Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (9): 2547-2551.DOI: 10.11772/j.issn.1001-9081.2014.09.2547
• Artificial intelligence • Previous Articles Next Articles
Received:
2014-04-01
Revised:
2014-06-13
Online:
2014-09-30
Published:
2014-09-01
Contact:
XU Yulong
许玉龙1,2,方建安2,张晗3,王晓鹏4
通讯作者:
许玉龙
基金资助:
上海市基础研究重点项目;上海市教委科研创新重点项目;河南省基础与前沿技术计划研究项目;河南中医学院苗圃项目
CLC Number:
许玉龙 方建安 张晗 王晓鹏. 基于非支配解排序的快速多目标微分进化算法[J]. 计算机应用, 2014, 34(9): 2547-2551.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2014.09.2547
[1]DEB K. Multi-objective optimization using evolutionary algorithms [M]. San Francisco: John Wiley & Sons, 2001: 13-40.
[2]DEB K, PRATAP A, AGARWAL S, et al.A fast and elitist multiobjective genetic algorithm: NSGA-Ⅱ [J]. IEEE Transactions on Evolutionary Computation, 2002, 6(2):182-197.
[3]ZITZLER E, THIELE L. Multiobjective evolutionary algorithms: a comparative case study and the strength Pareto approach [J]. IEEE Transactions on Evolutionary Computation, 1999, 3(4):257-271.
[4]ZITZLER E, LAUMANNS M, THIELE L. SPEA2: Improving the strength Pareto evolutionary algorithm [C]// EUROGEN 2001: Proceedings of the Evolutionary Methods for Design, Optimization and Control with Applications to Industrial Problems. Barcelona: CIMNE, 2002: 95-100.
[5]XIE T, CHEN H, KANG L. Evolutionary algorithms of multi-objective optimization problems [J]. Chinese Journal of Computers, 2003, 26(8): 997-1003. (谢涛,陈火旺,康立山.多目标优化的演化算法[J].计算机学报, 2003, 26(8): 997-1003.)
[6]CUI X. LI M, FANG T. A multi-objective concordance evolutionary algorithm [J]. Chinese Journal of Computers, 2001, 24(9):979-984. (崔逊学,李淼,方廷健. 多目标协调进化算法研究[J]. 计算机学报, 2001, 24(9): 979-984.)
[7]GONG M, JIAO L, YANG D, et al.Research on evolutionary multi-objective optimization algorithms [J]. Journal of Software, 2009, 20(2): 271-289. (公茂果,焦李成,杨咚咚,等.进化多目标优化算法研究[J]. 软件学报,2009,20(2):271-289.)
[8]GENG H, GAO J, JIA T, et al.Multi-objective particle swarm optimization method with balanced diversity and convergence [J]. Journal of Computer Applications, 2013, 33(7): 1926-1929. (耿焕同, 高军, 贾婷婷, 等.均衡分布性和收敛性的多目标粒子群优化方法[J].计算机应用,2013,33(7):1926-1929)
[9]DAS S, SUGANTHAN P N. Differential evolution: a survey of the state-of-the-art [J]. IEEE Transactions on Evolutionary Computation, 2011, 15(1): 4-31.
[10]ABBASS H A, SARKER R A. The Pareto differential evolution algorithm [J]. International Journal on Artificial Intelligence Tools, 2002, 11(4): 531-552.
[11]YANG G Y, DONG Z Y, WONG K P. A modified differential evolution algorithm with fitness sharing for power system planning [J]. IEEE Transactions on Power Systems, 2008, 23(2): 514-522.
[12]XUE F, SANDERSON A C, GRAVES R J. Modeling and convergence analysis of a continuous multiobjective algorithm [C]// CEC 2005: Proceedings of the 2005 IEEE Congress on Evolutionary Computation. Piscataway: IEEE, 2005, 1: 228-235.
[13]ROBIC T, FILIPIC B. DEMO: Differential evolution for multiobjective optimization [C]// EMO 2005: Proceedings of 3rd International Conference on Evolutionary Multi-Criterion Optimization, LNCS 3410. Berlin: Springer-Verlag, 2005: 520-533. |
[1] | ZONG Xuejun, HAN Bing, WANG Guogang, NING Bowei, HE Kan, LIAN Lian. TDRFuzzer: fuzzy testing method for industrial control protocols based on adaptive dynamic interval strategy [J]. Journal of Computer Applications, 0, (): 0-0. |
[2] | Ming ZHANG, Le FU, Haifeng WANG. Relay control model for concurrent data flow in edge computing [J]. Journal of Computer Applications, 2024, 44(12): 3876-3883. |
[3] | . Survey of DNS tunneling detection technology research [J]. Journal of Computer Applications, 0, (): 0-0. |
[4] | . Large scale IoT binary component identification based on named entity recognition [J]. Journal of Computer Applications, 0, (): 0-0. |
[5] | Yixi LIU, Jun HE, Bo WU, Bingtong LIU, Ziyu LI. Survey of software security testing techniques in DevSecOps [J]. Journal of Computer Applications, 2024, 44(11): 3470-3478. |
[6] | Chuanlin PANG, Rui TANG, Ruizhi ZHANG, Chuan LIU, Jia LIU, Shibo YUE. Distributed power allocation algorithm based on graph convolutional network for D2D communication systems [J]. Journal of Computer Applications, 2024, 44(9): 2855-2862. |
[7] | Jiepo FANG, Chongben TAO. Hybrid internet of vehicles intrusion detection system for zero-day attacks [J]. Journal of Computer Applications, 2024, 44(9): 2763-2769. |
[8] | ZHANG Yiming, CAO Tengfei. Federated Learning Optimization Algorithm based on Local Drift and Diversity Computing Power [J]. Journal of Computer Applications, 0, (): 0-0. |
[9] | Hang XU, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU. Coverage-guided fuzzing based on adaptive sensitive region mutation [J]. Journal of Computer Applications, 2024, 44(8): 2528-2535. |
[10] | Hong CHEN, Bing QI, Haibo JIN, Cong WU, Li’ang ZHANG. Class-imbalanced traffic abnormal detection based on 1D-CNN and BiGRU [J]. Journal of Computer Applications, 2024, 44(8): 2493-2499. |
[11] |
GENG Haijun, DONG Yun, HU Zhiguo, CHI Haotian, YANG Jing, YIN Xia.
Encrypted traffic classification method based on Attention-1DCNN-CE#br#
#br#
[J]. Journal of Computer Applications, 0, (): 0-0.
|
[12] | . Summary of network intrusion detection systems based on deep learning [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | CHEN Ruilong, HU Tao, BU Youjun, YI Peng, HU Xianjun, QIAO Wei. Stacking ensemble adversarial defense method for encrypted malicious traffic detection model [J]. Journal of Computer Applications, 0, (): 0-0. |
[14] | Zhongdai WU, Dezhi HAN, Haibao JIANG, Cheng FENG, Bing HAN, Chongqing CHEN. Review of marine ship communication cybersecurity [J]. Journal of Computer Applications, 2024, 44(7): 2123-2136. |
[15] | Zihao YAO, Yuanming LI, Ziqiang MA, Yang LI, Lianggen WEI. Multi-object cache side-channel attack detection model based on machine learning [J]. Journal of Computer Applications, 2024, 44(6): 1862-1871. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||