2019
DOI: 10.1088/1742-6596/1333/3/032056
|View full text |Cite
|
Sign up to set email alerts
|

Solution of task on the minimum cost data flow based on bionic algorithm

Abstract: The paper presents the solution of task on the minimum cost data flow in static and dynamic setting based on evolutionary algorithms. The distinctive feature of the algorithm is the use of joint evolution, choice of evolution models (use of micro-, macro- and metaevolutions), adjustment to external environment, hierarchical management of genetic and evolutionary search, local search of solutions and application of all modified genetic operators based on evolutionary strategy and search methods. The paper illus… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…There should be considered the problem how to find the optimal flow of the minimum cost of the transport network, which is an essential direction in the research of artificial intelligence systems [2].…”
Section: Methodsmentioning
confidence: 99%
“…There should be considered the problem how to find the optimal flow of the minimum cost of the transport network, which is an essential direction in the research of artificial intelligence systems [2].…”
Section: Methodsmentioning
confidence: 99%
“…As indicators of the effectiveness of functioning, we choose the following:  probability of timely transmission of messages ℎ( );  average message transmission time ̅ ;  the probability of sending messages in a time not more than specified ( ̅ ≤ ′ ). To assess the impact results, we apply the method of stochastic network analysis [6][7][8][9]. Suppose there is a radio line that provides information transfer and reception of confirmations.…”
Section: Methodsmentioning
confidence: 99%
“…Internal network activity is also reduced. The protocol works with three authentication checks [9,17]:…”
Section: Compatibilitymentioning
confidence: 99%