期刊文献+

禁忌免疫网络算法及其在函数优化中的应用 被引量:2

Application of a Tabu immune network algorithm in function optimizations
下载PDF
导出
摘要 基于人工免疫网络算法(aiNet),借鉴禁忌搜索算法的机制,提出一种禁忌人工免疫网络算法(TS-aiNet).在算法中引入禁忌表,禁忌那些在网络迭代中亲和度不再增加的细胞,并通过特赦准则赦免一些被禁忌的优良状态,增加一个记忆表,用于保存成熟的记忆细胞,改进了高斯变异方式,以保证多样化的有效搜索.通过对多个典型系统仿真分析该方法的收敛性,并与克隆选择算法和aiNet算法进行比较分析.结果表明,该算法在多模态搜索空间中具有更好的全局收敛性、稳定性和寻找极值点能力,能够克服早熟现象,是一种有效的全局优化搜索方法. A Tabu search artificial immune algorithm (TS-aiNet) was developed based on the aiNet and Tabu search algorithms. It introduces a taboo list of cells whose affinities are to no longer increase in network iterations, and releases some excellent tabooed cells in line with amnesty criteria. A memory table is added to store mature memory cells. Moreover, expressions of Gaussian mutation for a diversity search in the process of global optimization were improved. Convergence analysis was performed with some typical systems and comparison was made with KLONALG and aiNet algorithms. The simulation results showed that the approach presented has better global convergent ability and stability in multi-modal search space, and can avoid prematurity effectively. So it is a global optimization algorithm with good feasibility and high efficiency.
出处 《智能系统学报》 2008年第5期393-400,共8页 CAAI Transactions on Intelligent Systems
基金 国家自然科学基金资助项目(60573016) 北京市教委重点学科共建资助项目(XK100080537)
关键词 人工免疫系统 人工免疫网络算法 禁忌搜索算法 优化 artificial immune system artificial immune network algorithm Tabu search algorithm optimization
  • 相关文献

参考文献2

二级参考文献6

  • 1陈灏珠.实用内科学[M].北京:人民卫生出版社,1987..
  • 2梁瑞鑫 郑德玲.免疫遗传算法在高炉焦比目标优化中的应用[A]..第21届中国控会议论文集[C].杭州:浙江大学出版社,2002..
  • 3陈国良,遗传算法及其应用,1996年,5页
  • 4梁瑞鑫 郑德玲.免疫遗传算法在高炉焦比目标优化中的应用[A]..第21届中国控会议论文集[C].杭州:浙江大学出版社,2002..
  • 5丁永生,任立红.人工免疫系统:理论与应用[J].模式识别与人工智能,2000,13(1):52-59. 被引量:98
  • 6梁瑞鑫,郑德玲.基于区间套混沌搜索的混合优化方法[J].北京科技大学学报,2002,24(3):342-344. 被引量:12

共引文献53

同被引文献17

  • 1彭宏,王军.基于支持向量机的病毒程序检测方法[J].电子学报,2005,33(2):276-278. 被引量:4
  • 2BIRBIL S I, FANG S C. An electromagnetism-like mechanism for global optimization[ J]. Journal of Global Optimization, 2003, 23 (3) : 263-282.
  • 3BIRBIL S L, FANG S C, SHEU R L. On the convergence of a population-based global optimization algorithm [ J ]. Journal of Global Optimization, 2004, 30(2) : 301-318.
  • 4WANG Xiaojuan, GAO Liang, ZHANG Chaoyong. Electromagnetism-like mechanism based algorithm for neural network training [ J ]. Lecture Notes in Computer Science, 2008, 5227: 45-47.
  • 5DIETER D, De REYCK B, LEUS R, et al. A hybrid scatter search/electromagnetism meta-heuristic for project scheduling[J]. European Journal of Operational Research, 2006, 169(2) : 638-653.
  • 6YAO Xin, LIU Yong, LIN Guangming. Evolutionary programming made faster[ J]. IEEE Transactions on Evolutionary Computation, 1999, 3(2) : 82-102.
  • 7Matthew G S,Eleazer E,Erez Z. Data mining methods for detection of new malicious executables[A].Oakland,CA:IEEE,2001.1207-1217.
  • 8Fabio A.G,Juan C G,Diego A R. A neuro-immune mode for discriminating and visualizing anomalies[J].{H}NATURAL COMPUTING,2006,(03):285-304.
  • 9Kim J,Bentley P J,Aickelin U. Immune system approaches to intrusion detection--a review[J].{H}NATURAL COMPUTING,2009,(04):413-466.
  • 10Ya He,Liang Yiwen,Li Tao. A model of collaborative artificial immune system[A].Piscataway,NJ:IEEE Computer Society,2010.101-104.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部