Optimum Design of Composite Plates under Thermal Buckling Loads using Imperialist Competitive Algorithm
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2010, Vol 1, Issue 2
Abstract
Thermal buckling loads of laminated composite plates are maximized for a given total thickness. Fiber directions and relative thickness of layers are considered as design variables. Analysis of buckling temperature is carried out by using the finite element method, while the imperialist competitive algorithm (ICA) is employed to optimize as many as seven variables for the different layered plates. The imperialist competitive algorithm (ICA) is thus evaluated for its recognition.
Authors and Affiliations
Hamid Mozafari , Amran Alias , Fatemeh Kamali
INTERIOR DECORATION USING AUGMENTED REALITY WITH COLOR PERCEPTION
The hands of Augmented Reality has been widened in all the fields by using it we can able to merge the virtual world objects with the real world environment in the android platform. By using this application we can able...
An Effective Test Suite Reduction Using Priority Cost Technique
Effective testing can develop quality software with higher productivity at a lower cost. As the software is modified and new test cases are added to the test suite, the size of the test suite grows and the cost of testin...
Human Computer Interaction based on Psychology and Interactive system design
Human - computer interaction (HCI) is the area of intersection between psychology and the social sciences, on the one hand, and computer science and technology, on the other.HCI researchers analyze and design-specific us...
COMPARATIVE ANALYSIS OF IMAGE DENOISING TECHNIQUES
These days the concept of denoising is not restricted to the field of photography or publication where image needs to be improved for printing purpose. It is quite useful tool in number of digital image processing applic...
Efficient Prediction of Cross-Site Scripting Web Pages using Extreme Learning Machine
Malicious code is a way of attempting to acquire sensitive information by sending malicious code to the trustworthy entity in an electronic communication. JavaScript is the most frequently used command language in the we...