• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Bi Xiaojun, Zhang Lei, Xiao Jing. Constrained Multi-Objective Optimization Algorithm Based on Dual Populations[J]. Journal of Computer Research and Development, 2015, 52(12): 2813-2823. DOI: 10.7544/issn1000-1239.2015.20148025
Citation: Bi Xiaojun, Zhang Lei, Xiao Jing. Constrained Multi-Objective Optimization Algorithm Based on Dual Populations[J]. Journal of Computer Research and Development, 2015, 52(12): 2813-2823. DOI: 10.7544/issn1000-1239.2015.20148025

Constrained Multi-Objective Optimization Algorithm Based on Dual Populations

More Information
  • Published Date: November 30, 2015
  • In order to improve the distribution and convergence of constrained multi-objective optimization algorithms, this paper proposes a constrained multi-objective optimization algorithm based on dual populations. The improved Harmonic distance eliminates the effect of the individuals whose Pareto grade is weak and distance is far, consequently the distribution of population can be enhanced. Also it reduces the amount of calculation effectively and improves the efficiency of the suggested algorithm. Then, the new update method of the infeasible solution set is closely linked with the feasible solution set, and these infeasible individuals both the objective function value and the constraint violation are excellent can be retained, so the better feasible individuals will be produced in the following evolution process, and the diversity of the populations and the search efficiency are improved simultaneously. Finally, the new variation strategy makes full use of the information of the best feasible individuals and the good infeasible individuals, which ensures the good ability of exploration and exploitation and balances the global and local search. The proposed algorithm is compared with 3 state-of-the-art constrained multi-objective optimization algorithms on CTP test problems. Simulation results show that the presented algorithm has certain advantages than other algorithms because it can ensure good convergence while it has uniform distribution.
  • Related Articles

    [1]Xiong Xin, Tan Xin, Zhang Yuan. Kernel Refcount Bug Detection Based on the Consistency of Error Path Behavior[J]. Journal of Computer Research and Development, 2023, 60(7): 1489-1500. DOI: 10.7544/issn1000-1239.202220768
    [2]Zhao Xiaolei, Chen Zhaoyun, Shi Yang, Wen Mei, Zhang Chunyuan. Kernel Code Automatic Generation Framework on FT-Matrix[J]. Journal of Computer Research and Development, 2023, 60(6): 1232-1245. DOI: 10.7544/issn1000-1239.202330058
    [3]Hou Pengpeng, Zhang Heng, Wu Yanjun, Yu Jiageng, Tai Yang, Miao Yuxia. Kernel Configuration Infographic Based on Multi-Label and Its Application[J]. Journal of Computer Research and Development, 2021, 58(3): 651-667. DOI: 10.7544/issn1000-1239.2021.20200186
    [4]Yang Hongzhang, Yang Yahui, Tu Yaofeng, Sun Guangyu, Wu Zhonghai. Proactive Fault Tolerance Based on “Collection—Prediction—Migration—Feedback” Mechanism[J]. Journal of Computer Research and Development, 2020, 57(2): 306-317. DOI: 10.7544/issn1000-1239.2020.20190549
    [5]Zhang Liancheng, Wei Qiang, Tang Xiucun, Fang Jiabao. Path and Port Address Hopping Based SDN Proactive Defense Technology[J]. Journal of Computer Research and Development, 2017, 54(12): 2761-2771. DOI: 10.7544/issn1000-1239.2017.20160461
    [6]Yang Bo, Feng Dengguo, Qin Yu, Zhang Qianying, Xi Li, Zheng Changwen. Research on Direct Anonymous Attestation Scheme Based on Trusted Mobile Platform[J]. Journal of Computer Research and Development, 2014, 51(7): 1436-1445.
    [7]Tan Liang, Meng Weiming, Zhou Mingtian. An Improved Direct Anonymous Attestation Scheme[J]. Journal of Computer Research and Development, 2014, 51(2): 334-343.
    [8]Wang Yong, Fang Juan, Ren Xingtian, and Lin Li. Formal Verification of TCG Remote Attestation Protocols Based on Process Algebra[J]. Journal of Computer Research and Development, 2013, 50(2): 325-331.
    [9]Wang Qi'an and Chen Bing. Intrusion Detection System Using CVM Algorithm with Extensive Kernel Methods[J]. Journal of Computer Research and Development, 2012, 49(5): 974-982.
    [10]Huang Wei, Zhan Jianfeng, Fan Jianpin. DCFT-Kernel: A Fault-Tolerant Cluster Middleware Based on Group Service[J]. Journal of Computer Research and Development, 2005, 42(6): 993-999.

Catalog

    Article views (1356) PDF downloads (1040) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return