In this paper, we construct an evolutionary algorithm. It yields good performance on a collection of elliptic parameter identification problems. The evolutionary algorithm has a good tolerability for the noise in the ...
详细信息
ISBN:
(纸本)0780385152
In this paper, we construct an evolutionary algorithm. It yields good performance on a collection of elliptic parameter identification problems. The evolutionary algorithm has a good tolerability for the noise in the observed data. Even when the noise level is up to 10%, we can also get such a good result. The result of numerical experiments shows explicitly that the algorithm is very fit for solving this kind of inverse problem but not very sensitive to the noise.
Dynamic optimisation problems are becoming increasingly important; meanwhile, progress in optimisation techniques and in computational resources are permitting the development of effective systems for dynamic optimisa...
详细信息
Dynamic optimisation problems are becoming increasingly important; meanwhile, progress in optimisation techniques and in computational resources are permitting the development of effective systems for dynamic optimisation, resulting in a need for objective methods to evaluate and compare different techniques. The search for effective techniques may be seen as a multi-objective problem, trading off time complexity against effectiveness; hence benchmarks must be able to compare techniques across the Pareto front, not merely at a single point. We propose benchmarks for the dynamic travelling salesman problem, adapted from the CHN-144 benchmark of 144 Chinese cities for the static travelling salesman problem. We provide an example of the use of the benchmark, and illustrate the information that can be gleaned from analysis of the algorithm performance on the benchmarks.
Presented herein is an efficient simulation technique enabling systematic investigation of the soft programming over-erased flash EEPROM cells. The simulation provides a method by which to find the optimal soft progra...
详细信息
The computer defense immune system (GDIS) is an artificial immune system for detecting computer viruses and network intrusions. We present a simple chromosome-based evaluation model for GDIS. In this model, the genoty...
详细信息
A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can generate dynamically the best algorithm of generating primes in RSA cryptography under diffe...
详细信息
A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can generate dynamically the best algorithm of generating primes in RSA cryptography under different conditions. Taking into account the factors of time, space and security integrated, this scheme possessed strong practicability. The paper also proposed a model of multi-degree parallel evolutionary algorithm to evaluate synthetically the efficiency and security of the public key cryptography. The model contributes to designing public key cryptography system too.
Multi-objective Evolutionary Algorithm (MOEA) is becoming a hot research area and quite a few aspects of MOEAs have been studied and discussed. However there are still few literatures discussing the roles of search an...
详细信息
Multi-objective Evolutionary Algorithm (MOEA) is becoming a hot research area and quite a few aspects of MOEAs have been studied and discussed. However there are still few literatures discussing the roles of search and selection operators in MOEAs. This paper studied their roles by solving a case of discrete Multi-objective Optimization Problem (MOP): Multi-objective TSP with a new MOEA. In the new MOEA, We adopt an efficient search operator, which has the properties of both crossover and mutation, to generate the new individuals and chose two selection operators: Family Competition and Population Competition with probabilities to realize selection. The simulation experiments showed that this new MOEA could get good uniform solutions representing the Pareto Front and outperformed SPEA in almost every simulation run on this problem. Furthermore, we analyzed its convergence property using finite Markov chain and proved that it could converge to Pareto Front with probability 1. We also find that the convergence property of MOEAs has much relationship with search and selection operators.
The computer defense immune system (GDIS) is an artificial immune system for detecting computer viruses and network intrusions. We present a simple chromosome-based evaluation model for GDIS. In this model, the genoty...
详细信息
The computer defense immune system (GDIS) is an artificial immune system for detecting computer viruses and network intrusions. We present a simple chromosome-based evaluation model for GDIS. In this model, the genotype space is a linear number sequence, and a digital pattern sequence is produced as the phenotype space using a number of mechanisms, including pattern mining and genetic algorithms. We present a range of experiment analyses to show the higher efficiency and stronger immunity of this model, improving the rate of successful prediction in intrusion detection in GDIS. The detectors generated may have higher coverage, hence would impose lower communications and computational loads on systems in which they were incorporated.
This paper presents a new approach to handle constrained optimization using evolutionary algorithms. The new technique converts constrained optimization to a two-objective optimization: one is the original objective f...
详细信息
ISBN:
(纸本)0780378040
This paper presents a new approach to handle constrained optimization using evolutionary algorithms. The new technique converts constrained optimization to a two-objective optimization: one is the original objective function, the other is the degree function violating the constraints. By using Pareto-dominance in the multi-objective optimization, individual's Pareto strength is defined. Based on Pareto strength and minimal generation gap (MGG) model, a new real-coded genetic algorithm is designed. The new approach is compared with some other evolutionary optimization techniques on several benchmark functions. The results show that the new approach outperforms those existing techniques in feasibility, effectiveness and generality. Especially for some complicated optimization problems with inequality and equality constraints, the proposed method provides better numerical accuracy.
Instance-based learning faces the problem of deciding which instances could be discarded in order to save computation and storage costs. For large instance bases classifier suffers from large memory requirements and s...
详细信息
ISBN:
(纸本)0780378652
Instance-based learning faces the problem of deciding which instances could be discarded in order to save computation and storage costs. For large instance bases classifier suffers from large memory requirements and slow response. And present noisy instances may deteriorate the classification accuracy. This paper analyzes the strength and weakness of some of the existing algorithms for instance pruning, and propose an improved method C-Pruner. Experiments over real-world datasets verify C-pruner's superior to the existing methods in classification accuracy.
Much research has been done mainly in testcase generation and its effect for com-binatorial design approach for testing. This letter presents an algorithm for fault diagnosis basedon the approach. It can conclude that...
详细信息
Much research has been done mainly in testcase generation and its effect for com-binatorial design approach for testing. This letter presents an algorithm for fault diagnosis basedon the approach. It can conclude that the factors, which cause errors, must be in a very smallrange through analyzing the test cases after testing, and retesting with some complementary testcases. The algorithm can provide a very efficient and valuable guidance for the debugging andtesting of software.
暂无评论