An intelligent information sharing strategy within a swarm for unconstrained and constrained optimization problems

نویسندگان

  • Tapabrata Ray
  • K. M. Liew
  • P. Saini
چکیده

In this paper we present a new multilevel information sharing strategy within a swarm to handle single objective, constrained and unconstrained optimization problems. A swarm is a collection of individuals having a common goal to reach the best value (minimum or maximum) of a function. Among the individuals in a swarm, there are some better performers (leaders) those that set the direction of search for the rest of the individuals. An individual that is not in the better performer list (BPL) improves its performance by deriving information from its closest neighbor in BPL. In an unconstrained problem, the objective values are the performance measures used to generate the BPL while a multilevel Pareto ranking scheme is implemented to generate the BPL for constrained problems. The information sharing strategy also ensures that all the individuals in the swarm are unique as in a real swarm, where at a given time instant two individuals cannot share the same location. The uniqueness among the individuals result in a set of near optimal individuals at the final stage that is useful for sensitivity analysis. The benefits of the information sharing strategy 2 within a swarm are illustrated by solving two unconstrained problems with multiple equal and unequal optimum, a constrained optimization problem dealing with a test function and a well studied welded beam design problem.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CONSTRAINED BIG BANG-BIG CRUNCH ALGORITHM FOR OPTIMAL SOLUTION OF LARGE SCALE RESERVOIR OPERATION PROBLEM

A constrained version of the Big Bang-Big Crunch algorithm for the efficient solution of the optimal reservoir operation problems is proposed in this paper. Big Bang-Big Crunch (BB-BC) algorithm is a new meta-heuristic population-based algorithm that relies on one of the theories of the evolution of universe namely, the Big Bang and Big Crunch theory. An improved formulation of the algorithm na...

متن کامل

Particle Swarm Optimization for Hydraulic Analysis of Water Distribution Systems

The analysis of flow in water-distribution networks with several pumps by the Content Model may be turned into a non-convex optimization uncertain problem with multiple solutions. Newton-based methods such as GGA are not able to capture a global optimum in these situations. On the other hand, evolutionary methods designed to use the population of individuals may find a global solution even for ...

متن کامل

Trim and Maneuverability Analysis Using a New Constrained PSO Approach of a UAV

Performance characteristic of an Unmanned Air Vehicle (UAV) is investigated using a newly developed heuristic approach. Almost all flight phases of any air vehicle can be categorized into trim and maneuvering flights. In this paper, a new envelope called trim-ability envelope, is introduced and sketched within the conventional flight envelope for a small UAV. Optimal maneuverability of the inte...

متن کامل

Implementation of Digital Pheromones in Particle Swarm Optimization for Constrained Optimization Problems

This paper presents a model for digital pheromone implementation of Particle Swarm Optimization (PSO) to solve constrained optimization problems. Digital pheromones are models simulating real pheromones produced by insects for communication to indicate a source of food or a nesting location. When integrated within PSO, this principle of communication and organization between swarm members offer...

متن کامل

A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs

To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Soft Comput.

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2002