The particle swarm optimization(PSO)algorithm is an established nature-inspired population-based meta-heuristic that replicates the synchronizing movements of birds and sh.PSO is essentially an unconstrained algorithm...The particle swarm optimization(PSO)algorithm is an established nature-inspired population-based meta-heuristic that replicates the synchronizing movements of birds and sh.PSO is essentially an unconstrained algorithm and requires constraint handling techniques(CHTs)to solve constrained optimization problems(COPs).For this purpose,we integrate two CHTs,the superiority of feasibility(SF)and the violation constraint-handling(VCH),with a PSO.These CHTs distinguish feasible solutions from infeasible ones.Moreover,in SF,the selection of infeasible solutions is based on their degree of constraint violations,whereas in VCH,the number of constraint violations by an infeasible solution is of more importance.Therefore,a PSO is adapted for constrained optimization,yielding two constrained variants,denoted SF-PSO and VCH-PSO.Both SF-PSO and VCH-PSO are evaluated with respect to ve engineering problems:the Himmelblau’s nonlinear optimization,the welded beam design,the spring design,the pressure vessel design,and the three-bar truss design.The simulation results show that both algorithms are consistent in terms of their solutions to these problems,including their different available versions.Comparison of the SF-PSO and the VCHPSO with other existing algorithms on the tested problems shows that the proposed algorithms have lower computational cost in terms of the number of function evaluations used.We also report our disagreement with some unjust comparisons made by other researchers regarding the tested problems and their different variants.展开更多
With high nutrition and health value,blueberry receives much concern in recent years. Blueberry experts in the world are cultivating new blueberry varieties. They have come up with constructive theoretical support and...With high nutrition and health value,blueberry receives much concern in recent years. Blueberry experts in the world are cultivating new blueberry varieties. They have come up with constructive theoretical support and planting technology researches and are constantly devoted to expanding blueberry planting latitudes. This paper elaborated researches of blueberry at home and abroad,current development situation of blueberry in China and Guangdong Province,analyzed strengths of planting blueberry in Guangdong. Besides,it came up with recommendations for development of blueberry industry. Finally,it discussed development prospects of blueberry planting in Guangdong.展开更多
Taking Tropical Crops Genetic Resources Institute( TCGRI) of Chinese Academy of Tropical Agricultural Sciences( CATAS) as an example,this paper discussed current situation of construction of sci-tech platform,analyzed...Taking Tropical Crops Genetic Resources Institute( TCGRI) of Chinese Academy of Tropical Agricultural Sciences( CATAS) as an example,this paper discussed current situation of construction of sci-tech platform,analyzed existing problems,and finally came up with pertinent recommendations.展开更多
Wireless sensor networks are a favorite target of Byzantine malicious attackers because of their limited energy, low calculation capability, and dynamic topology, and other important characteristics. The Byzantine Gen...Wireless sensor networks are a favorite target of Byzantine malicious attackers because of their limited energy, low calculation capability, and dynamic topology, and other important characteristics. The Byzantine Generals Problem is one of the classical problems in the area of fault tolerance, and has wide application, especially in distributed databases and systems. There is a lot of research in agreement and replication techniques that tolerate Byzantine faults. However, most of this work is not suited to large-scale wireless sensor networks, due to its high computational complexity. By introducing Fast ECDSA(Elliptic Curve Digital Signature Algorithm), which can resist timing and energy attacks, and reduce the proportion of verifying signature algorithm to generating signature algorithm to 1.2 times, we propose a new Byzantine fault-tolerant routing algorithm for large-scale wireless sensor networks with double-level hierarchical architecture. In different levels, the algorithm runs different BFT protocols.Theory and simulation results have proved that this algorithm has high security and the number of communication rounds between clusters is reduced by 1/3, which balances the network load. At the same time, the application of Fast ECDSA improves the security level of the network without burdening it.展开更多
