2021
DOI: 10.1051/e3sconf/202125806052
|View full text |Cite
|
Sign up to set email alerts
|

The algorithm development based on the immune search for solving unclear problems to detect the optical flow with minimal cost

Abstract: The main aim of the research is the development of effective methods and algorithms based on the hybrid principles functioning of the immune system and evolutionary search to determine a global optimal solution to optimisation problems. Artificial immune algorithms are characterised as diverse ones, extremely reliable and implicitly parallel. The integration of modified evolutionary algorithms and immune algorithms is proposed to be used for the solution of above problem. There is no exact method for the effic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…we will assume the retention of elements with high convergence from groups of clones and the rejection of the remaining cloned individuals [15]. Cloning suppression involves the selection of elements with high convergence from a time set that is composed of parent elements and groups of clones that have a convergence higher than the parent elements and are not in the parent population [16].…”
Section: The Main Partmentioning
confidence: 99%
“…we will assume the retention of elements with high convergence from groups of clones and the rejection of the remaining cloned individuals [15]. Cloning suppression involves the selection of elements with high convergence from a time set that is composed of parent elements and groups of clones that have a convergence higher than the parent elements and are not in the parent population [16].…”
Section: The Main Partmentioning
confidence: 99%
“…Among the advantages of this protocol is its independence from the protocol of an applied nature. HTTP, FTP, TELNET can be superimposed on top of the protocol in question [5]. At the same time, the transparency of the system will be preserved, in other words, this protocol will coordinate the encryption algorithm and the key, perform authentication of the server before transmitting or accepting the first byte of information [6].…”
Section: Introductionmentioning
confidence: 99%
“…Among the advantages of this protocol is its independence from the application layer protocol. HTTP, FTP, and TELNET can be overlaid on top of the protocol in question [7]. In this event, system transparency will be preserved.…”
Section: Introductionmentioning
confidence: 99%