نتایج جستجو برای: chaos genetic algorithm

تعداد نتایج: 1328736  

2009
Anil Kumar M. K. Ghose

Security, integrity, non-repudiation, confidentiality, and authentication services are the most important factors in information security. Genetic algorithms (GAs) are a class of optimization algorithms. Many problems can be solved using genetic algorithms through modeling a simplified version of genetic processes. The application of a genetic algorithm (GA) to the field of cryptology is rather...

Journal: :international journal of environmental research 2012
s. farzin p. ifaei n. farzin y. hassanzadeh m.t. aalami

chaos theory discusses unstable and non-periodic behavior of non-linear fluctuating dynamicsystems. since evaporation level variations of lakes have a dynamic identity, chaos theory can have a uniquerole in collecting data of these variations. therefore it is an important and challenging problem in the field ofplanning and qualitative and quantitative management of urmia lake to verify whether ...

Journal: :EURASIP Journal on Advances in Signal Processing 2010

2013
Reza Ebrahimzadeh

Very recently evolutionary optimization algorithms use the Genetic Algorithm to improve the result of Optimization problems. Several processes of the Genetic Algorithm are based on 'Random', that is fundamental to evolutionary algorithms, but important defections in the Genetic Algorithm are local convergence and high tolerances in the results, they have happened for randomness reason. In this ...

2012
Sarah M. Harmon

The " chaos game " is a well-known algorithm by which one may construct a pictorial representation of an iterative process. The resulting sets are known as fractals and can be mathematically characterized by measures of dimension as well as by their associated recurrence relations. Using the chaos game algorithm, is it possible to derive meaningful structure out of our own genetic encoding, and...

Encryption is an important issue in information security which is usually provided using a reversible mathematical model. Digital image as a most frequently used digital product needs special encryption algorithms. This paper presents a new encryption algorithm high security for digital gray images using genetic algorithm and Lattice Map function. At the first the initial value of Logistic Map ...

Journal: :JCM 2013
Wei He Enjun Wang Ting Xiong

In order to extract sensitive features of face images from high dimensional image data and facilitate the recognition speed, this paper has proposed a novel method based on the manifold learning and genetic-chaos algorithm optimized kernel extreme learning machine (KELM) for the application of face recognition. The locally linear embedding (LLE) algorithm has been employed to extract distinct f...

Improving reliability indices, increasing the grid production capacity, reducing power loss during peak periods and fuel cost, and economic and environmental considerations on the one hand, and the progresses made in the field of semiconductor devices on the other hand, are some of the factors that increase the penetration of the renewable energy sources to the distributed network. When the pho...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید