• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Bi Xiaojun, Wang Jue, Li Bo, Li Jicheng. An ε Constrained Biogeography-Based Optimization with Dynamic Migration[J]. Journal of Computer Research and Development, 2014, 51(3): 580-589.
Citation: Bi Xiaojun, Wang Jue, Li Bo, Li Jicheng. An ε Constrained Biogeography-Based Optimization with Dynamic Migration[J]. Journal of Computer Research and Development, 2014, 51(3): 580-589.

An ε Constrained Biogeography-Based Optimization with Dynamic Migration

More Information
  • Published Date: March 14, 2014
  • A new ε constrained biogeography-based optimization with dynamic migration, εBBO-dm, is proposed to solve constrained optimization problems. In the proposed algorithm, the ε constrained method is utilized to handle the constraints. According to the constraint violation of the colony, the ε level is set to utilize the useful information for the better infeasible individual sufficiently and to improve the search efficiency for the feasible space. Simultaneously, based on the feature of ε constrained method, a new ordering rule based on ε constrained is used to obtain the immigration rate and the emigration rate, which can dynamically balance the relation between the feasible individuals and the infeasible individuals. Additionally, a new dynamic migration strategy is shown to enhance the search ability of the migration mechanism. Eventually, with the purpose of improving the precision of convergence, the piecewise logistic chaotic map is introduced to improve the variation mechanism. Numerical experiments on 13 well-known benchmark test functions show that εBBO-dm is competitive with other optimization algorithms on the accuracy and the speed of convergence, especially when being applied to solve complex single-objective COPs.
  • Related Articles

    [1]Gao Wei, Chen Liqun, Tang Chunming, Zhang Guoyan, Li Fei. One-Time Chameleon Hash Function and Its Application in Redactable Blockchain[J]. Journal of Computer Research and Development, 2021, 58(10): 2310-2318. DOI: 10.7544/issn1000-1239.2021.20210653
    [2]Wu Linyang, Luo Rong, Guo Xueting, Guo Qi. Partitioning Acceleration Between CPU and DRAM: A Case Study on Accelerating Hash Joins in the Big Data Era[J]. Journal of Computer Research and Development, 2018, 55(2): 289-304. DOI: 10.7544/issn1000-1239.2018.20170842
    [3]Li Fei, Gao Wei, Wang Guilin, Xie Dongqing, Tang Chunming. Generic Tightly Secure Signature Schemes from Strong Chameleon Hash Functions[J]. Journal of Computer Research and Development, 2017, 54(10): 2244-2254. DOI: 10.7544/issn1000-1239.2017.20170422
    [4]WuTao, JinJianguo, WeiMingjun. A Hash Function Algorithm Based on Variable Parameter Cascade Chaos[J]. Journal of Computer Research and Development, 2016, 53(3): 674-681. DOI: 10.7544/issn1000-1239.2016.20148155
    [5]Gao Shujing, Qu Yingjie, Song Tingqiang. Pseudorandom Number Generators Based on One-Way Functions[J]. Journal of Computer Research and Development, 2015, 52(6): 1394-1399. DOI: 10.7544/issn1000-1239.2015.20131954
    [6]Yuan Xinpan, Long Jun, Zhang Zuping, Luo Yueyi, Zhang Hao, and Gui Weihua. Connected Bit Minwise Hashing[J]. Journal of Computer Research and Development, 2013, 50(4): 883-890.
    [7]Qin Chuan, Chang Chin Chen, Guo Cheng. Perceptual Robust Image Hashing Scheme Based on Secret Sharing[J]. Journal of Computer Research and Development, 2012, 49(8): 1690-1698.
    [8]Xu Jian, Zhou Fucai, Yang Muzhou, Li Fuxiang, Zhu Zhiliang. Hierarchical Hash List for Distributed Query Authentication[J]. Journal of Computer Research and Development, 2012, 49(7): 1533-1544.
    [9]Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.
    [10]Liu Ji. One-Way Hash Function based on Integer Coupled Tent Maps and Its Performance Analysis[J]. Journal of Computer Research and Development, 2008, 45(3): 563-569.

Catalog

    Article views (735) PDF downloads (704) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return