Designing a suitable objective function is an essential step in successfully applying an evolutionary algorithm to a problem. In this study we apply a grammar-based Genetic Programming algorithm called Grammatical Evolution ...
We study the semilinear elliptic system... where Ω⊂R^N(N≥1) is a smooth and bounded domain, p,q,r,s>0. Under suitable ranges of exponents we obtain various results regarding the well posedness of our system.
A simple and efficient one-step procedure is described for the synthesis of a number of symmetrical 1,4-disubstituted piperazine-2,5-diones under phase transfer conditions. The reactions are carried out at
room temperature, ...
Let LN+1 be a linear differential operator of order N + 1 with constant coefficients
and real eigenvalues λ 1, ..., λ N+1, let E( N+1) be the space of all C∞-solutions of
LN+1 on the real line.We show that for N 2 and ...
The dynamics of non-divergent flow on a rotating sphere are described by the conservation of absolute vorticity. The
analytical study of the non-linear barotropic vorticity equation is greatly facilitated by the expansion ...
Balado, Félix(SPIE--The International Society for Optical Engineering, 2010-01)
A number of methods have been proposed over the last decade for embedding information within deoxyribonucleic acid (DNA). Since a DNA sequence is conceptually equivalent to a unidimensional digital signal, DNA data embedding ...
We prove analogues of the fundamental theorem of K -theory for the second and the third homology of SL2 over an infinite field. The statements of the theorems involve Milnor–Witt K -theory and refined scissors congruence ...
We consider a problem of mixed Cauchy type for certain holomorphic partial differential
operators with the principal part Q2p(D) essentially being the (complex) Laplace operator to
a power, Δp. We provide inital data on ...
The so-called real-time web (RTW) is a web of opinions, comments, and personal viewpoints, often expressed in the form of short, 140-character text messages providing abbreviated and personalized commentary in real-time. ...
Communication protocols for wireless sensor networks
reduce the energy consumption by duty cycling the node
activity and adopting a periodic sleeping scheduling. This
approach often results in idle listening and therefore ...
A bounded linear operator T on a Banach space X is called an (m, p)-isometry if it satisfies the equation TeX , for all TeX . In this paper we study the structure which underlies the second parameter of (m, p)-isometric ...
This paper firstly gives a brief overview of information embedding in deoxyribonucleic acid (DNA) sequences and its applications. DNA data embedding can be considered as a particular case of communications with or without ...
In privacy-preserving data publishing, approaches using Value Generalization Hierarchies (VGHs) form an important class of anonymization algorithms. VGHs play a key role in the utility of published datasets as they dictate ...
Stock photo libraries are the most common means for publishers and advertisers to find images for their media. Searching for the
perfect photo can be a time-consuming and frustrating task. This is because searching is ...
Standards and engineering codes rule design, construction and operation of chemical plant equipments to ensure reliability and safety. In this paper, we exploit knowledge-based methodologies and technologies to guarantee ...
Pervasive systems present the need to interpret large quantities of data from many sources. Context models support developers working with such data by providing a shared representation of the environment on which to base ...
In this work we propose that the high volumes of data on real-time networks like Twitter can be harnessed as a useful source of recommendation knowledge. We describe Buzzer, a news recommendation system that is capable of ...
It is approximately 50 years since the first computational experiments were conducted in what has become known today as the field of Genetic Programming (GP), twenty years since John Koza named and popularised the method, ...
Conventional Kelvin probe force microscopy (KPFM) relies on
closed loop (CL) bias feedback for the determination of surface
potential (SP). However, SP measured by CL-KPFM has been shown to be
strongly influenced by ...