0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Multi-objective Optimization in Computational Intelligence - Theory and Practice (Hardcover): Lam Thu Bui, Sameer Alam Multi-objective Optimization in Computational Intelligence - Theory and Practice (Hardcover)
Lam Thu Bui, Sameer Alam
R4,779 Discovery Miles 47 790 Ships in 12 - 17 working days

Multi-objective optimization (MO) is a fast-developing field in computational intelligence research. Giving decision makers more options to choose from using some post-analysis preference information, there are a number of competitive MO techniques with an increasingly large number of MO real-world applications. ""Multi-Objective Optimization in Computational Intelligence: Theory and Practice"" explores the theoretical, as well as empirical, performance of MOs on a wide range of optimization issues including combinatorial, real-valued, dynamic, and noisy problems. This book provides scholars, academics, and practitioners with a fundamental, comprehensive collection of research on multi-objective optimization techniques, applications, and practices.

Air Traffic Simulation and Modelling (Paperback): Sameer Alam Air Traffic Simulation and Modelling (Paperback)
Sameer Alam
R1,964 Discovery Miles 19 640 Ships in 10 - 15 working days

Evaluation of advanced Air Traffic Management concepts is a challenging task due to the limitations in the existing scenario generation methodologies. Their rigorous evaluation on safety metrics, in a variety of complex scenarios, can provide an insight into their performance, which can help improve upon them while developing new ones. In this work, I propose an air traffic simulation system, with a novel representation of airspace, which can prototype advanced ATM concepts. I then propose a novel evolutionary computation methodology to algorithmically generate conflict scenarios of increasing complexity in order to evaluate conflict detection algorithms. I illustrate the methodology by quantitative evaluation of three conflict detection algorithms on safety metrics. I then propose the use of data mining techniques for the discovery of interesting relationships, that may exist implicitly, in the algorithm's performance data. This relationships are formed as a predictive model for algorithm's vulnerability which can then be included in an ensemble that can minimize the overall vulnerability of the system.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Marvel Spiderman Fibre-Tip Markers (Pack…
R57 Discovery Miles 570
Major Tech 10 Pack LED Lamp…
R330 R265 Discovery Miles 2 650
Twice The Glory - The Making Of The…
Lloyd Burnard, Khanyiso Tshwaku Paperback R325 R219 Discovery Miles 2 190
Multifunction Water Gun - Gladiator
R399 R379 Discovery Miles 3 790
Salton S1I260 Perfect Temperature Iron…
R269 R252 Discovery Miles 2 520
Philips TAUE101 Wired In-Ear Headphones…
R199 R129 Discovery Miles 1 290
Broken To Heal - Deceit, Destruction…
Alistair Izobell Paperback R200 Discovery Miles 2 000
Bantex B9343 Large Office Stapler (Full…
R150 R69 Discovery Miles 690
A Neil Diamond Christmas
Neil Diamond CD R368 Discovery Miles 3 680
ZA Cute Butterfly Earrings and Necklace…
R712 R499 Discovery Miles 4 990

 

Partners