Constrained Engineering DesignOptimization using Average Differential Evolution
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2018, Vol 20, Issue 6
Abstract
The use of metaheuristics has a growing interest in solving constrained optimization problems due to the computational disadvantages of numerical methods. Metaheuristics are a powerful tool in reaching the global optimum. In this work, the Average Differential Evolution (ADE) algorithm, which is one of the newly proposed metaheuristics, has been adapted to the constrained engineering design problems. The ADE algorithm is a population-based approach with a high convergence rate. It uses a mutation operator with collective diversity in the production of candidates. The results show the robustness end effectiveness of the proposed algorithm compared to state-of-the-art algorithms in literature
Authors and Affiliations
Burhanettin Durmuş
Utility Mining Algorithm for High Utility Item sets from Transactional Databases
The discovery of item sets with high utility like profits is referred by mining high utility item sets from a transactional database. Although in recent years a number of relevant algorithms have been proposed, for high...
Cloudburst Predetermination System
Abstract: Cloudburst is a devastating disaster that usually occurs during rainy seasons at Himalayan regions.The recent floods in the ‘Kedarnath’ area, Uttarakhand are a classic example of flash floods in the MandakiniRi...
A software tool that provides relevant information for diabetic patients to help prevent diabetic foot[i][u][/u][/i]
Abstract: This project proposes a tool which can be very useful for diabetic patients for preventing diabetic foot. 347 million people worldwide have diabetes and 15% of them have the chance of developing diabetic...
Recommender Systems to Address New User Cold-Start Problem with User Side Information
Abstract: Due to exponential growth of Internet, users are facing the problem of Information overloading. Recommender Systems (RS) serve as an indispensible tool to solve information overloading problem. Due totheir grea...
Solution against BGP vulnerabilities
Abstract: The Border Gateway Protocol (BGP) is the only inter-domain routing protocol.Routing informationamong Autonomous Systems (AS) is exchanged using BGP. BGP protocol does not provide any securitymechanism, so it is...