信息
ISBN:
(纸本)9781450300735
The field of evolutionary computation has experienced tremendous growth over the past 20 years, resulting in a wide variety of evolutionary algorithms and applications. The result poses an interesting dilemma for many practitioners in the sense that, with such a wide variety of algorithms and approaches, it is often hard to se the relationships between them, assess strengths and weaknesses, and make good choices for new application *** tutorial is intended to give an overview of a general EC framework that can help compare and contrast approaches, encourages crossbreeding, and facilitates intelligent design choices. The use of this framework is then illustrated by showing how traditional EAs can be compared and contrasted with it, and how new EAs can be effectively designed using ***, the framework is used to identify some important open issues that need further research
This paper presents several evolutionary computation techniques and discusses their applicability to nonlinear programming problems. On the basis of this presentation we discuss also a construction of a new hybrid opt...
详细信息
暂无评论