|
|
Danger Theory Based Dynamic Constrained Immune Optimization |
ZHANG Zhu-Hong |
Institute of System Science and Information Technology,College of Science,Guizhou University,Guiyang 550025 |
|
|
Abstract Based on the danger theory, an immune algorithm for dynamic constrained single-objective function optimization is proposed. The key of the algorithm is to construct two functional modules: environmental detection and co-evolution. Relying upon the Antigen Presenting Cells (APCs) infected by distressed or apoptotic cells, the change of the environment is detected and the environmental level is confirmed. The co-evolving scheme based on self-reactive, effective and environmental memory cells is explored. The proposed approach can online detect the change of the environment with the merits of simplicity, flexibility and dynamic runtime. The experimental results show that the proposed approach performs better than the compared algorithms, it has potential use for dynamic constrained optimization problems while achieves the reasonable balance between effect and efficiency.
|
Received: 21 February 2011
|
|
|
|
|
[1] Jin Yaochu,Branke J.Evolutionary Optimization in Uncertain Environments-A Survey.IEEE Trans on Evolutionary Computation,2005,9(3): 303-317 [2] Yu Xin,Jin Yaochu,Tang Ke,et al.Robust Optimization over Time-A New Perspective on Dynamic Optimization Problems // Proc of the IEEE Congress on Evolutionary Computation.Barcelona,Spain,2010: 3998-4003 [3] Nguyen T T,Yao Xin.Benchmarking and Solving Dynamic Constrained Problems // Proc of the IEEE Congress on Evolutionary Computation.Trondheim,Norway,2009: 690-697 [4] Singh H K,Isaacs A,Nguyen T T,et al.Performance of Infeasibility Driven Evolutionary Algorithm (IDEA) on Constrained Dynamic Single Objective Optimization Problems // Proc of the IEEE Congress on Evolutionary Computation.Trondheim,Norway,2009: 3127-3134 [5] Liu Chun’an.New Method for Solving a Class of Dynamic Nonlinear Constrained Optimization Problems // Proc of the 6th International Conference on Natural Computation.Jinan,China,2010,V: 2400-2402 [6] Walker J H,Garrett S M.Dynamic Function Optimization: Comparing the Performance of Clonal Selection and Evolution Strategies // Proc of the 2nd International Conference on Artificial Immune Systems.Edinburgh,UK,2003: 273-284 [7] de Castro L N,Timmis J.Artificial Immune Systems: A New Computational Intelligence Approach.Berlin,Germany: Springer-Verlag,2002 [8] Jiao Licheng,Du Haifeng,Liu Fang,et al.Immunological Computation for Optimization,Learning and Recognition.Beijing,China: Science Press,2006 (in Chinese) (焦李成,杜海峰,刘 芳,等.免疫优化计算、学习与识别.北京:科学出版社,2006) [9] Huang Xiyue,Zhang Zhuhong,He Chuanjiang,et al.Modern Intelligent Algorithms: Theory and Applications.Beijing,China: Science Press,2005 (in Chinese) (黄席樾,张著洪,何传江,等.现代智能算法理论及应用.北京:科学出版社,2005) [10] de Franca F O,von Zuben F J,de Castro L N.An Artificial Immune Network for Multimodal Function Optimization on Dynamic Environments // Proc of the Conference on Genetic and Evolutionary Computation.Washington,USA,2005: 289-296 [11] Luo Yinsheng,Li Renhou,Zhang Weixi.Dynamic Function Optimization Algorithm Based on Immune Mechanism.Journal of Xi’an Jiaotong University,2005,39(4): 384-388 (in Chinese) (罗印升,李人厚,张维玺.基于免疫机理的动态函数优化算法.西安交通大学学报,2005,39(4): 384-388) [12] Aragón V S,Esquivel S C.Optimizing Constrained Problems through a T-Cell.Journal of Computer Science and Technology,2008,8(3): 158-165 [13] Zhang Zhuhong,Qian Shuqu.Immune Algorithm with Dynamic Environments and Its Application to Greenhouse Control.Optimization and Engineering,2010,11(1): 125-144 [14] Hong Lin.A Real-Time Dynamic Danger Theory Model for Anomaly Detection in File Systems.Master Dissertation.York,UK: University of York,2005 [15] Guo Chen,Liang Jiarong,Xia Jiewu.Theory and Application of Artificial Immune Based on Danger Theory.Application Research of Computers,2007,24(6): 18-24 (in Chinese) (郭 晨,梁家荣,夏洁武.基于危险理论的人工免疫原理与应用.计算机应用研究,2007,24(6): 18-24) [16] Yu Ying,Hou Chaozhen.A Novel Immune Discrimination Algorithm Based on Danger Theory.Control and Decision,2005,2(9): 1026-1029 (in Chinese) (于 瀛,侯朝桢.基于危险理论的免疫识别新算法.控制与决策,2005,2(9): 1026-1029) [17] Deng Xuefeng,Tang Jun.Novel Clone Selection Algorithm.Application Research of Computers,2011,28(1): 332-334 (in Chinese) (邓雪峰,唐 俊.一种新型的克隆选择算法.计算机应用研究,2011,28(1):332-334) [18] Matzinger P.Tolerance,Danger and the Extended Family.Annual Review on Immunology,1994,12: 991-1045 [19] Liang J J,Runarsson T P,Mezura-Montes E,et al.Problem Definitions and Evaluation Criteria for the CEC 2006 Special Session on Constrained Real-Parameter Optimization[EB/OL].[2006-09-18].http://www.lania.mx/~emezura/util/files/tr_cec06. |
|
|
|