| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910869172703321 |
|
|
Autore |
Cuevas Erik |
|
|
Titolo |
Metaheuristic Algorithms: New Methods, Evaluation, and Performance Analysis / / by Erik Cuevas, Alberto Luque, Bernardo Morales CastaƱeda, Beatriz Rivera |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2024.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (309 pages) |
|
|
|
|
|
|
Collana |
|
Studies in Computational Intelligence, , 1860-9503 ; ; 1163 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computational intelligence |
Artificial intelligence |
Computational Intelligence |
Artificial Intelligence |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
-- 1. Introduction to Metaheuristic methods. -- 2. A novel method for initializing populations using the Metropolis-Hastings (MH) technique. -- 3. A measure of diversity for metaheuristic algorithms employing population-based approaches. -- 4. Population Control in Metaheuristic Algorithms: Can Fewer Be Better?. -- 5. Exploration Paths Derived from Trajectories Extracted from Second-Order System Responses. -- 6. Utilizing the Moth Swarm Algorithm to Improve Image Contrast. -- 7. Enhancing Anisotropic Diffusion Filtering via Multi-Objective Optimization. -- 8. Fractional Fuzzy Controller Calibration Using metaheuristic Techniques. -- 9. Striving for Optimal Equilibrium in Metaheuristic Algorithms: Is It Attainable?. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book encompasses three distinct yet interconnected objectives. Firstly, it aims to present and elucidate novel metaheuristic algorithms that feature innovative search mechanisms, setting them apart from conventional metaheuristic methods. Secondly, this book endeavors to systematically assess the performance of well-established algorithms across a spectrum of intricate and real-world problems. Finally, this book serves as a vital resource for the analysis and evaluation of metaheuristic algorithms. It provides a foundational framework for |
|
|
|
|
|
|
|
|
|
|
|
|
assessing their performance, particularly in terms of the balance between exploration and exploitation, as well as their capacity to obtain optimal solutions. Collectively, these objectives contribute to advancing our understanding of metaheuristic methods and their applicability in addressing diverse and demanding optimization tasks. The materials were compiled from a teaching perspective. For this reason, the book is primarily intended for undergraduate and postgraduate students of Science, Electrical Engineering, or Computational Mathematics. Additionally, engineering practitioners who are not familiar with metaheuristic computation concepts will appreciate that the techniques discussed are beyond simple theoretical tools because they have been adapted to solve significant problems that commonly arise in engineering areas. |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910483268803321 |
|
|
Titolo |
Risks and Security of Internet and Systems : 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers / / edited by Javier Lopez, Indrajit Ray, Bruno Crispo |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2015.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XI, 275 p. 70 illus.) |
|
|
|
|
|
|
Collana |
|
Information Systems and Applications, incl. Internet/Web, and HCI, , 2946-1642 ; ; 8924 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection |
Computer networks |
Electronic data processing - Management |
Software engineering |
Application software |
Cryptography |
Data encryption (Computer science) |
Data and Information Security |
Computer Communication Networks |
IT Operations |
Software Engineering |
Computer and Information Systems Applications |
Cryptology |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di contenuto |
|
Trust -- Security risks and threats -- Intrusion detection and prevention -- Access control and security modeling. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the thoroughly refereed post- conference proceedings of the Ninth International Conference on Risks and Security of Internet Systems, CRiSIS 2014, held in Trento, Italy, in August 2014. The 13 full papers and 6 short papers presented were selected from 48 submissions. They explore risks and security issues in Internet applications, networks and systems covering topics such as trust, security risks and threats, intrusion detection and prevention, access control and security modeling. |
|
|
|
|
|
|
|
| |