期刊文献+

云遗传算法及其应用 被引量:84

Cloud Model Based Genetic Algorithm and Its Applications
下载PDF
导出
摘要 传统遗传算法搜索速度慢,容易陷入局部最优解.借鉴遗传算法(GA)的思想,利用正态云模型云滴的随机性和稳定倾向性特点,提出一种新的遗传算法—云遗传算法(CGA).CGA由正态云模型的Y条件云发生器实现交叉操作,基本云发生器实现变异操作.最后,进行了函数优化实验和IIR数字滤波器优化设计,并与标准GA、NQGA、CAGA和LARES等算法进行比较,证明了该算法的有效性,具有一定的参考和应用价值. Traditional genetic algorithm (GA) easily gets stuck at a local optimum,and often has slow convergent speed.As a novel genetic algorithm,cloud-model-based genetic algorithm (CGA) was originally proposed. CGA is based on both the idea of GA and the properties of randomness and stable tendency of a normal cloud model.In this algorithm, a Y-conditional normal Cloud generator is used as the cross operator of GA, and a basic normal cloud generator is used as the mutation operator. Finally, the experiments of function optimization and ⅡR digital filter design were conducted to compare CGA with standard GA, NQGA, CAGA and LARES.From the simulation results,it is believed that CGA is effective and will become a promising candidate of evolutionary algorithms.
出处 《电子学报》 EI CAS CSCD 北大核心 2007年第7期1419-1424,共6页 Acta Electronica Sinica
基金 西南交通大学博士生创新基金(No.2007-3)
关键词 遗传算法 云模型 云遗传算法 函数优化 ⅡR滤波器设计 genetic algorithm cloud model cloud genetic algorithm function opfimization IIR digital filter design
  • 相关文献

参考文献14

二级参考文献29

  • 1李德毅,刘常昱.论正态云模型的普适性[J].中国工程科学,2004,6(8):28-34. 被引量:897
  • 2李德毅.发现状态空间理论[J].小型微型计算机系统,1994,15(11):1-6. 被引量:25
  • 3李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1246
  • 4张飞舟 沈程智 等.拟人控制倒立摆机理的的探讨.第二届全球华人智能控制与智能控制自动化论文集[M].西安:交通大学出版社,1997.8-13.
  • 5张飞舟.拟人控制倒立摆系统的性能分析与测试:学位论文[M].北京:北京航空航天大学,1997..
  • 6周宁.[D].通信工程学院,2000.
  • 7周宁.[D].通信工程学院,2000.
  • 8Frank J.Artificial Intelligence and Intrusion Detection:Current and future directions[C].In:Proceedings of the 17th National Computer Security Conference, 1994-10.
  • 9Helman P,Bhangoo J.A statistically base system for prioritizing information exploration under uncertainty[J].IEEE Transactions on Systems, Man and Cybernetics, Part A : Systems and Humans, 1997 ; 27 : 449-466.
  • 10Ghost A,Schwartzbard A.A study in using neural networks for an- omaly and misuse detection[C].In:Proceedings of the Eighth USENIX Security Symposium, 1999.

共引文献1589

同被引文献727

引证文献84

二级引证文献677

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部