4.7 Article

Social learning differential evolution

期刊

INFORMATION SCIENCES
卷 433, 期 -, 页码 464-509

出版社

ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2016.10.003

关键词

Differential evolution; Mutation; Social learning; Neighborhood; Parents selection; Numerical optimization

资金

  1. National Natural Science Foundation of China [61305085, 61572206, 61502184, 61572204]
  2. Natural Science Foundation of Fujian Province of China [2014J05074, 2015J0101]
  3. Promotion Program for Young and Middle-aged Teacher in Science and Technology Research of Huaqiao University [ZQN-PY410]

向作者/读者索取更多资源

Differential evolution (DE) has attracted much attention in the field of evolutionary computation and has proved to be one of the most successful evolutionary algorithms (EAs) for global optimization. Mutation, as the core operator of DE, is essential for guiding the search of DE. In this study, inspired by the phenomenon of social learning in animal societies, we propose an adaptive social learning (ASL) strategy for DE to extract the neighborhood relationship information of individuals in the current population. The new DE framework is named social learning DE (SL-DE). Unlike the classical DE algorithms where the parents in mutation are randomly selected from the current population, SL-DE uses the ASL strategy to intelligently guide the selection of parents. With ASL, each individual is only allowed to interact with its neighbors and the parents in mutation will be selected from its neighboring solutions. To evaluate the effectiveness of the proposed framework, SL-DE is applied to several classical and advanced DE algorithms. The simulation results on forty-three real-parameter functions and seventeen real-world application problems have demonstrated the advantages of SL-DE over several representative DE variants and the state-of-the-art EAs. (C) 2016 Elsevier Inc. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Telecommunications

Trust based energy efficient data collection with unmanned aerial vehicle in edge network

Bo Jiang, Guosheng Huang, Tian Wang, Jinsong Gui, Xiaoyu Zhu

Summary: In this article, a trust-based energy efficient data collection scheme using unmanned aerial vehicles is proposed, which optimizes trajectory and identifies trusted data to prolong network lifetime and improve data collection quality.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2022)

Article Telecommunications

Trust data collections via vehicles joint with unmanned aerial vehicles in the smart Internet of Things

Ting Li, Wei Liu, Tian Wang, Zhao Ming, Xiong Li, Ming Ma

Summary: This study proposes a novel scheme named T-SIoTs, which utilizes trust vehicles and UAVs to establish a trust-based environment for data collection in the IoT. The scheme improves security and achieves efficient data collection through static stations and shortest-distance-first routing scheme.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2022)

Article Computer Science, Theory & Methods

A privacy-protected intelligent crowdsourcing application of IoT based on the reinforcement learning

Yingying Ren, Wei Liu, Anfeng Liu, Tian Wang, Ang Li

Summary: The crowdsourcing scheme for data-based applications in the IoT network faces issues with malicious participants, which a proposed privacy-protected intelligent crowdsourcing scheme (PICRL) aims to address using reinforcement learning and trust evaluation mechanisms. The PICRL optimizes utility through effective trust assessment and Q-learning method without prior knowledge of specific sensing models.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2022)

Article Automation & Control Systems

Missing Value Filling Based on the Collaboration of Cloud and Edge in Artificial Intelligence of Things

Tian Wang, Haoxiong Ke, Alireza Jolfaei, Sheng Wen, Mohammad Sayad Haghighi, Shuqiang Huang

Summary: With the development of 5G technology and Internet of Things, incomplete real life data can be efficiently processed using edge computing methods in the AIoT environment. This approach outperforms other filling methods in terms of quality and reduces energy consumption significantly.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Automation & Control Systems

C-FDRL: Context-Aware Privacy-Preserving Offloading Through Federated Deep Reinforcement Learning in Cloud-Enabled IoT

