2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications 2007
DOI: 10.1109/idaacs.2007.4488498
|View full text |Cite
|
Sign up to set email alerts
|

Genetic Algorithm Implementation for Perimeter Security Systems CAD

Abstract: This paper discusses the use of genetic algorithms (GA) in a perimeter security CAD system (PSCAD). In this paper we compare the performance of a PSCAD system that uses exhaustive search for optimization with one that uses a genetic algorithm.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…To solve the task (3) -(5) it is possible to use the methods of combinatorics optimization, that were used for the task in the determined form [1] taking into consideration (4), (5) using the developed genetic algorithm.…”
Section: Implementation Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…To solve the task (3) -(5) it is possible to use the methods of combinatorics optimization, that were used for the task in the determined form [1] taking into consideration (4), (5) using the developed genetic algorithm.…”
Section: Implementation Methodsmentioning
confidence: 99%
“…The alarm system structure optimization methods were developed in previous work [1] and backgrounds of unidentified influence of the climatic conditions on the detectors' work [2], [3] were presented.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation