首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 360 毫秒
1.
Despite the significant number of benchmark problems for evolutionary multi-objective optimisation algorithms, there are few in the field of robust multi-objective optimisation. This paper investigates the characteristics of the existing robust multi-objective test problems and identifies the current gaps in the literature. It is observed that the majority of the current test problems suffer from simplicity, so five hindrances are introduced to resolve this issue: bias towards non-robust regions, deceptive global non-robust fronts, multiple non-robust fronts (multi-modal search space), non-improving (flat) search spaces, and different shapes for both robust and non-robust Pareto optimal fronts. A set of 12 test functions are proposed by the combination of hindrances as challenging test beds for robust multi-objective algorithms. The paper also considers the comparison of five robust multi-objective algorithms on the proposed test problems. The results show that the proposed test functions are able to provide very challenging test beds for effectively comparing robust multi-objective optimisation algorithms. Note that the source codes of the proposed test functions are publicly available at www.alimirjalili.com/RO.html.  相似文献   

2.
After combining the ν-Twin Support Vector Regression (ν-TWSVR) with the rough set theory, we propose an efficient Rough ν-Twin Support Vector Regression, called Rough ν-TWSVR for short. We construct a pair of optimization problems which are motivated by and mathematically derived from a related ν-TWSVR Rastogi et al. (Appl Intell 46(3):670–683 2017) and Rough ν-SVR Zhao et al. (Expert Syst Appl 36(6):9793–9798 2009). Rough ν-TWSVR not only utilizes more data information rather than the extreme data points in the ν-TWSVR, but also makes different points having different effects on the regressor depending on their positions. This method can implement the structural risk minimization and automatically control accuracies according to the structure of the data sets. In addition, the double ε s are utilized to construct the rough tube for upper(lower)-bound Rough ν-TWSVR instead of a single ε in the upper(lower)-bound ν-TWSVR. Moreover, This rough tube consisting of positive region, boundary region, and negative region yields the feasible set of the Rough ν-TWSVR larger than that of the ν-TWSVR, which makes the objective function of the Rough ν-TWSVR no more than that of ν-TWSVR. The Rough ν-TWSVR improves the generalization performance of the ν-TWSVR, especially for the data sets with outliers. Experimental results on toy examples and benchmark data sets confirm the validation and applicability of our proposed Rough ν-TWSVR.  相似文献   

3.
This paper proposes a novel quasi-oppositional chaotic antlion optimizer (ALO) (QOCALO) for solving global optimization problems. ALO is a population based algorithm motivated by the unique hunting behavior of antlions in nature and exhibits strong influence in solving global and engineering optimization problems. In the proposed QOCALO algorithm of the present work, the initial population is generated using the quasi-opposition based learning (QOBL) and the concept of QOBL based generation jumping is utilized inside the main searching strategy of the proposed algorithm. Utilization of QOBL ensures better convergence speed of the proposed algorithm and it also provides better exploration of the search space. Alongside the QOBL, a chaotic local search (CLS) is also incorporated in the proposed QOCALO algorithm. The CLS guides local search around the global best solution that provides better exploitation of the search space. Thus, a better trade-off between exploration and exploitation holds for the proposed algorithm which makes it robust. It is observed that the proposed algorithm offers better results than the original ALO in terms of solution quality and convergence speed. The proposed QOCALO algorithm is implemented and tested, successfully, on nineteen mathematical benchmark test functions of varying complexities and the experimental results are compared to those offered by the basic ALO and some other recently developed nature inspired algorithms. The efficacy of the proposed algorithm is further utilized to solve three real world engineering optimization problems viz. (a) the placement and sizing problem of distributed generators in radial distribution networks, (b) the congestion management problem in power transmission system and (c) the optimal design of pressure vessel.  相似文献   

4.
The key issue in top-k retrieval, finding a set of k documents (from a large document collection) that can best answer a user’s query, is to strike the optimal balance between relevance and diversity. In this paper, we study the top-k retrieval problem in the framework of facility location analysis and prove the submodularity of that objective function which provides a theoretical approximation guarantee of factor 1?\(\frac{1}{e}\) for the (best-first) greedy search algorithm. Furthermore, we propose a two-stage hybrid search strategy which first obtains a high-quality initial set of top-k documents via greedy search, and then refines that result set iteratively via local search. Experiments on two large TREC benchmark datasets show that our two-stage hybrid search strategy approach can supersede the existing ones effectively and efficiently.  相似文献   

