Optimization Technique for Maximization Problem in Evolutionary Programming of Genetic Algorithm in Data Mining
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 9
Abstract
The optimization technique is used for the identification of some best values from the various populations. The Evolutionary algorithm is used as a basic concept of the Evolutionary Programming Strategy. To solve many of the numeric and combinatorial problems the evolutionary programming is applied. The optimization problem is obtained using the crossover and mutation. The mutation operation is performed to identify the best fitness values and solution so as to obtain the result. This paper focuses on Optimization technique which is based on the solution selection process. This process helps to enhance the performance of the optimization technique. This paper mainly helps to identify the best fitness values from the various other populations.
Authors and Affiliations
R. Karthick , S. Saravanan , M. VetriSelvan
Eigenvalues of tridiagonal matrix using Strum Sequence and Gerschgorin theorem
In this paper, computational efficient technique is proposed to calculate the eigenvalues of a tridiagonal system matrix using Strum sequence and Gerschgorin theorem. The proposed technique is applicable in various contr...
“Spotting the techniques on OPENMP Compilers and its Optimization”
OPENMP is a parallel programming technique which is employed in order to improve the optimization. The research paper proposes a number of techniques which can be used to enhance the performance and execution of parallel...
A Recent Survey on Bloom Filters in Network Intrusion Detection Systems
Computer networks are prone to hacking, viruses and other malware; a Network Intrusion Detection System (NIDS) is needed to protect the end-user machines from threats. An effective NIDS is therefore a network security sy...
Developing a Mobile Adaptive Test (MAT) in an M-Learning Environment for Android Based 3G Mobile Devices
M-Learning (e-Learning through mobile device) is gaining its importance worldwide among the Learning Community owing to the ubiquitous and powerful computing nature of the Mobile Devices. In an M-Learning environment, St...
ENHANCED SECURITY IN SECURE SOCKET LAYER 3.0 SPECIFICATION
We address the issue network security.All the bank provides 128 bit ssl encryption in two way communication between client and server.In this paper we can tell you idea behind 256 ssl encryption.By which two way communic...