Memetic algorithms and memetic computing optimization: A literature review

F Neri, C Cotta - Swarm and Evolutionary Computation, 2012 - Elsevier
Memetic computing is a subject in computer science which considers complex structures
such as the combination of simple agents and memes, whose evolutionary interactions lead …

[图书][B] Handbook of memetic algorithms

F Neri, C Cotta, P Moscato - 2011 - books.google.com
Memetic Algorithms (MAs) are computational intelligence structures combining multiple and
various operators in order to address optimization problems. The combination and …

Load frequency control of microgrid system by battery and pumped-hydro energy storage

HH Coban, A Rehman, M Mousa - Water, 2022 - mdpi.com
Energy security is one of the main factors in the development and diffusion of microgrid
applications. In networks operating without storage, the operation of their systems is greatly …

Learning paradigm based on jumping genes: A general framework for enhancing exploration in evolutionary multiobjective optimization

K Li, S Kwong, R Wang, KS Tang, KF Man - Information Sciences, 2013 - Elsevier
Exploration and exploitation are two cornerstones of evolutionary multiobjective
optimization. Most of the existing works pay more attention to the exploitation, which mainly …

Handbook of memetic algorithms

CC Ferrante Neri, P Moscato - Studies in Computational Intelligence …, 2011 - Springer
Memetic Algorithms (MAs) are computational intelligence structures combining multiple and
various operators in order to address optimization problems. The diversity in the operator …

An r-dominance-based preference multi-objective optimization for many-objective optimization

R Liu, X Song, L Fang, L Jiao - Soft Computing, 2017 - Springer
Evolutionary multi-objective optimization (EMO) algorithms have been used in finding a
representative set of Pareto-optimal solutions in the past decade and beyond. However …

Adjust-free adversarial example generation in speech recognition using evolutionary multi-objective optimization under black-box condition

S Ishida, S Ono - Artificial Life and Robotics, 2021 - Springer
This paper proposes a black-box adversarial attack method to automatic speech recognition
systems. Some studies have attempted to attack neural networks for speech recognition; …

Two efficient real-coded genetic algorithms for real parameter optimization

ZQ Chen, RL Wang - … Journal of Innovative Computing, Information and …, 2011 - ijicic.org
This paper presents an efficient generation alternation model for real-coded genetic
algorithm called rc-CGA. The most important characteristic of the proposed rc-CGA model is …

[PDF][PDF] Constraint-chromosome genetic algorithm for flexible manufacturing system machine-loading problem

UK Yusof, R Budiarto, S Deris - International Journal of Innovative …, 2012 - researchgate.net
Manufacturing industries are facing a rapidly changing market environment characterized by
product competitiveness, short product life cycles, and increased product varieties. This …

[PDF][PDF] A matching approach for one-shot multi-attribute exchanges with incomplete weight information in E-brokerage

ZZ Jiang, ZP Fan, CQ Tan, Y Yuan - International Journal of Innovative …, 2011 - ijicic.org
Electronic brokerages (E-brokerages) are Internet-based organizations that enable buyers
and sellers to do business with each other. While E-brokerage has become a significant …