5.
The algebraic immunity of a Boolean function is a parameter that characterizes the possibility to bound this function from above or below by a nonconstant Boolean function of a low algebraic degree. We obtain lower bounds on the algebraic immunity for a class of functions expressed through the inversion operation in the field GF(2 n ), as well as for larger classes of functions defined by their trace forms. In particular, for n ≥ 5, the algebraic immunity of the function Tr n (x ?1) has a lower bound ?2√n + 4? ? 4, which is close enough to the previously obtained upper bound ?√n? + ?n/?√n?? ? 2. We obtain a polynomial algorithm which, give a trace form of a Boolean function f, computes generating sets of functions of degree ≤ d for the following pair of spaces. Each function of the first (linear) space bounds f from below, and each function of the second (affine) space bounds f from above. Moreover, at the output of the algorithm, each function of a generating set is represented both as its trace form and as a polynomial of Boolean variables.  相似文献   

6.
This paper addresses the robust H static output feedback (SOF) controller design problem for a class of uncertain fuzzy affine systems that are robust against both the plant parameter perturbations and controller gain variations. More specifically, the purpose is to synthesize a non-fragile piecewise affine SOF controller guaranteeing the stability of the resulting closed-loop fuzzy affine dynamic system with certainH performance index. Based on piecewise quadratic Lyapunov functions and applying some convexification procedures, two different approaches are proposed to solve the robust and non-fragile piecewise affine SOF controller synthesis problem. It is shown that the piecewise affine controller gains can be obtained by solving a set of linear matrix inequalities (LMIs). Finally, simulation examples are given to illustrate the effectiveness of the proposed methods.  相似文献   

7.
Gravitational Search Algorithm (GSA) is a recent metaheuristic algorithm inspired by Newton’s law of gravity and law of motion. In this search process, position change is based on the calculation of step size which depends upon a constant namely, Gravitational Constant (G). G is an exponentially decreasing function throughout the search process. Further, in-spite of having different masses, the value of G remains same for each agent, which may cause inappropriate step size of agents for the next move, and thus leads the swarm toward stagnation or sometimes skipping the true optima. To overcome stagnation, we first propose a gravitational constant having different scaling characteristics for different phase of the search process. Secondly, a dynamic behavior is introduced in this proposed gravitational constant which varies according to the fitness of the agents. Due to this behavior, the gravitational constant will be different for every agent based on its fitness and thus will help in controlling the acceleration and step sizes of the agents which further improve exploration and exploitation of the solution search space. The proposed strategy is tested over 23 well-known classical benchmark functions and 11 shifted and biased benchmark functions. Various statistical analyzes and a comparative study with original GSA, Chaos-based GSA (CGSA), Bio-geography Based Optimization (BBO) and DBBO has been carried out.  相似文献   

8.
A degree-constrained graph orientation of an undirected graph G is an assignment of a direction to each edge in G such that the outdegree of every vertex in the resulting directed graph satisfies a specified lower and/or upper bound. Such graph orientations have been studied for a long time and various characterizations of their existence are known. In this paper, we consider four related optimization problems introduced in reference (Asahiro et al. LNCS 7422, 332–343 (2012)): For any fixed non-negative integer W, the problems MAX W-LIGHT, MIN W-LIGHT, MAX W-HEAVY, and MIN W-HEAVY take as input an undirected graph G and ask for an orientation of G that maximizes or minimizes the number of vertices with outdegree at most W or at least W. As shown in Asahiro et al. LNCS 7422, 332–343 (2012)).  相似文献   

9.
Recently, Shi et al. (Phys Rev A 92:022309, 2015) proposed quantum oblivious set member decision protocol where two legitimate parties, namely Alice and Bob, play a game. Alice has a secret k, and Bob has a set \(\{k_1,k_2,\ldots k_n\}\). The game is designed towards testing if the secret k is a member of the set possessed by Bob without revealing the identity of k. The output of the game will be either “Yes” (bit 1) or “No” (bit 0) and is generated at Bob’s place. Bob does not know the identity of k, and Alice does not know any element of the set. In a subsequent work (Shi et al in Quant Inf Process 15:363–371, 2016), the authors proposed a quantum scheme for private set intersection (PSI) where the client (Alice) gets the intersected elements with the help of a server (Bob) and the server knows nothing. In the present draft, we extended the game to compute the intersection of two computationally indistinguishable sets X and Y possessed by Alice and Bob, respectively. We consider Alice and Bob as rational players, i.e. they are neither “good” nor “bad”. They participate in the game towards maximizing their utilities. We prove that in this rational setting, the strategy profile ((cooperate, abort), (cooperate, abort)) is a strict Nash equilibrium. If ((cooperate, abort), (cooperate, abort)) is strict Nash, then fairness and correctness of the protocol are guaranteed.  相似文献   

