COMPUTING TWO LINCHPINS OF TOPOLOGICAL DEGREE BY A NOVEL DIFFERENTIAL EVOLUTION ALGORITHM

Author(s):  
FEI GAO ◽  
HENG-QING TONG

How to detect the topological degree (TD) of a function is of vital importance in investigating the existence and the number of zero values in the function, which is a topic of major significance in the theory of nonlinear scientific fields. Usually a sufficient refinement of the boundary of the polyhedron decided by Boult and Sikorski algorithm (BS) is needed as prerequisite when the well known method of Stenger and Kearfott is chosen for computing TD. However two linchpins are indispensable to BS, the parameter δ on the boundary of the polyhedron and an estimation of the Lipschitz constant K of the function, whose computations are analytically difficult. In this paper, through an appropriate scheme that transforms the problems of computing δ and K into searching optimums of two non-differentiable functions, a novel differential evolution algorithm (DE) combined with established techniques is proposed as an alternative method to computing δ and K. Firstly it uses uniform design method to generate the initial population in feasible field so as to have the property of large scale convergence, without better approximation of the unknown parameter as iterative initial point. Secondly, it restrains the normal DE's local convergence limitation virtually through deflection and stretching of objective function. The main advantages of the put algorithm are its simplicity and its ability to work by using function values solely. Finally, details of applying the proposed method into computing δ and K are given, and experimental results on two benchmark problems in contrast to the results reported have demonstrated the promising performance of the proposed algorithm in different scenarios.

2011 ◽  
Vol 110-116 ◽  
pp. 5048-5056 ◽  
Author(s):  
Fei Gao ◽  
Yi Bo Qi ◽  
Qiang Yin ◽  
Jia Qing Xiao

In this paper, a novel scheme is propose to solve the problems in chaos control via a nonnegative multi–modal nonlinear optimization, which finds the unstable periodic orbits and best parameters of chaos system such that the objective function is minimized. The novel scheme embeds with a differential evolution algorithm consisting of techniques in three aspects: uniform design to the initial population, deflection and stretching to the objective functions, and the region zooming self–adaptively, which result in a much more effective searching mechanism with fine equilibrium between exploitation and exploration. To exhibit the new scheme’s performance, the experiments done to Hénon, Chen and Lü system are given, and the simulations done show that the method has better adaptability, dependability and robustness.


2015 ◽  
Vol 2015 ◽  
pp. 1-36 ◽  
Author(s):  
Wei Li ◽  
Lei Wang ◽  
Quanzhu Yao ◽  
Qiaoyong Jiang ◽  
Lei Yu ◽  
...  

We propose a new optimization algorithm inspired by the formation and change of the cloud in nature, referred to as Cloud Particles Differential Evolution (CPDE) algorithm. The cloud is assumed to have three states in the proposed algorithm. Gaseous state represents the global exploration. Liquid state represents the intermediate process from the global exploration to the local exploitation. Solid state represents the local exploitation. The best solution found so far acts as a nucleus. In gaseous state, the nucleus leads the population to explore by condensation operation. In liquid state, cloud particles carry out macrolocal exploitation by liquefaction operation. A new mutation strategy called cloud differential mutation is introduced in order to solve a problem that the misleading effect of a nucleus may cause the premature convergence. In solid state, cloud particles carry out microlocal exploitation by solidification operation. The effectiveness of the algorithm is validated upon different benchmark problems. The results have been compared with eight well-known optimization algorithms. The statistical analysis on performance evaluation of the different algorithms on 10 benchmark functions and CEC2013 problems indicates that CPDE attains good performance.


Author(s):  
Vinícius Veloso de Melo ◽  
Danilo Vasconcellos Vargas ◽  
Marcio Kassouf Crocomo

This paper presents a new technique for optimizing binary problems with building blocks. The authors have developed a different approach to existing Estimation of Distribution Algorithms (EDAs). Our technique, called Phylogenetic Differential Evolution (PhyDE), combines the Phylogenetic Algorithm and the Differential Evolution Algorithm. The first one is employed to identify the building blocks and to generate metavariables. The second one is used to find the best instance of each metavariable. In contrast to existing EDAs that identify the related variables at each iteration, the presented technique finds the related variables only once at the beginning of the algorithm, and not through the generations. This paper shows that the proposed technique is more efficient than the well known EDA called Extended Compact Genetic Algorithm (ECGA), especially for large-scale systems which are commonly found in real world problems.


Author(s):  
Wentie Wu ◽  
Shengchao Xu

In view of the fact that the existing intrusion detection system (IDS) based on clustering algorithm cannot adapt to the large-scale growth of system logs, a K-mediods clustering intrusion detection algorithm based on differential evolution suitable for cloud computing environment is proposed. First, the differential evolution algorithm is combined with the K-mediods clustering algorithm in order to use the powerful global search capability of the differential evolution algorithm to improve the convergence efficiency of large-scale data sample clustering. Second, in order to further improve the optimization ability of clustering, a dynamic Gemini population scheme was adopted to improve the differential evolution algorithm, thereby maintaining the diversity of the population while improving the problem of being easily trapped into a local optimum. Finally, in the intrusion detection processing of big data, the optimized clustering algorithm is designed in parallel under the Hadoop Map Reduce framework. Simulation experiments were performed in the open source cloud computing framework Hadoop cluster environment. Experimental results show that the overall detection effect of the proposed algorithm is significantly better than the existing intrusion detection algorithms.


Sign in / Sign up

Export Citation Format

Share Document