• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yang Liping, Huang Houkuan. A Pareto Coevolutionary Algorithm Integrated with Dimension Extraction[J]. Journal of Computer Research and Development, 2010, 47(9): 1504-1513.
Citation: Yang Liping, Huang Houkuan. A Pareto Coevolutionary Algorithm Integrated with Dimension Extraction[J]. Journal of Computer Research and Development, 2010, 47(9): 1504-1513.

A Pareto Coevolutionary Algorithm Integrated with Dimension Extraction

More Information
  • Published Date: September 14, 2010
  • Coevolution offers an adaptive evaluation method for problems where performance can be measured using tests. How to ensure the reliability and efficiency of evaluation is a central challenge in coevolution research. Recent studies have shown that within coevolutionary problem domains[0], there exist a set of implicit dimensions that can structure the evolution information of problem domains, on which the performance of each individual can be accurately evaluated. Therefore, by means of dimension information of problems, reliable evaluation can in principle be provided using only a possible small subset of all tests. Based on the above studies, the characteristic outcome relationships between individuals possessed by dimension structures are first analyzed, and then an online dimension extraction approach based on the characteristic outcome relationships is proposed. Furthermore, a coevolutionary algorithm integrated with the dimension extraction approach is designed. The algorithm synchronously extracts the dimensions of the problem during execution and utilizes this information to provide accurate evaluation for individuals, and to guide selection and reservation so as to guarantee monotonic progress. Experimental results on abstract test problems demonstrate the feasibility of the proposed algorithm, and show that it outperforms other existing similar algorithms in both performance and accuracy of dimension extraction.
  • Related Articles

    [1]Ren Jiadong, Liu Xinqian, Wang Qian, He Haitao, Zhao Xiaolin. An Multi-Level Intrusion Detection Method Based on KNN Outlier Detection and Random Forests[J]. Journal of Computer Research and Development, 2019, 56(3): 566-575. DOI: 10.7544/issn1000-1239.2019.20180063
    [2]Liu Lu, Zuo Wanli, Peng Tao. Tensor Representation Based Dynamic Outlier Detection Method in Heterogeneous Network[J]. Journal of Computer Research and Development, 2016, 53(8): 1729-1739. DOI: 10.7544/issn1000-1239.2016.20160178
    [3]Zhao Xingwang, Liang Jiye. An Attribute Weighted Clustering Algorithm for Mixed Data Based on Information Entropy[J]. Journal of Computer Research and Development, 2016, 53(5): 1018-1028. DOI: 10.7544/issn1000-1239.2016.20150131
    [4]Huang Tianqiang, Yu Yangqiang, Guo Gongde, Qin Xiaolin. Trajectory Outlier Detection Based on Semi-Supervised Technology[J]. Journal of Computer Research and Development, 2011, 48(11): 2074-2082.
    [5]Zhang Jing, Sun Zhihui, Yang Ming, Ni Weiwei, Yang Yidong. Fast Incremental Outlier Mining Algorithm Based on Grid and Capacity[J]. Journal of Computer Research and Development, 2011, 48(5): 823-830.
    [6]Yu Hao, Wang Bin, Xiao Gang, Yang Xiaochun. Distance-Based Outlier Detection on Uncertain Data[J]. Journal of Computer Research and Development, 2010, 47(3): 474-484.
    [7]Ni Weiwei, Chen Geng, Lu Jieping, Wu Yingjie, Sun Zhihui. Local Entropy Based Weighted Subspace Outlier Mining Algorithm[J]. Journal of Computer Research and Development, 2008, 45(7): 1189-1194.
    [8]Jin Yifu, Zhu Qingsheng, Xing Yongkang. An Algorithm for Clustering of Outliers Based on Key Attribute Subspace[J]. Journal of Computer Research and Development, 2007, 44(4): 651-659.
    [9]Ni Weiwei, Lu Jieping, Chen Geng, and Sun Zhihui. An Efficient Data Stream Outliers Detection Algorithm Based on k-Means Partitioning[J]. Journal of Computer Research and Development, 2006, 43(9): 1639-1643.
    [10]Yang Yidong, Sun Zhihui, Zhang Jing. Finding Outliers in Distributed Data Streams Based on Kernel Density Estimation[J]. Journal of Computer Research and Development, 2005, 42(9): 1498-1504.

Catalog

    Article views (506) PDF downloads (489) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return