Application of Improved Differential Evolution Algorithm in solving Container-packing problemsApplication of Improved Differential Evolution Algorithm in solving Container-packing problems
Mathematical Modeling Innovative Practice Base, Zhuhai College Jinan University, Zhuhai, China 519070; 2Department of Computer Science and Technology, Jinan University, Zhuhai, China 519070
1.34 Mb. 31
read
Convention for the Conservation of Salmon in the North Atlantic OceanConvention for the Conservation of Salmon in the North Atlantic Ocean
Basic Instrument for the North Atlantic Salmon Conservation Organization nasco
60.06 Kb. 1
read
Paper submitted to the 11Paper submitted to the 11
Paper submitted to the 11th World Conference in Transport Research wctr 2007 June 24-28 University of California, Berkeley, usa
84.02 Kb. 1
read
--
First of all, I would like to thank Dr. K. R. Rao from the bottom of my heart for being a guide, mentor and a constant source of encouragement throughout my thesis I would like to thank Dr. Alan Davis and Dr
158.9 Kb. 1
read
Design and Implementation of Home Energy Management System Based on gsm networkDesign and Implementation of Home Energy Management System Based on gsm network
Assistant Professor, Communications Department, Sulaimani Polytechnic University, Sulaymaniyah, Iraq
107.24 Kb. 1
read
Collective Consultation: Past, Present and FutureCollective Consultation: Past, Present and Future
Section 188(1) tulr(C)A will be familiar to most present. I want to focus on three specific areas in a little detail rather than cover the basic ground. They are
46.51 Kb. 1
read
Session C10 175 Disclaimer —Session C10 175 Disclaimer —
If this paper is used for any purpose other than these authors’ partial fulfillment of a writing requirement for first year (freshman)
60.53 Kb. 1
read
Anomaly Detection Approach Using Hidden Markov Model abstractAnomaly Detection Approach Using Hidden Markov Model abstract
Hence hmm is an ideal choice for addressing this problem. The objective of the system is to detect the Anomaly during the transaction only and confirm the fraud by asking some security code
24.93 Kb. 1
read
Cloud Point Extraction Methodology for Separation and Microamounts Determination of LeadCloud Point Extraction Methodology for Separation and Microamounts Determination of Lead
95.83 Kb. 1
read
Literature reviewLiterature review
Recently, incorporating Genetic algorithm into watermarking schemes to improve its performance and effectiveness has received a great deal of attention among watermarking researchers. A brief review of some recent researches is presented
22.79 Kb. 1
read
David Dunham(1,3), Natan Eismont(2,3), Michael BoyarskyDavid Dunham(1,3), Natan Eismont(2,3), Michael Boyarsky
Deflecting hazardous asteroids from collision with the earth by using small asteroids
82.17 Kb. 1
read
January, 2016 doc.: Ieee 802. 11-16/0123r0 ieee p802. 11January, 2016 doc.: Ieee 802. 11-16/0123r0 ieee p802. 11
Reminder on the process of comment processing. Presentations on rejected comments can be considered, but do not change the resolution of the comment
73.32 Kb. 1
read
Animal use protocolAnimal use protocol
This protocol is required for use of live vertebrate animals as specified in the
68.08 Kb. 1
read
Blind inpainting using and total variation regularizationBlind inpainting using and total variation regularization
The method can also be extended to impulse noise removal by relaxing the regularizer from the norm to the norm. Experimental results show that the proposed method can deal with a larger fraction of missing pixels than two phase methods
85.6 Kb. 1
read

  1




The database is protected by copyright ©ininet.org 2020
send message

    Main page