BEACON is a consortium of
- BEACON 2021 Annual Report
- BEACON 2020 Annual Report
- BEACON 2019 Annual Report
- BEACON 2018 Annual Report
- BEACON 2017 Annual Report
- BEACON 2016 Annual Report
- BEACON 2015 Annual Report
- BEACON 2014 Annual Report
- BEACON 2013 Annual Report
- BEACON 2012 Annual Report
- BEACON 2011 Annual Report
- BEACON 2010 Annual Report
- Strategic Plan (Updated November 2018)
Member Resources
animal behavior antibiotic resistance Avida bacteria BEACON Researchers at Work big data bioinformatics Biological Evolution communication Computer Science Cooperation development Digital Evolution diversity Drosophila E. coli ecology Education Engineering Evolution 101 evolutionary algorithms Evolutionary Applications Evolutionary Computation experimental evolution Field Biology fitness fitness landscapes genetic algorithms genetics genomics hyenas Kellogg Biological Station long term evolution experiment mate choice mutations Outreach phylogenetics plant biology predator-prey Research Experiences for Undergraduates sexual selection speciation Synthetic biology video Viruses
Tag Archives: Evolutionary Applications
BEACON Researchers at Work: Improving Biometric Security with Evolutionary Algorithms
This week’s BEACON Researchers at Work post is by North Carolina A&T State University graduate student Aniesha Alford. We all remember the events that occurred on September 11, 2001. I was a sophomore in high school, and I can still … Continue reading
BEACON Researchers at Work: Evolving Robotic Fish
This week’s BEACON Researchers at Work post is by MSU graduate student Jianxun Wang. Have you ever imagined that you could swim with robotic fish someday? This may happen in the near future. More surprisingly, these robots would be capable … Continue reading
BEACON Researchers at Work: Preventing accidents with evolutionary computation
This week’s BEACON Researchers at Work post is by MSU graduate student Andres Ramirez. Recently, I found myself driving on the wrong side of the road. No, I did not fall asleep. I drove through some parts of New Zealand, … Continue reading
BEACON Researchers at Work: Video game control with evolved neural networks
This week’s BEACON Researchers at Work blog post is by UT Austin graduate student Jacob Schrum. I often find myself running wildly through the darkened corridors of some decommissioned mining facility, rocket launcher in hand, leaping madly about the hostile … Continue reading
BEACON Researchers at Work: Using evolutionary computation to enhance breast tumor recognition in microwave images
This week’s BEACON Researchers at Work blog post is by MSU graduate student Blair D. Fleet. In 2010, I received my B.S. in Electrical Engineering from Morgan State University. During a college visit for graduate school, I became introduced to … Continue reading
BEACON research featured on Scientific American blog
NESCent‘s Robin Smith was a guest speaker at BEACON’s annual Congress in August. While she was here, Robin learned about all the great interdisciplinary BEACON projects involving Xiaobo Tan’s robotic fish. In landlocked East Lansing, Michigan, you’re unlikely to swim … Continue reading
BEACON Researchers at Work: Bidding Strategy in Learning Classifier Systems Using Loan and Niching GA
This week’s BEACON Researchers at Work post is by North Carolina A&T State University graduate student Abrham Workineh. Nature has given some degree of inherent intelligence to living things. One definition of intelligence is the ability to learn from experience, … Continue reading
BEACON Researchers at Work: Engineering solutions inspired by fish schooling
This week’s BEACON Researchers at Work blog post is by NC A&T graduate student Patrick Wanko. Consider today’s car, with its extensive sensors, diagnostics, processing and data storage, and communication capabilities. A far cry from the highly mechanized vehicles of … Continue reading
BEACON Researchers at Work: Facial recognition software improved by evolutionary computing
Here is the second installment of the new BEACON Researchers at Work series, from North Carolina A&T graduate student Joseph Shelton. Biometric security systems use biometric identification to determine whether or not an individual is allowed access to a resource … Continue reading