By Topic

Genetic and Evolutionary Computing, 2009. WGEC '09. 3rd International Conference on

Date 14-17 Oct. 2009

Filter Results

Displaying Results 1 - 25 of 218
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (247 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - xviii
    Request permission for commercial reuse | PDF file iconPDF (198 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (158 KB) | HTML iconHTML
    Freely Available from IEEE
  • WGEC 2009 Committee Members

    Publication Year: 2009, Page(s):xx - xxi
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • WGEC 2009 Organizing Committee

    Publication Year: 2009, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Intrusion Detection System Based on Payoff Matrix for Wireless Sensor Networks

    Publication Year: 2009, Page(s):3 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    The high node density, large scale node number and limitation of resource in wireless sensor networks introduce significant challenges when preventing active denial of services (DoS) attacks. This paper established an attacking-defending gaming model, where the strategy space and payoff matrix are given to both the intrusion detection system (IDS) and the malicious nodes. The Nash equilibrium of m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reputation Mechanism to Stimulate Node Cooperation in Ad Hoc Networks

    Publication Year: 2009, Page(s):7 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    Packet forwarding in ad hoc networks relies on the cooperation among nodes. However, some selfish nodes will refuse to provide forwarding services to conserve their resources, which deteriorates the network performance. Reputation mechanism can reduce the selfish behavior of nodes. This paper proposes a simple and effective local reputation mechanism: LRM, which can stimulate the node cooperation ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved RBF Neural Network Based on Evolutionary Programming

    Publication Year: 2009, Page(s):11 - 13
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    For the problem of local minimum for gradient descent method used to train an RBF (radial basis function) neural network, EP (evolutionary programming) is introduced to the training of RBF neural network in this paper. The combination method of EP and gradient descent method can effectively avoid local minimum, and provides a more reasonable network design. The effectiveness of the proposed scheme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Quantum Genetic Algorithm

    Publication Year: 2009, Page(s):14 - 18
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (383 KB) | HTML iconHTML

    Quantum genetic algorithm (QGA) is the combination between genetic algorithm and quantum computing. In this paper, a chromosome of the standard QGA is seen as a node and the chromosome population is regarded as a network. Then the reasons for the prematurity and the stagnation of the standard QGA are analyzed from the perspective of network structure. To solve the two problems, an improved quantum... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Application of Cultural Algorithm in Load Balancing of Hybrid P2P Network

    Publication Year: 2009, Page(s):19 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    This paper analyses the defect of the designing model of load balancing in hybrid P2P network, and proposes a new strategy of scheduling for load balancing, which based on culture algorithm of multilayer belief spaces. According to the current load status of each super-node in the system, it can calculate its load weight of the next time section by using the cultural algorithm, and assign the curr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reflective Requirements Specification for Requirements Evolving

    Publication Year: 2009, Page(s):23 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    The classic requirement engineering provides limited technology and inefficient methods for requirements evolution, which leads to great restriction on finish the task of requirements evolution with high-efficiency and high-quality. For resolving above problem, this paper presents a reflective requirements specification for requirements evolution. The reflective requirements specification divides ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RFID Middleware Design and Implement in Enterprise Information Public Service Platform

    Publication Year: 2009, Page(s):27 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    RFID middleware is the bridge between the hardware of RFID and application program. At present the proliferation of RFID tags and readers will require dedicated middleware solutions that manage readers and process the vast amount of captured data, this paper analyzes the requirements and propose a design for such an RFID middleware, The paper has done a lot of research in some key technologies on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MPEG-4 Image Encryption Research Based on VEA Algorithm

    Publication Year: 2009, Page(s):31 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    In this thesis, in the foundation of overview the present research situation of encryption algorithm, research on the concrete realization of MPEG video encryption algorithm and the transplantation of DM642, the main research contents are as follows: in simplifies to MPEG-4 VISUAL XviD source code, in the foundation of which we design and implement the representative VEA algorithm and the entropy ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved Genetic Algorithm for Aircraft Departure Sequencing Problem