Yang Xu, Md Zakirul Alam Bhuiyan, Tian Wang, Xiaokang Zhou, Amit Kumar Singh

Summary: In this article, we propose a framework called C-fDRL to protect the context-aware privacy of task offloading using context-aware federated deep reinforcement learning. The framework operates in three stages (CloudAI, EdgeAI, and DeviceAI) of the overall system, decoupling data from tasks through a context-aware data management approach for local and edge computation, leading to improved data privacy protection.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Information Systems

Towards Robust Task Assignment in Mobile Crowdsensing Systems

Liang Wang, Zhiwen Yu, Kaishun Wu, Dingqi Yang, En Wang, Tian Wang, Yihan Mei, Bin Guo

Summary: Mobile Crowdsensing (MCS) is an appealing paradigm for collaboratively collecting data from surrounding environments by assigning outsourced sensing tasks to volunteer workers. However, unpredictable disruptions during task implementation often result in task execution failure and impair the benefit of MCS systems. In this work, we propose a robust task assignment scheme that proactively creates assignments offline, aiming to strengthen the robustness of the scheme and minimize workers' traveling detour cost. By leveraging workers' spatiotemporal mobility, we construct an assignment graph and use an evolutionary multi-tasking optimization algorithm (EMTRA) to achieve adequate Pareto-optimal schemes. Comprehensive experiments on real-world datasets validate the effectiveness and applicability of our approach.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Computer Science, Artificial Intelligence

A game-based deep reinforcement learning approach for energy-efficient computation in MEC systems

Miaojiang Chen, Wei Liu, Tian Wang, Shaobo Zhang, Anfeng Liu

Summary: This paper proposes a polling callback energy-saving offloading strategy, and simulation results show that the proposed algorithm performs better than DDQN, DQN, and BCD-based optimal methods.

KNOWLEDGE-BASED SYSTEMS (2022)

Article Computer Science, Information Systems

TANTO: An Effective Trust-Based Unmanned Aerial Vehicle Computing System for the Internet of Things

Jing Bai, Zhiwen Zeng, Tian Wang, Shaobo Zhang, Neal N. Xiong, Anfeng Liu

Summary: In this article, a trust-based active notice task offloading (TANTO) scheme is proposed to provide trust and low-delay task offloading for resource-limited IoT devices in areas with no available communication infrastructure. The main innovations of TANTO include a novel task offloading mechanism, a trust calculation and reasoning method, and an online UAV trajectory optimization algorithm. Experimental results show that TANTO outperforms previous studies in terms of task completion rate, tasks' average completion time, and UAV's flight cost.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Cybernetics

Edge-Learning-Based Hierarchical Prefetching for Collaborative Information Streaming in Social IoT Systems

Tian Wang, Xuewei Shen, Mohammad S. Obaidat, Xuxun Liu, Shaohua Wan

Summary: For smart cities, ubiquitous user connectivity and collaborative computation offloading are significant. This article proposes an information prefetching architecture that optimizes collaborative edge computing using a hierarchical data storage and selection strategy. It also utilizes an independent/joint edge-learning model to improve algorithm efficiency and cost-effectiveness.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2022)

Article Automation & Control Systems

An Effective Edge-Intelligent Service Placement Technology for 5G-and-Beyond Industrial IoT

Tian Wang, Yilin Zhang, Neal N. Xiong, Shaohua Wan, Shigen Shen, Shuqiang Huang

Summary: With the rapid development of wireless communication, traditional cloud computing is not sufficient for low-latency services. Mobile edge computing (MEC) can enhance the user experience and reduce energy consumption. In this article, an edge-intelligent service placement algorithm (EISPA) is proposed, which utilizes nature-inspired particle swarm optimization (PSO) to find the global optimal solution. The algorithm also incorporates a shrinkage factor and simulated annealing (SA) to avoid falling into local optima. Performance analysis results demonstrate that the EISPA outperforms other algorithms in terms of system cost under energy constraints.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Hardware & Architecture

Throughput Maximization of UAV Networks

Wenzheng Xu, Yueying Sun, Rui Zou, Weifa Liang, Qiufen Xia, Feng Shan, Tian Wang, Xiaohua Jia, Zheng Li

Summary: This paper studies the deployment of multiple UAVs to provide emergent communication services, proposing a novel problem and improving the current best solution by five times with a new approximation algorithm. Experimental results show that the proposed algorithm is very promising, delivering solutions up to 12% better than existing algorithms.

