Evolutionary Technique for Network Routing
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 11
Abstract
Applying mathematics to a problem of the real world mostly means, at first, modeling the problem mathematically, maybe with hard restrictions, idealizations, or simplifications, then solving the mathematical problem, and finally drawing conclusions about the real problem based on the solutions of the mathematical problem. Since about 60 years, a shift of paradigms has taken place in some sense; the opposite way has come into fashion. The point is that the world has done well even in times when nothing about mathematical modeling was known. The one of the alternate ways is evolutionary computation, which encompasses three main components- Evolution strategies, Genetic Algorithms and Evolution programs. One such alternative is to use a GA-based routing algorithm. GA may be used for optimization of searching process for optimum path routing in a network for optimization of both the distance and the congestion problem in a network. The proposed GA structure for the problem at hand is encoded in Matlab.
Authors and Affiliations
Yogita Bhalla, Mr. Chirag
Modified Hill Cipher Based Image Encryption Technique
In the present advancing technology, data transmission of different multimedia like sensitive images, video, text is very important and security plays a dominant role in the fields of medical, commercial and military fi...
slugAdvanced Optimize Adaptive Filter Design
An adaptive filter is a filter containing coefficients that are updated by some type of adaptive algorithm to improve or somehow optimize the filter’s response to a desired performance criterion. Hence, the process not...
Adaptive Facial Detection & Recognition Algorithm for Partially Occlude Images
In the present study we present an innovative approach towards countering the problem of partial occlusion in face recognition scenario. The partial occlusion can be caused by various objects such as scarfs, sunglasses...
Eaack Based Intrusion Detection Technique for Manet’s
The defection to wireless technology from wired technology has been a global shift in the past few decades. The open system and remote distribution of nodes make MANET endangered to intruders. An emerging technique EAAC...
Experimental Investigation Of Heat Transfer In Heat Exchanger Using Different Geometry Of Inserts – A Review
Heat transfer enhancement techniques are used to increase the rate of heat transfer forthfor developing efficient heat transfer enhancement devices with several designs in order to enhance the turbulence, enhance the fr...