基金The authors thank the Higher Education Commission,Pakistan,for supporting this research under the project NRPU-8925(M.A.J.and H.U.K.),https://www.hec.gowpk/。
文摘The particle swarm optimization(PSO)algorithm is an established nature-inspired population-based meta-heuristic that replicates the synchronizing movements of birds and sh.PSO is essentially an unconstrained algorithm and requires constraint handling techniques(CHTs)to solve constrained optimization problems(COPs).For this purpose,we integrate two CHTs,the superiority of feasibility(SF)and the violation constraint-handling(VCH),with a PSO.These CHTs distinguish feasible solutions from infeasible ones.Moreover,in SF,the selection of infeasible solutions is based on their degree of constraint violations,whereas in VCH,the number of constraint violations by an infeasible solution is of more importance.Therefore,a PSO is adapted for constrained optimization,yielding two constrained variants,denoted SF-PSO and VCH-PSO.Both SF-PSO and VCH-PSO are evaluated with respect to ve engineering problems:the Himmelblau’s nonlinear optimization,the welded beam design,the spring design,the pressure vessel design,and the three-bar truss design.The simulation results show that both algorithms are consistent in terms of their solutions to these problems,including their different available versions.Comparison of the SF-PSO and the VCHPSO with other existing algorithms on the tested problems shows that the proposed algorithms have lower computational cost in terms of the number of function evaluations used.We also report our disagreement with some unjust comparisons made by other researchers regarding the tested problems and their different variants.
基金Supported by National Science and Technology Project of the Ministry of Science and Technology in the Twelfth Five-Year Plan Period(2012BAD22B0504)Special Project on the Integration of Industry,Education and Research of Guangdong Province(2013B090200065)Science and Technology Planning Project of Guangdong Province(2012B050500009)
文摘With high nutrition and health value,blueberry receives much concern in recent years. Blueberry experts in the world are cultivating new blueberry varieties. They have come up with constructive theoretical support and planting technology researches and are constantly devoted to expanding blueberry planting latitudes. This paper elaborated researches of blueberry at home and abroad,current development situation of blueberry in China and Guangdong Province,analyzed strengths of planting blueberry in Guangdong. Besides,it came up with recommendations for development of blueberry industry. Finally,it discussed development prospects of blueberry planting in Guangdong.
基金Supported by Fund on Basic Scientific Research Project of Nonprofit Central Research Institutions(1630032014023)
文摘Taking Tropical Crops Genetic Resources Institute( TCGRI) of Chinese Academy of Tropical Agricultural Sciences( CATAS) as an example,this paper discussed current situation of construction of sci-tech platform,analyzed existing problems,and finally came up with pertinent recommendations.
基金supported by the National Natural Science Foundation of China (Nos. 61332019, 61572304, 61272056, and 60970006)the Innovation Grant of Shanghai Municipal Education Commission (No. 14ZZ089)Shanghai Key Laboratory of Specialty Fiber Optics and Optical Access Networks (No. SKLSFO2014-06)
文摘Wireless sensor networks are a favorite target of Byzantine malicious attackers because of their limited energy, low calculation capability, and dynamic topology, and other important characteristics. The Byzantine Generals Problem is one of the classical problems in the area of fault tolerance, and has wide application, especially in distributed databases and systems. There is a lot of research in agreement and replication techniques that tolerate Byzantine faults. However, most of this work is not suited to large-scale wireless sensor networks, due to its high computational complexity. By introducing Fast ECDSA(Elliptic Curve Digital Signature Algorithm), which can resist timing and energy attacks, and reduce the proportion of verifying signature algorithm to generating signature algorithm to 1.2 times, we propose a new Byzantine fault-tolerant routing algorithm for large-scale wireless sensor networks with double-level hierarchical architecture. In different levels, the algorithm runs different BFT protocols.Theory and simulation results have proved that this algorithm has high security and the number of communication rounds between clusters is reduced by 1/3, which balances the network load. At the same time, the application of Fast ECDSA improves the security level of the network without burdening it.