IEEE-ACM TRANSACTIONS ON NETWORKING (2022)

Article Telecommunications

An intelligent hybrid MAC protocol for a sensor-based personalized healthcare system

Linbo Deng, Jinsong Gui, Tian Wang, Jiawei Tan, Xiong Li

Summary: This paper proposes a Maximum Listening Length MAC (MLL-MAC) protocol to address the energy limitations in medical sensors. By sending beacons and prolonging the listening duration, the protocol reduces the delay and improves energy utilization.

DIGITAL COMMUNICATIONS AND NETWORKS (2022)

Proceedings Paper Computer Science, Software Engineering

Self-adapted Frame Selection Module: Refine the Input Strategy for Video Saliency Detection

Shangrui Wu, Yang Wang, Tian Wang, Weijia Jia, Ruitao Xie

Summary: Video saliency detection interprets the human visual system by modeling and predicting. The proposed SAFS module selects highly informative frames and has high robustness and extensive application. Combined with TASED-NET, our method achieves significant improvements on various datasets.

ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT II (2022)

Article Computer Science, Artificial Intelligence

A Natural Scene Recognition Learning Based on Label Correlation

Ying Ma, Yunjie Lei, Tian Wang

Summary: In this paper, the LC-KNN algorithm is proposed to improve the recognition accuracy of multi-label natural scene images by analyzing and weighting the correlation between instances. The experimental results show that the algorithm outperforms mainstream algorithms in multi-label natural scene recognition tasks.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE (2022)

Article Computer Science, Information Systems

Objective-Variable Tour Planning for Mobile Data Collection in Partitioned Sensor Networks

Xuxun Liu, Peihang Lin, Tang Liu, Tian Wang, Anfeng Liu, Wenzheng Xu

Summary: This research proposes an objective-variable tour planning (OVTP) strategy for mobile data gathering in partitioned wireless sensor networks (WSNs), addressing the issue of complex network environments. The strategy focuses on disjoint networks with connectivity requirement and serves delay-hash applications as well as energy-efficient scenarios. Extensive simulations demonstrate the effectiveness and advantages of the new strategy in terms of path length, energy depletion, and data collection ratio.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2022)

Article Computer Science, Information Systems

A consensus model considers managing manipulative and overconfident behaviours in large-scale group decision-making

Xia Liang, Jie Guo, Peide Liu

Summary: This paper investigates a novel consensus model based on social networks to manage manipulative and overconfident behaviors in large-scale group decision-making. By proposing a novel clustering model and improved methods, the consensus reaching is effectively facilitated. The feedback mechanism and management approach are employed to handle decision makers' behaviors. Simulation experiments and comparative analysis demonstrate the effectiveness of the model.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

CGN: Class gradient network for the construction of adversarial samples

Xiang Li, Haiwang Guo, Xinyang Deng, Wen Jiang

Summary: This paper proposes a method based on class gradient networks for generating high-quality adversarial samples. By introducing a high-level class gradient matrix and combining classification loss and perturbation loss, the method demonstrates superiority in the transferability of adversarial samples on targeted attacks.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Distinguishing latent interaction types from implicit feedbacks for recommendation

Lingyun Lu, Bang Wang, Zizhuo Zhang, Shenghao Liu

Summary: Many recommendation algorithms only rely on implicit feedbacks due to privacy concerns. However, the encoding of interaction types is often ignored. This paper proposes a relation-aware neural model that classifies implicit feedbacks by encoding edges, thereby enhancing recommendation performance.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Proximity-based density description with regularized reconstruction algorithm for anomaly detection

