Login: Password:  Do not remember me

Categories




E-BooksKaveh A Chaotic Meta-heuristic Algorithms for Optimal Design of Structures 2024




Kaveh A  Chaotic Meta-heuristic Algorithms for Optimal Design of Structures 2024

Kaveh A Chaotic Meta-heuristic Algorithms for Optimal Design of Structures 2024 | 16.49 MB
N/A | 349 Pages

Title: Chaotic Meta-heuristic Algorithms for Optimal Design of Structures
Author: Ali Kaveh · Hossein Yousefpoor
Year: N/A




      Read more...         

E-BooksChaotic Meta-heuristic Algorithms for Optimal Design of Structures by Ali Kaveh PDF




Chaotic Meta-heuristic Algorithms for Optimal Design of Structures by Ali Kaveh PDF

Chaotic Meta-heuristic Algorithms for Optimal Design of Structures by Ali Kaveh PDF | 16.49 MB
N/A | 349 Pages

Title: Chaotic Meta-heuristic Algorithms for Optimal Design of Structures
Author: Ali Kaveh · Hossein Yousefpoor
Year: N/A




      Read more...         

E-BooksChaotic Meta–heuristic Algorithms for Optimal Design of Structures



Chaotic Meta–heuristic Algorithms for Optimal Design of Structures
Free Download Chaotic Meta-heuristic Algorithms for Optimal Design of Structures
English | 2024 | ISBN: 3031489179 | 454 Pages | PDF EPUB (True) | 91 MB
In this book, various chaos maps are embedded in eleven efficient and well-known metaheuristics and a significant improvement in the optimization results is achieved. The two basic steps of metaheuristic algorithms consist of exploration and exploitation. The imbalance between these stages causes serious problems for metaheuristic algorithms, which are immature convergence and stopping in local optima. Chaos maps with chaotic jumps can save algorithms from being trapped in local optima and lead to convergence toward global optima. Embedding these maps in the exploration phase, exploitation phase, or both simultaneously corresponds to three efficient and useful scenarios. By creating competition between different modes and increasing diversity in the search space and creating sudden jumps in the search phase, improvements are achieved for chaotic algorithms. Four Chaotic Algorithms, including Chaotic Cyclical Parthenogenesis Algorithm, Chaotic Water Evaporation Optimization, Chaotic Tug-of-War Optimization, and Chaotic Thermal Exchange Optimization are developed.



      Read more...         

E-BooksDasgupta P Multiobjective Heuristic Search An Introduction Optimization 1999




Dasgupta P  Multiobjective Heuristic Search  An Introduction   Optimization 1999

Dasgupta P Multiobjective Heuristic Search An Introduction Optimization 1999 | 6.71 MB
N/A | 141 Pages

Title: N/A
Author: N/A
Year: N/A




      Read more...         

E-BooksTreasure Basket Explorations Heuristic Learning for Infants and Toddlers



Treasure Basket Explorations Heuristic Learning for Infants and Toddlers
Laura Wilhelm Edd, "Treasure Basket Explorations: Heuristic Learning for Infants and Toddlers"
English | ISBN: 0876595751 | 2017 | 80 pages | EPUB | 9 MB
For the littlest learners, everything is an activity-feeling a rock, trying to lick a bubble, smelling a flower, or poking sand. In Treasure-Basket Explorations: Heuristic Learning for Infants and Toddlers, teachers and caregivers of infants and toddlers will learn how these simple explorations support cognitive and vocabulary development. Grounded in the theory of early education pioneer Elinor Goldschmied, the book explains heuristic learning-discovery by trial and error-and how to encourage this type of learning to boost development.



      Read more...         

E-BooksDeep Statistical Comparison for Meta-heuristic Stochastic Optimization Algorithms



Deep Statistical Comparison for Meta-heuristic Stochastic Optimization Algorithms
Deep Statistical Comparison for Meta-heuristic Stochastic Optimization Algorithms
by Tome Eftimov and Peter Korosec
English | 2022 | ISBN: 3030969169 | 141 Pages | True ePUB | 10.5 MB



      Read more...         

E-BooksExact and Heuristic Methods in Combinatorial Optimization





Exact and Heuristic Methods in Combinatorial Optimization
Exact and Heuristic Methods in Combinatorial Optimization:
A Study on the Linear Ordering and the Maximum Diversity Problem

English | 2022 | ISBN: 3662648768 | 232 Pages | PDF | 3 MB



      Read more...         

E-BooksThe Making of Mathematics Heuristic Philosophy of Mathematics





The Making of Mathematics Heuristic Philosophy of Mathematics
English | 2022 | ISBN: 3030897303 | 457 pages | True PDF EPUB | 11.99 MB
This book offers an alternative to current philosophy of mathematics: heuristic philosophy of mathematics. In accordance with the heuristic approach, the philosophy of mathematics must concern itself with the making of mathematics and in particular with mathematical discovery. In the past century, mainstream philosophy of mathematics has claimed that the philosophy of mathematics cannot concern itself with the making of mathematics but only with finished mathematics, namely mathematics as presented in published works. On this basis, mainstream philosophy of mathematics has maintained that mathematics is theorem proving by the axiomatic method. This view has turned out to be untenable because of Gödel's incompleteness theorems, which have shown that the view that mathematics is theorem proving by the axiomatic method does not account for a large number of basic features of mathematics.
By using the heuristic approach, this book argues that mathematics is not theorem proving by the axiomatic method, but is rather problem solving by the analytic method. The author argues that this view can account for the main items of the mathematical process, those being: mathematical objects, demonstrations, definitions, diagrams, notations, explanations, applicability, beauty, and the role of mathematical knowledge.



      Read more...         

E-BooksMeta-heuristic Optimization Techniques Applications in Engineering





Meta-heuristic Optimization Techniques Applications in Engineering
English | 2022 | ISBN: 3110716178 , 978-3110716177 | 204 pages | True PDF EPUB | 16.25 MB
Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical modelling, and simulation. Neither optimization in engineering, nor the performance of safety-critical system and system security; nor high assurance software architecture and design would be possible without the development of mathematical applications.



      Read more...         

E-BooksHeuristic and Knowledge-Based Security Checks of Source Code Artifacts Using Community Knowledge





Heuristic and Knowledge-Based Security Checks of Source Code Artifacts Using Community Knowledge
English | 2021 | ISBN: 3832553495 | 228 pages | True PDF | 7.54 MB
The goal of this dissertation is to support developers in applying security checks using community knowledge. Artificial intelligence approaches combined with natural language processing techniques are employed to identify security-related information from community websites such as Stack Overflow or GitHub. All security-related information is stored in a security knowledge base. This knowledge base provides code fragments that represent the community's knowledge about vulnerabilities, security-patches, and exploits. Comprehensive knowledge is required to carry out security checks on software artifacts, such as data covering known vulnerabilities and their manifestation in the source code as well as possible attack strategies. Approaches that check software libraries and source code fragments are provided for the automated use of the data. Insecure software libraries can be detected using the NVD combined with metadata and library file hash approaches introduced in this dissertation. Vulnerable source code fragments can be identified using community knowledge represented by code fragments extracted from the largest coding community websites: Stack Overflow and GitHub. A state-of-the-art clone detection approach is modified and enriched by several heuristics to enable vulnerability detection and leverage community knowledge while maintaining good performance. Using various case studies, the approaches implemented in Eclipse plugins and a JIRA plugin are adapted to the users' needs and evaluated.



      Read more...         

Page:

Search



Updates




Friend Sites


» TinyDL
» DownTra
» 0dayHome

Your Link Here ?
(Pagerank 4 or above)