    Publication Year: 2009, Page(s):35 - 38
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (170 KB) | HTML iconHTML

    Optimization model is build for solving the aircraft departure sequencing problem in this paper first. Then, an improved genetic algorithm (GA) using symbolic coding is proposed, where a type of total probability crossover and big probability mutation are performed. In this way, the evolutionary policy of Particle Swarm Optimization (PSO) is absorbed into the improved GA, which reduces the complex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Groundwater Level Dynamic Prediction Based on Chaos Optimization and Support Vector Machine

    Publication Year: 2009, Page(s):39 - 43
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    Groundwater level has random characters because of influences factors of natural and anthropogenic. Study random prediction model of groundwater level on the basis of groundwater physical process analysis is important to groundwater appraisal. The theory of supporting vector machine based on small-sample machine learning theory is introduced into dynamic prediction of groundwater level. A least sq... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-objective Particle Swarm Optimization Method Based on Fitness Function and Sequence Approximate Model

    Publication Year: 2009, Page(s):44 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (174 KB) | HTML iconHTML

    Heuristic search methods usually require a large amount of evolutionary iterative calculation, which has become a bottleneck for applying them to practical engineering problems. In order to reduce the number of analysis of heuristic search methods, a Pareto multi-objective particle swarm optimization (MOPSO) method is presented. In this approach, Pareto fitness function is used to select global ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Satisfactory Design of IIR Digital Filter Based on Chaotic Mutation Particle Swarm Optimization

    Publication Year: 2009, Page(s):48 - 51
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    Based on Chaotic Mutation Particle Swarm Optimization (CPSO), this paper proposed a novel method for satisfactory design of digital IIR filters. First, chaotic mutation was used to improve the performance of standard PSO to avoid premature convergence. Then, the ¿shrinking¿ strategy was introduced to raise its local search ability. Finally the CPSO algorithm was used to optimize the IIR digital ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Optimal Controller Based-on GA for Direct Torque Control

    Publication Year: 2009, Page(s):52 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    In direct torque control (DTC) of induction motor, the performance of system is influenced by the given value of torque. The given torque is the output of speed regulator. And PID adjustor is used generally as the speed regulator, so the selection of PID parameters is crucial to DTC system. In this paper, a new optimal control strategy of DTC based-on genetic algorithm (GA) for induction motor is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing the Impact of Entity Mobility Models on the Performance of Routing Protocols in the MANET

    Publication Year: 2009, Page(s):56 - 59
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    Mobility model is the foundation of the simulation study of various protocols in the mobile ad-hoc network (MANET). The entity mobility model is a family of mobility models widely used in the study. A comparative study on entity mobility models is presented in this paper. Firstly, both the advantages and disadvantages of four typical entity mobility models are summarized; these models include the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Detector Arrangement of Single Cell Counter Based on Forward Light Scattering

    Publication Year: 2009, Page(s):60 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    Light scattering technique is used to measuring the blood cell size in many types of Hematology Analyzers, but How to choose the detection angle of scattered light affect the efficiency of the instrument count. In this paper, axial lighting model is established. Mathematical description of luminous flux and particle size of cell is given. And through numerical calculation, the main factors countin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Routing Algorithm for Energy-Efficient in Wireless Sensor Networks

    Publication Year: 2009, Page(s):65 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    For WSN, the network node energy is limited, so how to save and even the consumption of the overall energy is an important problem. Clustering is one of the design methods used to manage the network energy consumption efficiently. In this paper, we use genetic simulated annealing algorithm(GSAA) to find an optimal cluster formation and prolong network lifetime. The proposed algorithm takes the nod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Combinatorial Inverse Algorithm for Particle Sizing by Light Scattering Method

    Publication Year: 2009, Page(s):69 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    In order to realize the stability and the accuracy of particle inversion algorithm, on the basis of present commonly used algorithm, one kind of particle size distributed stochastic inversion algorithm is proposed. The algorithm combines the advantage of the annealing evolution algorithm and the genetic algorithm and has the stronger global convergence. The algorithm has ability to distinguish the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.