10.
In this paper, we propose Virtual Id Routing (VIRO) a novel “plug-&-play” non-IP routing protocol for future dynamics networks. VIRO decouples routing/forwarding from addressing by introducing a topology-aware, structured virtual id layer to encode the locations of switches and devices in the physical topology. It completely eliminates network-wide flooding in both the data and control planes, and thus is highly scalable and robust. VIRO effectively localizes the effect of failures, performs fast re-routing and supports multiple (logical) topologies on top of the same physical network substrate to further enhance network robustness. We have implemented an initial prototype of VIRO using Open vSwitch, and we extend it (both within the user space and the kernel space) to implement VIRO switching functions in VIRO switches. In addition, we use the POX SDN controller to implement VIRO’s control and management plane functions. We evaluate our prototype implementation through emulation and in the GENI (the Global Environment for Network Innovations) testbed using many synthetic and real topologies. Our evaluation results show that VIRO has better scalability than link-state based protocols (e.g. OSPF and SEATTLE) in terms of routing-table size and control overhead, as well as better mechanisms for failure recovery.  相似文献   

11.
We consider stochastic control systems subjected simultaneously to stochastic and determinate perturbations. Stochastic perturbations are assumed to be state-multiplicative stochastic processes, while determinate perturbations can be any processes with finite energy on infinite time interval. The results of the determinate H -theory are compared to their stochastic analogs. The determinate and stochastic theories are linked together by the lemma that establishes the equivalence between the stability and boundness of the ‖L < γ norm of the perturbation operator L, from one side, and the solvability of certain linear matrix inequalities (LMIs), from the other side. As soon as the stochastic version of the lemma is proven, the γ-controller analysis and design problems are solved, in general, identically in the frame of the united LMI methodology.  相似文献   

12.
A generalization of the classical discriminant of the real polynomial defined using the linear Hahn operator that decreases the degree of the polynomial by one is studied. The structure of the generalized discriminant set of the real polynomial, i.e., the set of values of the polynomial coefficients at which the polynomial and its Hahn operator image have a common root, is investigated. The structure of the generalized discriminant of the polynomial of degree n is described in terms of the partitions of n Algorithms for the construction of a polynomial parameterization of the generalized discriminant set in the space of the polynomial coefficients are proposed. The main steps of these algorithms are implemented in a Maple library. Examples of calculating the discriminant set are discussed.  相似文献   

13.
Continuous visible nearest neighbor query processing in spatial databases   总被引:1,自引:0,他引:1  
In this paper, we identify and solve a new type of spatial queries, called continuous visible nearest neighbor (CVNN) search. Given a data set P, an obstacle set O, and a query line segment q in a two-dimensional space, a CVNN query returns a set of \({\langle p, R\rangle}\) tuples such that \({p \in P}\) is the nearest neighbor to every point r along the interval \({R \subseteq q}\) as well as p is visible to r. Note that p may be NULL, meaning that all points in P are invisible to all points in R due to the obstruction of some obstacles in O. In contrast to existing continuous nearest neighbor query, CVNN retrieval considers the impact of obstacles on visibility between objects, which is ignored by most of spatial queries. We formulate the problem, analyze its unique characteristics, and develop efficient algorithms for exact CVNN query processing. Our methods (1) utilize conventional data-partitioning indices (e.g., R-trees) on both P and O, (2) tackle the CVNN search by performing a single query for the entire query line segment, and (3) only access the data points and obstacles relevant to the final query result by employing a suite of effective pruning heuristics. In addition, several interesting variations of CVNN queries have been introduced, and they can be supported by our techniques, which further demonstrates the flexibility of the proposed algorithms. A comprehensive experimental evaluation using both real and synthetic data sets has been conducted to verify the effectiveness of our proposed pruning heuristics and the performance of our proposed algorithms.  相似文献   

