A clonal selection based memetic algorithm is proposed for solving job shop scheduling problems in this paper. In the proposed algorithm, the clonal selection and the local search mechanism are designed to enhance exp...
详细信息
A clonal selection based memetic algorithm is proposed for solving job shop scheduling problems in this paper. In the proposed algorithm, the clonal selection and the local search mechanism are designed to enhance exploration and exploitation. In the clonal selection mechanism, clonal selection, hypermutation and receptor edit theories are presented to construct an evolutionary searching mechanism which is used for exploration. In the local search mechanism, a simulated annealing local search algorithm based on Nowicki and Smutnicki's neighborhood is presented to exploit local optima. The proposed algorithm is examined using some well-known benchmark problems. Numerical results validate the effectiveness of the proposed algorithm.
According to the security features of WiMAX-based wireless communication network, a fresh new wireless communication authentication protocol called WCAP was advanced and designed adopting the dual-key authentication s...
详细信息
We present a novel object localization approach based on the Global Structure Constraint model (GSC) and Optimal Algorithm. In GSC, Objects are described as constellations of points satisfied with their specific globa...
详细信息
Aiming at the dynamic policy trigger problem in policy based network management, this thesis first introduces the uncertain information generated by onepoint coverage random sets theory and also the unified framework ...
详细信息
In this paper, we mainly discuss the relationship between the extended Pawlak flow graph (EFG) with granular computing (GrC), and develop a both simple and concrete model for EFG using GrC. The distinct advantage is t...
详细信息
An efficient methodology for recognizing features is presented. The part information is taken from the B-rep solid date library then broken down into sub-graph. Once the sub-graphs are generated, they are first checke...
详细信息
An efficient methodology for recognizing features is presented. The part information is taken from the B-rep solid date library then broken down into sub-graph. Once the sub-graphs are generated, they are first checked to see whether they match with the predefined feature library. If so, a feature vector is assigned to them. Otherwise, base faces are obtained as heuristic information and used to restore missing faces, meanwhile, update the sub-graphs. The sub-graphs are transformed into vectors, and these vectors are presented to the neural network which classifies them into feature classes.
A hybrid of graph-based and neural network recognition system is developed. The part information is taken from the B-rep solid date library then broken down into sub-graph. Once the sub-graphs are generated, they are ...
详细信息
A hybrid of graph-based and neural network recognition system is developed. The part information is taken from the B-rep solid date library then broken down into sub-graph. Once the sub-graphs are generated, they are first checked to see whether they match with the predefined feature library. If so, a feature vector is assigned to them. Otherwise, base faces are obtained as heuristic information and used to restore the missing faces and update the sub-graphs. The sub-graphs are transformed into vectors, and these vectors are presented to the neural network, which classifies them into feature classes. The scope of instances variations of predefined feature that can be recognized is very wide. A new BP algorithm based on the enlarging error is also presented.
IEEE802.16, as a wireless MAN broadband access standard, defines a flexible QoS mechanism in MAC layer for wild variety classes of services. However, it dose not define specific admission control strategy and scheduli...
详细信息
暂无评论