We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. From Genetic Variation to Probabilistic Modeling

    Genetic algorithms ⦓GAs) [53, 83] are stochastic optimization methods inspired by natural evolution and genetics. Over the last few decades, GAs have...
    Chapter
  2. Hierarchical Bayesian Optimization Algorithm

    The previous chapter has discussed how hierarchy can be used to reduce problem complexity in black-box optimization. Additionally, the chapter has...
    Chapter
  3. The Challenge of Hierarchical Difficulty

    Thus far, we have examined the Bayesian optimization algorithm (BOA), empirical results of its application to several problems of bounded difficulty,...
    Chapter
  4. Hierarchical BOA in the Real World

    The last chapter designed hBOA, which was shown to provide scalable solution for hierarchical traps. Since hierarchical traps were designed to test...
    Chapter
  5. Scalability Analysis

    The empirical results of the last chapter were tantalizing. Easy and hard problems were automatically solved without user intervention in polynomial...
    Chapter
  6. Summary and Conclusions

    The purpose of this chapter is to provide a summary of main contributions of this work and outline important conclusions.
    Chapter
  7. Bayesian Optimization Algorithm

    The previous chapter argued that using probabilistic models with multivariate interactions is a powerful approach to solving problems of bounded...
    Chapter
  8. Probabilistic Model-Building Genetic Algorithms

    The previous chapter showed that variation operators in genetic and evolutionary algorithms can be replaced by learning a probabilistic model of...
    Chapter
  9. Eigenvalues II, Matrix Diagonalization and Unitary Matrix

    In this chapter, we will show another method to find the eigenvalues of a matrix. We further show that the process of finding the eigenvalues of a...
    Chapter 2024
  10. Pauli Spin Matrices, Adjoint Matrix, and Hermitian Matrix

    In this chapter, I will show you some of the tedious mathematical derivations step-by-step. They are not difficult, and you just need to be patient...
    Chapter 2024
  11. The Last But Not the Least

    In this chapter, we will discuss how to write scripts on IBM-Q to run more sophisticated quantum programs. At this final step, you will find that you...
    Chapter 2024
  12. No-Cloning Theorem and Quantum Teleportation I

    In this chapter, we first prove the no-cloning theorem. We will show that we cannot clone or copy an arbitrary quantum state. Then we will introduce...
    Chapter 2024
  13. Drivers, Barriers, and Enablers of Digital Transformation in Maritime Ports Sector: A Review and Aggregate Conceptual Analysis

    This paper develops a conceptual framework for digital transformation in the maritime ports sector. The study combines a systematic literature review...
    Benjamin Mosses Sakita, Berit Irene Helgheim, Svein Bråthen in Intelligent Transport Systems
    Conference paper 2024
  14. Network Robustness Improvement Based on Alternative Paths Consideration

    Many transportation networks have complex infrastructures (road, rail, airspace, etc.). The quality of service in air transportation depends on...
    Jean-Claude Lebègue, Daniel Delahaye, Jacco Hoekstra in Intelligent Transport Systems
    Conference paper 2024
  15. Federated Learning for Drowsiness Detection in Connected Vehicles

    Ensuring driver readiness poses challenges, yet driver monitoring systems can assist in determining the driver’s state. By observing visual cues,...
    William Lindskog, Valentin Spannagl, Christian Prehofer in Intelligent Transport Systems
    Conference paper 2024
  16. Performance Analysis of Compiler Support for Parallel Evaluation of C++ Constant Expressions

    Metaprogramming, the practice of writing programs that manipulate other programs at compile-time, continues to impact software development; enabling...
    Andrew Gozillon, Seyed Hossein Haeri, ... Paul Keir in Software, System, and Service Engineering
    Conference paper 2024
  17. IoT Attacks Countermeasures: Systematic Review and Future Research Direction

    In order to connect heterogeneous nodes, objects, and smart devices of a network, such as e-transportation, e-health, e-education, e-home, and...
    Conference paper 2024
  18. Exception Handling in Real-Time and Embedded Systems

    Modern computing not only demands precise execution but also timely and responsive actions. Nowhere is this truer than in the realm of real-time and...
    Pedro Mejia Alvarez, Raul E. Gonzalez Torres, Susana Ortega Cisneros in Exception Handling
    Chapter 2024
  19. An Auditable Framework for Evidence Sharing and Management Using Smart Lockers and Distributed Technologies: Law Enforcement Use Case

    This paper presents a decentralised framework for sharing and managing evidence that uses smart lockers, blockchain technology, and the...
    Belinda I. Onyeashie, Petra Leimich, ... Gordon Russell in Big Data Technologies and Applications
    Conference paper 2024
Did you find what you were looking for? Share feedback.