Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Multi-objective robust optimization design of blood supply chain network based on improved whale optimization algorithm
DONG Hai, WU Yao, QI Xinna
Journal of Computer Applications    2021, 41 (10): 3063-3069.   DOI: 10.11772/j.issn.1001-9081.2020111729
Abstract238)      PDF (615KB)(240)       Save
In order to solve the uncertainty problem of blood supply chain network design, a multi-objective robust optimization design model of blood supply chain network was established. Firstly, for the blood supply chain network with five nodes, an optimization function considering safe stock, minimum cost and shortest storage time was established, and the ε-constraint, Pareto optimization and robust optimization method were used to deal with the established model, so that the multi-objective problem was transformed into a single objective robust problem. Secondly, by improving the original Whale Optimization Algorithm (WOA), the concept of crossover and mutation of the differential algorithm was introduced to WOA to enhance the search ability and improve the limitations, so as to obtain the Differential WOA (DWOA), which was used to solve the processed model. Finally, a numerical example verified that the shortage of the robust model is 76% less than that of the deterministic model when the test problems are the same. Therefore, the optimization robust model has more advantages in dealing with demand shortage. Compared with WOA, Particle Swarm Optimization (PSO) and Genetic Algorithm (GA), DWOA has shorter interruption time and lower cost.
Reference | Related Articles | Metrics
Emotional bacterial foraging algorithm based on non-uniform elimination-diffusion probability distribution
DONG Hai, QI Xinna
Journal of Computer Applications    2020, 40 (6): 1731-1737.   DOI: 10.11772/j.issn.1001-9081.2019101725
Abstract311)      PDF (632KB)(262)       Save
In view of the uncertainty of chemotaxis step length and the lack of constancy of elimination diffusion probability in the optimization process of traditional bacterial foraging algorithm, in order to solve the problem of high-dimensional engineering optimization, an emotional bacteria foraging algorithm based on non-uniform elimination-diffusion probability was proposed. Firstly, in the chemotaxis step, the Gus distribution search mechanism was used to update the bacteria individual positions, so as to solve the problem of poor search ability and easy to fall into local optimum caused by bacteria swimming or flipping on each dimension in a random way. The emotion perception factor was introduced, and the sudden change of emotional intelligence was used to realize the adaptive chemotaxis step size, so as to avoid premature convergence of the algorithm. Secondly, in view of the probability constancy of bacterial individuals in the process of elimination-diffusion, the idea of using linear and non-linear probability distributions to replace the traditional constant distribution to realize non-uniform distribution was proposed. By introducing the random value of dynamic factor, the bacterial individuals in the undefined search space were limited, so as to save the calculation cost of the algorithm. Six benchmark functions were used in the test, and the test results show that: in the case of low calculation cost, except on Rosenbrock function, the proposed algorithm has low iteration times and good optimization quality on all functions, and the algorithm convergence comparison results show that the proposed algorithm has good convergence.
Reference | Related Articles | Metrics
Credibility analysis method of online user behavior based on non-interference theory
DONG Haiyan, YU Feng, CHENG Ke, HUANG Shucheng
Journal of Computer Applications    2019, 39 (10): 3002-3006.   DOI: 10.11772/j.issn.1001-9081.2019040660
Abstract340)      PDF (863KB)(236)       Save
Focusing on the difficulty in monitoring and judging the credibility of user behaviors in online applications and the problem of weak theorey of user behavior credibility analysis, a credibility analysis method of online user behavior was proposed based on non-interference theory. Firstly, the static credibility of single behavior was defined from three aspects-the behavioral entity identity, state and environment of the single behavior, and the static credibility verification strategy was given. Thereafter, dynamic behavioral credibility was defined from the perspectives of execution process and result, and dynamic credibility verification strategy was given. Finally, the user behavior process was constructed based on the single behavior, and the credibility determination theorem of user behavior process was proposed based on the idea of credibility extension, and the theorem was proved by using non-interference theory. The correctness and validity of the proposed method were verified by the provement process and result.
Reference | Related Articles | Metrics
Efficient plaintext gathering method for data protected by SSL/TLS protocol in network auditing
DONG Haitao, TIAN Jing, YANG Jun, YE Xiaozhou, SONG Lei
Journal of Computer Applications    2015, 35 (10): 2891-2895.   DOI: 10.11772/j.issn.1001-9081.2015.10.2891
Abstract355)      PDF (827KB)(429)       Save
In order to solve the problem of auditing the data protected by Secure Sockets Layer/Transport Layer Security (SSL/TLS) protocol on the Internet, a plaintext gathering method for network data protected by SSL/TLS protocol based on the principles of man-in-the-middle was proposed. A data gatherer was connected between the server and the client in series, which was able to get the encryption key by modifying handshake messages during SSL/TLS handshake, so as to decrypt the secure data and then gather its plaintext. Compared with the existing gathering method based on the principles of proxy server, the proposed method has a shorter transmission delay, a larger SSL throughput and a smaller memory occupation. Compared with the existing gathering method in which the gatherer possesses the server's private key, the proposed method has a wider application scope, and also has the advantage of being unaffected by packet losses on the Internet. The experimental results show that the proposed method has a decrease in transmission delay of about 27.5% and an increase in SSL throughput of about 10.4% compared with the method based on the principles of proxy server. The experimental results also show that the SSL throughput of the proposed method approaches the ideal maximum value.
Reference | Related Articles | Metrics