包裹 发表于 2025-3-30 11:35:52
http://reply.papertrans.cn/47/4649/464869/464869_51.pngfatuity 发表于 2025-3-30 15:44:36
http://reply.papertrans.cn/47/4649/464869/464869_52.png步兵 发表于 2025-3-30 19:00:24
Memetic Algorithm for a University Course Timetabling Problem,. This paper applies Memetic algorithms - a hybrid evolutionary method to a real-world university timetabling problem in Vietnam. Memetic algorithm and genetic algorithm are both experimentally tested on six real-world instances and obtained results show that memetic algorithm could speed up the con传染 发表于 2025-3-30 23:48:27
http://reply.papertrans.cn/47/4649/464869/464869_54.png敲竹杠 发表于 2025-3-31 03:15:09
Step by Step Modeling and Tuning for Fuzzy Logic Controller,tead of systematically designed using trail and error method guided by designers experience on fuzzy control. The contribution of this paper is to propose a systematic with step by step methodology on how to design fuzzy PID fuzzy controller and to find the effect of tuning of many parameters (e.g.,移植 发表于 2025-3-31 06:26:10
http://reply.papertrans.cn/47/4649/464869/464869_56.pngnautical 发表于 2025-3-31 12:53:07
http://reply.papertrans.cn/47/4649/464869/464869_57.pngLAPSE 发表于 2025-3-31 15:46:31
A Security Risk Model Using Game Theory,mal pure strategy can be found by expected effectiveness. However, if those frequencies are unknown, the optimal strategy is a mixed strategy provided by game theory. The problem can also be solved by linear programming method.铺子 发表于 2025-3-31 19:04:44
http://reply.papertrans.cn/47/4649/464869/464869_59.png使尴尬 发表于 2025-3-31 22:31:01
,The Further Decomposition of Actuarial Notation’s Expression on Credibility Space,life insurance actuarial notation about life distribution function and gives the value determinative conditions only by the life distribution function to determine, based on the basic properties of credibility distribution, through decomposing and discussing of every portion of the expression and se