14.
Partially observable Markov decision processes (POMDPs) provide a rich mathematical framework for planning tasks in partially observable stochastic environments. The notion of the covering number, a metric of capturing the search space size of a POMDP planning problem, has been proposed as a complexity measure of approximate POMDP planning. Existing theoretical results are based on POMDPs with finite and discrete state spaces and measured in the l 1-metric space. When considering heuristics, they are assumed to be always admissible. This paper extends the theoretical results on the covering numbers of different search spaces, including the newly defined space reachable under inadmissible heuristics, to the l n-metric spaces. We provide a simple but scalable algorithm for estimating covering numbers. Experimentally, we provide estimated covering numbers of the search spaces reachable by following different policies on several benchmark problems, and analyze their abilities to predict the runtime of POMDP planning algorithms.  相似文献   

15.
In this paper, we treat optimization problems as a kind of reinforcement learning problems regarding an optimization procedure for searching an optimal solution as a reinforcement learning procedure for finding the best policy to maximize the expected rewards. This viewpoint motivated us to propose a Q-learning-based swarm optimization (QSO) algorithm. The proposed QSO algorithm is a population-based optimization algorithm which integrates the essential properties of Q-learning and particle swarm optimization. The optimization procedure of the QSO algorithm proceeds as each individual imitates the behavior of the global best one in the swarm. The best individual is chosen based on its accumulated performance instead of its momentary performance at each evaluation. Two data sets including a set of benchmark functions and a real-world problem—the economic dispatch (ED) problem for power systems—were used to test the performance of the proposed QSO algorithm. The simulation results on the benchmark functions show that the proposed QSO algorithm is comparable to or even outperforms several existing optimization algorithms. As for the ED problem, the proposed QSO algorithm has found solutions better than all previously found solutions.  相似文献   

16.
In recent years, many layered indexing techniques over distributed hash table (DHT)-based peer-to-peer (P2P) systems have been proposed to realize distributed range search. In this paper, we present a fault tolerant constant degree dynamic Distributed Spatial Data Structure called DSDS that supports orthogonal range search on a set of N d-dimensional points published on n nodes. We describe a total order binary relation algorithm to publish points among supernodes and determine supernode keys. A non-redundant rainbow skip graph is used to coordinate message passing among nodes. The worst case orthogonal range search cost in a d-dimensional DSDS with n nodes is \(O\left (\log n+m+\frac {K}{B}\right )\) messages, where m is the number of nodes intersecting the query, K is the number of points reported in range, and B is the number of points that can fit in one message. A complete backup copy of data points stored in other nodes provides redundancy for our DSDS. This redundancy permits answering a range search query in the case of failure of a single node. For single node failure, the DSDS routing system can be recovered to a fully functional state at a cost of O(log n) messages. Backup sets in DSDS nodes are used to first process a query in the most efficient dimension, and then used to process a query containing the data in a failed node in d-dimensional space. The DSDS search algorithm can process queries in d-dimensional space and still tolerate failure of one node. Search cost in the worst case with a failed node increases to \(O\left (d\log n+dm+\frac {K}{B}\right )\) messages for d dimensions.  相似文献   

17.
This paper studies the problem of approximating a function f in a Banach space \(\mathcal{X}\) from measurements \(l_j(f)\), \(j=1,\ldots ,m\), where the \(l_j\) are linear functionals from \(\mathcal{X}^*\). Quantitative results for such recovery problems require additional information about the sought after function f. These additional assumptions take the form of assuming that f is in a certain model class \(K\subset \mathcal{X}\). Since there are generally infinitely many functions in K which share these same measurements, the best approximation is the center of the smallest ball B, called the Chebyshev ball, which contains the set \(\bar{K}\) of all f in K with these measurements. Therefore, the problem is reduced to analytically or numerically approximating this Chebyshev ball. Most results study this problem for classical Banach spaces \(\mathcal{X}\) such as the \(L_p\) spaces, \(1\le p\le \infty \), and for K the unit ball of a smoothness space in \(\mathcal{X}\). Our interest in this paper is in the model classes \(K=\mathcal{K}(\varepsilon ,V)\), with \(\varepsilon >0\) and V a finite dimensional subspace of \(\mathcal{X}\), which consists of all \(f\in \mathcal{X}\) such that \(\mathrm{dist}(f,V)_\mathcal{X}\le \varepsilon \). These model classes, called approximation sets, arise naturally in application domains such as parametric partial differential equations, uncertainty quantification, and signal processing. A general theory for the recovery of approximation sets in a Banach space is given. This theory includes tight a priori bounds on optimal performance and algorithms for finding near optimal approximations. It builds on the initial analysis given in Maday et al. (Int J Numer Method Eng 102:933–965, 2015) for the case when \(\mathcal{X}\) is a Hilbert space, and further studied in Binev et al. (SIAM UQ, 2015). It is shown how the recovery problem for approximation sets is connected with well-studied concepts in Banach space theory such as liftings and the angle between spaces. Examples are given that show how this theory can be used to recover several recent results on sampling and data assimilation.  相似文献   

