0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Multi-objective Optimization in Computational Intelligence - Theory and Practice (Hardcover): Lam Thu Bui, Sameer Alam Multi-objective Optimization in Computational Intelligence - Theory and Practice (Hardcover)
Lam Thu Bui, Sameer Alam
R4,641 Discovery Miles 46 410 Ships in 18 - 22 working days

Multi-objective optimization (MO) is a fast-developing field in computational intelligence research. Giving decision makers more options to choose from using some post-analysis preference information, there are a number of competitive MO techniques with an increasingly large number of MO real-world applications. ""Multi-Objective Optimization in Computational Intelligence: Theory and Practice"" explores the theoretical, as well as empirical, performance of MOs on a wide range of optimization issues including combinatorial, real-valued, dynamic, and noisy problems. This book provides scholars, academics, and practitioners with a fundamental, comprehensive collection of research on multi-objective optimization techniques, applications, and practices.

Air Traffic Simulation and Modelling (Paperback): Sameer Alam Air Traffic Simulation and Modelling (Paperback)
Sameer Alam
R1,875 Discovery Miles 18 750 Ships in 18 - 22 working days

Evaluation of advanced Air Traffic Management concepts is a challenging task due to the limitations in the existing scenario generation methodologies. Their rigorous evaluation on safety metrics, in a variety of complex scenarios, can provide an insight into their performance, which can help improve upon them while developing new ones. In this work, I propose an air traffic simulation system, with a novel representation of airspace, which can prototype advanced ATM concepts. I then propose a novel evolutionary computation methodology to algorithmically generate conflict scenarios of increasing complexity in order to evaluate conflict detection algorithms. I illustrate the methodology by quantitative evaluation of three conflict detection algorithms on safety metrics. I then propose the use of data mining techniques for the discovery of interesting relationships, that may exist implicitly, in the algorithm's performance data. This relationships are formed as a predictive model for algorithm's vulnerability which can then be included in an ensemble that can minimize the overall vulnerability of the system.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Faber-Castell Grip 2011 Fountain Pen…
R938 Discovery Miles 9 380
By Way Of Deception
Amir Tsarfati, Steve Yohn Paperback  (1)
R250 R230 Discovery Miles 2 300
Davidoff Cool Water For Him Gift Set (2…
R727 Discovery Miles 7 270
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400
Let's Rock
The Black Keys CD R229 Discovery Miles 2 290
Baby Toothpaste (Strawberry 45g)
R51 Discovery Miles 510
Elecstor 18W In-Line UPS (Black)
R999 R359 Discovery Miles 3 590
Goldair GDCF-08 Metal Desk Fan (20cm) (3…
R899 R499 Discovery Miles 4 990
ZA Cross Stud Earrings - Sterling Silver
R439 R299 Discovery Miles 2 990
Peptine Pro Equine Hydrolysed Collagen…
 (2)
R359 R249 Discovery Miles 2 490

 

Partners