Results 1 to 10 of about 2,229,434 (295)

Real-Time Task Assignment Approach Leveraging Reinforcement Learning with Evolution Strategies for Long-Term Latency Minimization in Fog Computing [PDF]

open access: yesSensors, 2018
The emerging fog computing technology is characterized by an ultralow latency response, which benefits a massive number of time-sensitive services and applications in the Internet of things (IoT) era.
Long Mai, Nhu-Ngoc Dao, Minho Park
doaj   +2 more sources

Strategies for the evolution of sex [PDF]

open access: yesPhysical Review E, 2001
We find that the hypothesis made by Jan, Stauffer and Moseley [Theory in Biosc., 119, 166 (2000)] for the evolution of sex, namely a strategy devised to escape extinction due to too many deleterious mutations, is sufficient but not necessary for the ...
A. Bernardes   +28 more
core   +7 more sources

Evolution strategies in optimization problems [PDF]

open access: yes, 2007
Evolution strategies are inspired in biology and form part of a larger research field known as evolutionary algorithms. Those strategies perform a random search in the space of admissible functions, aiming to optimize some given objective function.
Cruz, P.A.F., Torres, D.F.M.
core   +7 more sources

Adaptive Gene Level Mutation

open access: yesAlgorithms, 2021
Genetic Algorithms are stochastic optimization methods where solution candidates, complying to a specific problem representation, are evaluated according to a predefined fitness function.
Jalal Al-Afandi, András Horváth
doaj   +1 more source

An adaptive ES with a ranking based constraint handling strategy [PDF]

open access: yesYugoslav Journal of Operations Research, 2014
To solve a constrained optimization problem, equality constraints can be used to eliminate a problem variable. If it is not feasible, the relations imposed implicitly by the constraints can still be exploited.
Kusakci Ali Osman, Can Mehmet
doaj   +1 more source

Evolutionary Approaches for Adversarial Attacks on Neural Source Code Classifiers

open access: yesAlgorithms, 2023
As the prevalence and sophistication of cyber threats continue to increase, the development of robust vulnerability detection techniques becomes paramount in ensuring the security of computer systems. Neural models have demonstrated significant potential
Valeria Mercuri   +2 more
doaj   +1 more source

A Representation for Many Player Generalized Divide the Dollar Games

open access: yesGames, 2023
Divide the dollar is a simplified version of a two player bargaining problem game devised by John Nash. The generalized divide the dollar game has n>2 players. Evolutionary algorithms can be used to evolve individual players for this generalized game but
Garrison W. Greenwood, Daniel Ashlock
doaj   +1 more source

Strategies of Success for Social Networks: Mermaids and Temporal Evolution

open access: yesFuture Internet, 2020
The main goal of this article is to investigate techniques that can quickly lead to successful social systems by boosting network connectivity. This is especially useful when starting new online communities where the aim is to increase the system ...
Massimo Marchiori, Lino Possamai
doaj   +1 more source

Scalable Management of Heterogeneous Cloud Resources Based on Evolution Strategies Algorithm

open access: yesIEEE Access, 2022
The emergence and rapid development of Cloud computing have intensively changed the Information Technology paradigm. Cloud computing found its wide application in science and engineering.
Petra Loncar, Paula Loncar
doaj   +1 more source

Evolution strategies based coefficient of TSK fuzzy forecasting engine

open access: yesIJAIN (International Journal of Advances in Intelligent Informatics), 2021
Forecasting is a method of predicting past and current data, most often by pattern analysis. A Fuzzy Takagi Sugeno Kang (TSK) study can predict Indonesia's inflation rate, yet with too high error.
Nadia Roosmalita Sari   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy