0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Multi-objective Optimization in Computational Intelligence - Theory and Practice (Hardcover): Lam Thu Bui, Sameer Alam Multi-objective Optimization in Computational Intelligence - Theory and Practice (Hardcover)
Lam Thu Bui, Sameer Alam
R4,779 Discovery Miles 47 790 Ships in 12 - 17 working days

Multi-objective optimization (MO) is a fast-developing field in computational intelligence research. Giving decision makers more options to choose from using some post-analysis preference information, there are a number of competitive MO techniques with an increasingly large number of MO real-world applications. ""Multi-Objective Optimization in Computational Intelligence: Theory and Practice"" explores the theoretical, as well as empirical, performance of MOs on a wide range of optimization issues including combinatorial, real-valued, dynamic, and noisy problems. This book provides scholars, academics, and practitioners with a fundamental, comprehensive collection of research on multi-objective optimization techniques, applications, and practices.

Air Traffic Simulation and Modelling (Paperback): Sameer Alam Air Traffic Simulation and Modelling (Paperback)
Sameer Alam
R1,964 Discovery Miles 19 640 Ships in 10 - 15 working days

Evaluation of advanced Air Traffic Management concepts is a challenging task due to the limitations in the existing scenario generation methodologies. Their rigorous evaluation on safety metrics, in a variety of complex scenarios, can provide an insight into their performance, which can help improve upon them while developing new ones. In this work, I propose an air traffic simulation system, with a novel representation of airspace, which can prototype advanced ATM concepts. I then propose a novel evolutionary computation methodology to algorithmically generate conflict scenarios of increasing complexity in order to evaluate conflict detection algorithms. I illustrate the methodology by quantitative evaluation of three conflict detection algorithms on safety metrics. I then propose the use of data mining techniques for the discovery of interesting relationships, that may exist implicitly, in the algorithm's performance data. This relationships are formed as a predictive model for algorithm's vulnerability which can then be included in an ensemble that can minimize the overall vulnerability of the system.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Emigreer Of Bly - Is Die Gras Werklik…
Stephan Joubert Paperback R220 R189 Discovery Miles 1 890
The Year Of Facing Fire - A Memoir
Helena Kriel Paperback R315 R271 Discovery Miles 2 710
Hoe Ek Dit Onthou
Francois Van Coke, Annie Klopper Paperback R300 R219 Discovery Miles 2 190
Cook, Eat, Repeat - Ingredients, Recipes…
Nigella Lawson Hardcover R818 R677 Discovery Miles 6 770
Safari Nation - A Social History Of The…
Jacob Dlamini Paperback R320 R250 Discovery Miles 2 500
How Did We Get Here? - A Girl's Guide to…
Mpoomy Ledwaba Paperback  (1)
R290 R195 Discovery Miles 1 950
Herontdek Jou Selfvertroue - Sewe Stappe…
Rolene Strauss Paperback  (1)
R330 R284 Discovery Miles 2 840
Decolonisation In Universities - The…
Jonathan D. Jansen Paperback R395 R309 Discovery Miles 3 090
Hiking Beyond Cape Town - 40 Inspiring…
Nina du Plessis, Willie Olivier Paperback R320 R250 Discovery Miles 2 500
The Asian Aspiration - Why And How…
Greg Mills, Olusegun Obasanjo, … Paperback R350 R273 Discovery Miles 2 730

 

Partners