18.
Many real-world problems may be expressed as nonlinear constrained optimization problems (CNOP). For this kind of problems, the set of constraints specifies the feasible solution space. In the last decades, several algorithms have been proposed and developed for tackling CNOP. In this paper, we present an extension of the “Musical Composition Method” (MMC) for solving constrained optimization problems. MMC was proposed by Mora et al. (Artif Intell Rev 1–15, doi:10.1007/s10462-011-9309-8, 2012a). The MMC is based on a social creativity system used to compose music. We evaluated and analyzed the performance of MMC on 12 CNOP benchmark cases. The experimental results demonstrate that MMC significantly improves the global performances of the other tested metaheuristics on some benchmark functions.  相似文献   

19.
We use self-reduction methods to prove strong information lower bounds on two of the most studied functions in the communication complexity literature: Gap Hamming Distance (GHD) and Inner Product (IP). In our first result we affirm the conjecture that the information cost of GHD is linear even under the uniform distribution, which strengthens the Ω(n) bound recently shown by Kerenidis et al. (2012), and answers an open problem from Chakrabarti et al. (2012). In our second result we prove that the information cost of IPn is arbitrarily close to the trivial upper bound n as the permitted error tends to zero, again strengthening the Ω(n) lower bound recently proved by Braverman and Weinstein (Electronic Colloquium on Computational Complexity (ECCC) 18, 164 2011). Our proofs demonstrate that self-reducibility makes the connection between information complexity and communication complexity lower bounds a two-way connection. Whereas numerous results in the past (Chakrabarti et al. 2001; Bar-Yossef et al. J. Comput. Syst. Sci. 68(4), 702–732 2004; Barak et al. 2010) used information complexity techniques to derive new communication complexity lower bounds, we explore a generic way in which communication complexity lower bounds imply information complexity lower bounds in a black-box manner.  相似文献   

20.
This paper addresses the open problem of designing attribute-based signature (ABS) schemes with constant number of bilinear pairing operations for signature verification or short signatures for more general policies posed by Gagné et al. in Pairing 2012. Designing constant-size ABS for expressive access structures is a challenging task. We design two key-policy ABS schemes with constant-size signature for expressive linear secret-sharing scheme (LSSS)-realizable monotone access structures. Both the schemes utilize only 3 pairing operations in signature verification process. The first scheme is small universe construction, while the second scheme supports large universes of attributes. The signing key is computed according to LSSS-realizable access structure over signer’s attributes, and the message is signed with an attribute set satisfying the access structure. Our ABS schemes provide the existential unforgeability in selective attribute set security model and preserve signer privacy. We also propose a new attribute-based signcryption (ABSC) scheme for LSSS-realizable access structures utilizing only 6 pairings and making the ciphertext size constant. Our scheme is significantly more efficient than existing ABSC schemes. While the secret key (signing key or decryption key) size increases by a factor of number of attributes used in the system, the number of pairing evaluations is reduced to constant. Our protocol achieves (a) ciphertext indistinguishability under adaptive chosen ciphertext attacks assuming the hardness of decisional Bilinear Diffie–Hellman Exponent problem and (b) existential unforgeability under adaptive chosen message attack assuming the hardness of computational Diffie–Hellman Exponent problem. The security proofs are in selective attribute set security model without using any random oracle heuristic. In addition, our ABSC achieves public verifiability of the ciphertext, enabling any party to verify the integrity and validity of the ciphertext.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号