• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Peng Hu, Wu Zhijian, Zhou Xinyu, Deng Changshou. Bare-Bones Differential Evolution Algorithm Based on Trigonometry[J]. Journal of Computer Research and Development, 2015, 52(12): 2776-2788. DOI: 10.7544/issn1000-1239.2015.20140230
Citation: Peng Hu, Wu Zhijian, Zhou Xinyu, Deng Changshou. Bare-Bones Differential Evolution Algorithm Based on Trigonometry[J]. Journal of Computer Research and Development, 2015, 52(12): 2776-2788. DOI: 10.7544/issn1000-1239.2015.20140230

Bare-Bones Differential Evolution Algorithm Based on Trigonometry

More Information
  • Published Date: November 30, 2015
  • DE algorithm is one of the most popular and powerful evolutionary algorithms for global optimization problems. However, the performance of DE is greatly influenced by the selected suitable mutation strategy and parameter settings, but this choosing task is a challenge work and time-consuming. In order to solve this defect, a novel bare-bones differential evolution algorithm based on trigonometry, called tBBDE, is proposed in this paper. The convergence performance of the algorithm is then analyzed in terms of the stochastic functional theory. In the paper the proposed algorithm adopts the triangle Gaussian mutation strategy as well as ternary crossover and adaptive crossover probability strategy for individual update. When the algorithm is trapped into premature convergence and stagnation, it will execute population disturbance. In this case, the proposed algorithm not only inherits the advantages of bare-bones algorithm but also retains the characteristics of DE evolution based on the differential information of randomly selected individuals. The experimental studies have been conducted on 26 benchmark functions including unimodal, multimodal, shifted and high-dimensional test functions, while the results have verified the effectiveness and reliability. Besides, comparied with the other bare-bones algorithms and the state-of-the-art, DE variants has proved that the algorithm is a type of new competitive algorithm.
  • Related Articles

    [1]Liu Yongzhi, Qin Guiyun, Liu Pengtao, Hu Chengyu, Guo Shanqing. Provably Secure Public Key Authenticated Encryption with Keyword Search Based on SGX[J]. Journal of Computer Research and Development, 2023, 60(12): 2709-2724. DOI: 10.7544/issn1000-1239.202220478
    [2]Wang Houzhen, Qin Wanying, Liu Qin, Yu Chunwu, Shen Zhidong. Identity Based Group Key Distribution Scheme[J]. Journal of Computer Research and Development, 2023, 60(10): 2203-2217. DOI: 10.7544/issn1000-1239.202330457
    [3]Li Zichen, Xie Ting, Zhang Juanmei, Xu Ronghua. Post Quantum Authenticated Key Exchange Protocol Based on Ring Learning with Errors Problem[J]. Journal of Computer Research and Development, 2019, 56(12): 2694-2701. DOI: 10.7544/issn1000-1239.2019.20180874
    [4]Yang Yatao, Zhang Yaze, Li Zichen, Zhang Fengjuan, Liu Boya. RAKA: New Authenticated Key Agreement Protocol Based on Ring-LWE[J]. Journal of Computer Research and Development, 2017, 54(10): 2187-2192. DOI: 10.7544/issn1000-1239.2017.20170477
    [5]Yang Xiaoyan, Hou Mengbo, Wei Xiaochao. Verifier-Based Three-Party Password Authenticated Key Exchange Protocol[J]. Journal of Computer Research and Development, 2016, 53(10): 2230-2238. DOI: 10.7544/issn1000-1239.2016.20160463
    [6]Wen Weiqiang, Wang Libin. A Strongly Secure Lattice-Based Key Exchange Protocol[J]. Journal of Computer Research and Development, 2015, 52(10): 2258-2269. DOI: 10.7544/issn1000-1239.2015.20150518
    [7]Sun Yu, Han Qingtong, and Liu Jianwei. Design of Key Exchange Protocol Based on Short Group Signature[J]. Journal of Computer Research and Development, 2012, 49(12): 2619-2622.
    [8]Gao Haiying. Provable Secure ID-Based Authenticated Key Agreement Protocol[J]. Journal of Computer Research and Development, 2012, 49(8): 1685-1689.
    [9]Pan Jiaxin and Wang Libin. A Modular Approach Towards Design and Analysis of Authenticated Key Exchange Protocol Based on Extended Canetti-Krawczyk Model[J]. Journal of Computer Research and Development, 2011, 48(8): 1390-1399.
    [10]Ren Yongjun, Wang Jiandong, Wang Jian, Xu Dazhuan, and Zhuang Yi. Identity-Based Authenticated Key Agreement Protocols in the Standard Model[J]. Journal of Computer Research and Development, 2010, 47(9): 1604-1610.

Catalog

    Article views (1351) PDF downloads (852) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return