Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

A Neural Network: Family Competition Genetic Algorithm And Its Application In Electromagnetic Optimization, Chien Hsun Chen, P. Y. Chen, H. Weng Jan 2009

A Neural Network: Family Competition Genetic Algorithm And Its Application In Electromagnetic Optimization, Chien Hsun Chen, P. Y. Chen, H. Weng

Chien Hsun Chen

This study proposes a neural network-family competition genetic algorithm (NN-FCGA) for solving the electromagnetic (EM) optimization and other general-purpose optimization problems. The NN-FCGA is a hybrid evolutionary-based algorithm, combining the good approximation performance of neural network (NN) and the robust and effective optimum search ability of the family competition genetic algorithms (FCGA) to accelerate the optimization process. In this study, the NN-FCGA is used to extract a set of optimal design parameters for two representative design examples: the multiple section low-pass filter and the polygonal electromagnetic absorber. Our results demonstrate that the optimal electromagnetic properties given by the NN-FCGA are …


Softcomputing Identification Techniques Of Asynchronous Machine Parameters: Evolutionary Strategy And Chemotaxis Algorithm, Nouri Benaïdja Jan 2009

Softcomputing Identification Techniques Of Asynchronous Machine Parameters: Evolutionary Strategy And Chemotaxis Algorithm, Nouri Benaïdja

Turkish Journal of Electrical Engineering and Computer Sciences

Softcomputing techniques are receiving attention as optimisation techniques for many industrial applications. Although these techniques eliminate the need for derivatives computation, they require much work to adjust their parameters at the stage of research and development. Issues such as speed, stability, and parameters convergence remain much to be investigated. This paper discusses the application of the method of reference model to determine parameters of asynchronous machines using two optimisation techniques. Softcomputing techniques used in this paper are evolutionary strategy and the chemotaxis algorithm. Identification results using the two techniques are presented and compared with respect to the conventional simplex technique …


Parameter Identification Of A Separately Excited Dc Motor Via Inverse Problem Methodology, Mounir Hadef, Mohamed Rachid Mekideche Jan 2009

Parameter Identification Of A Separately Excited Dc Motor Via Inverse Problem Methodology, Mounir Hadef, Mohamed Rachid Mekideche

Turkish Journal of Electrical Engineering and Computer Sciences

Identification is considered to be among the main applications of inverse theory and its objective for a given physical system is to use data which is easily observable, to infer some of the geometric parameters which are not directly observable. In this paper, a parameter identification method using inverse problem methodology is proposed. The minimisation of the objective function with respect to the desired vector of design parameters is the most important procedure in solving the inverse problem. The conjugate gradient method is used to determine the unknown parameters, and Tikhonov's regularization method is then used to replace the original …


An Optimization Approach For The Cascade Vulnerability Problem, Christian Servin Jan 2009

An Optimization Approach For The Cascade Vulnerability Problem, Christian Servin

Open Access Theses & Dissertations

In inter-connected systems, where several computers share information with each other, problems may arise when inappropriate information starts to flow through. For example, let us consider a simple scenario of a university composed of three departments: payroll, financial aid, and academic services. We know that the payroll department deals with sensitive information, such as social security numbers, dates of birth, amounts of wages, etc. The financial aid department may use information that payroll owns. Similarly, the academic department communicates with the financial aid department. An intruder can take advantage of this network connectivity and create an inappropriate flow of information …