Presented herein is an efficient simulation technique enabling systematic investigation of the soft programming over-erased flash EEPROM cells. The simulation provides a method by which to find the optimal soft progra...
详细信息
The computer defense immune system (GDIS) is an artificial immune system for detecting computer viruses and network intrusions. We present a simple chromosome-based evaluation model for GDIS. In this model, the genoty...
详细信息
A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can generate dynamically the best algorithm of generating primes in RSA cryptography under diffe...
详细信息
A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can generate dynamically the best algorithm of generating primes in RSA cryptography under different conditions. Taking into account the factors of time, space and security integrated, this scheme possessed strong practicability. The paper also proposed a model of multi-degree parallel evolutionary algorithm to evaluate synthetically the efficiency and security of the public key cryptography. The model contributes to designing public key cryptography system too.
Multi-objective Evolutionary Algorithm (MOEA) is becoming a hot research area and quite a few aspects of MOEAs have been studied and discussed. However there are still few literatures discussing the roles of search an...
详细信息
Multi-objective Evolutionary Algorithm (MOEA) is becoming a hot research area and quite a few aspects of MOEAs have been studied and discussed. However there are still few literatures discussing the roles of search and selection operators in MOEAs. This paper studied their roles by solving a case of discrete Multi-objective Optimization Problem (MOP): Multi-objective TSP with a new MOEA. In the new MOEA, We adopt an efficient search operator, which has the properties of both crossover and mutation, to generate the new individuals and chose two selection operators: Family Competition and Population Competition with probabilities to realize selection. The simulation experiments showed that this new MOEA could get good uniform solutions representing the Pareto Front and outperformed SPEA in almost every simulation run on this problem. Furthermore, we analyzed its convergence property using finite Markov chain and proved that it could converge to Pareto Front with probability 1. We also find that the convergence property of MOEAs has much relationship with search and selection operators.
The computer defense immune system (GDIS) is an artificial immune system for detecting computer viruses and network intrusions. We present a simple chromosome-based evaluation model for GDIS. In this model, the genoty...
详细信息
The computer defense immune system (GDIS) is an artificial immune system for detecting computer viruses and network intrusions. We present a simple chromosome-based evaluation model for GDIS. In this model, the genotype space is a linear number sequence, and a digital pattern sequence is produced as the phenotype space using a number of mechanisms, including pattern mining and genetic algorithms. We present a range of experiment analyses to show the higher efficiency and stronger immunity of this model, improving the rate of successful prediction in intrusion detection in GDIS. The detectors generated may have higher coverage, hence would impose lower communications and computational loads on systems in which they were incorporated.
This paper presents a new approach to handle constrained optimization using evolutionary algorithms. The new technique converts constrained optimization to a two-objective optimization: one is the original objective f...
详细信息
ISBN:
(纸本)0780378040
This paper presents a new approach to handle constrained optimization using evolutionary algorithms. The new technique converts constrained optimization to a two-objective optimization: one is the original objective function, the other is the degree function violating the constraints. By using Pareto-dominance in the multi-objective optimization, individual's Pareto strength is defined. Based on Pareto strength and minimal generation gap (MGG) model, a new real-coded genetic algorithm is designed. The new approach is compared with some other evolutionary optimization techniques on several benchmark functions. The results show that the new approach outperforms those existing techniques in feasibility, effectiveness and generality. Especially for some complicated optimization problems with inequality and equality constraints, the proposed method provides better numerical accuracy.
Instance-based learning faces the problem of deciding which instances could be discarded in order to save computation and storage costs. For large instance bases classifier suffers from large memory requirements and s...
详细信息
ISBN:
(纸本)0780378652
Instance-based learning faces the problem of deciding which instances could be discarded in order to save computation and storage costs. For large instance bases classifier suffers from large memory requirements and slow response. And present noisy instances may deteriorate the classification accuracy. This paper analyzes the strength and weakness of some of the existing algorithms for instance pruning, and propose an improved method C-Pruner. Experiments over real-world datasets verify C-pruner's superior to the existing methods in classification accuracy.
Much research has been done mainly in testcase generation and its effect for com-binatorial design approach for testing. This letter presents an algorithm for fault diagnosis basedon the approach. It can conclude that...
详细信息
Much research has been done mainly in testcase generation and its effect for com-binatorial design approach for testing. This letter presents an algorithm for fault diagnosis basedon the approach. It can conclude that the factors, which cause errors, must be in a very smallrange through analyzing the test cases after testing, and retesting with some complementary testcases. The algorithm can provide a very efficient and valuable guidance for the debugging andtesting of software.
Coverage analysis is a structural testing technique that helps to eliminate gaps in atest suite and determines when to stop testing. To compute test coverage, this letter proposes anew concept coverage about variables...
详细信息
Coverage analysis is a structural testing technique that helps to eliminate gaps in atest suite and determines when to stop testing. To compute test coverage, this letter proposes anew concept coverage about variables, based on program slicing. By adding powers accordingto their importance, the users can focus on the important variables to obtain higher test *** letter presents methods to compute basic coverage based on program structure graphs. Inmost cases, the coverage obtained in the letter is bigger than that obtained by a traditionalmeasure, because the coverage about a variable takes only the related codes into account.
To provide system designer a valid measure to evaluate the structure complexityof class diagrams objectively, this letter first proposes a method to transform a class diagramsinto a weighted class dependence graph, th...
详细信息
To provide system designer a valid measure to evaluate the structure complexityof class diagrams objectively, this letter first proposes a method to transform a class diagramsinto a weighted class dependence graph, then presents a structure complexity measure for classdiagrams based on entropy distance.
暂无评论