Jaehong Yu, Hyungrok Do

Summary: This study discusses unsupervised anomaly detection using one-class classification, which determines whether a new instance belongs to the target class by constructing a decision boundary. The proposed method uses a proximity-based density description and a regularized reconstruction algorithm to overcome the limitations of existing one-class classification methods. Experimental results demonstrate the superior performance of the proposed algorithm.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Non-iterative border-peeling clustering algorithm based on swap strategy

Hui Tu, Shifei Ding, Xiao Xu, Haiwei Hou, Chao Li, Ling Ding

Summary: Border-Peeling algorithm is a density-based clustering algorithm, but its complexity and issues on unbalanced datasets restrict its application. This paper proposes a non-iterative border-peeling clustering algorithm, which improves the clustering performance by distinguishing and associating core points and border points.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

A two-stage denoising framework for zero-shot learning with noisy labels

Long Tang, Pan Zhao, Zhigeng Pan, Xingxing Duan, Panos M. Pardalos

Summary: In this work, a two-stage denoising framework (TSDF) is proposed for zero-shot learning (ZSL) to address the issue of noisy labels. The framework includes a tailored loss function to remove suspected noisy-label instances and a ramp-style loss function to reduce the negative impact of remaining noisy labels. In addition, a dynamic screening strategy (DSS) is developed to efficiently handle the nonconvexity of the ramp-style loss.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Selection of a viable blockchain service provider for data management within the internet of medical things: An MCDM approach to Indian healthcare

Raghunathan Krishankumar, Sundararajan Dhruva, Kattur S. Ravichandran, Samarjit Kar

Summary: Health 4.0 is gaining global attention for better healthcare through digital technologies. This study proposes a new decision-making framework for selecting viable blockchain service providers in the Internet of Medical Things (IoMT). The framework addresses the limitations in previous studies and demonstrates its applicability in the Indian healthcare sector. The results show the top ranking BSPs, the importance of various criteria, and the effectiveness of the developed model.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Q-learning with heterogeneous update strategy

Tao Tan, Hong Xie, Liang Feng

Summary: This paper proposes a heterogeneous update idea and designs HetUp Q-learning algorithm to enlarge the normalized gap by overestimating the Q-value corresponding to the optimal action and underestimating the Q-value corresponding to the other actions. To address the limitation, a softmax strategy is applied to estimate the optimal action, resulting in HetUpSoft Q-learning and HetUpSoft DQN. Extensive experimental results show significant improvements over SOTA baselines.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Dyformer: A dynamic transformer-based architecture for multivariate time series classification

Chao Yang, Xianzhi Wang, Lina Yao, Guodong Long, Guandong Xu

Summary: This paper proposes a dynamic transformer-based architecture called Dyformer for multivariate time series classification. Dyformer captures multi-scale features through hierarchical pooling and adaptive learning strategies, and improves model performance by introducing feature-map-wise attention mechanisms and a joint loss function.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

ESSENT: an arithmetic optimization algorithm with enhanced scatter search strategy for automated test case generation

Xiguang Li, Baolu Feng, Yunhe Sun, Ammar Hawbani, Saeed Hammod Alsamhi, Liang Zhao

Summary: This paper proposes an enhanced scatter search strategy, using opposition-based learning, to solve the problem of automated test case generation based on path coverage (ATCG-PC). The proposed ESSENT algorithm selects the path with the lowest path entropy among the uncovered paths as the target path and generates new test cases to cover the target path by modifying the dimensions of existing test cases. Experimental results show that the ESSENT algorithm outperforms other state-of-the-art algorithms, achieving maximum path coverage with fewer test cases.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

An attention based approach for automated account linkage in federated identity management

Shirin Dabbaghi Varnosfaderani, Piotr Kasprzak, Aytaj Badirova, Ralph Krimmel, Christof Pohl, Ramin Yahyapour

Summary: Linking digital accounts belonging to the same user is crucial for security, user satisfaction, and next-generation service development. However, research on account linkage is mainly focused on social networks, and there is a lack of studies in other domains. To address this, we propose SmartSSO, a framework that automates the account linkage process by analyzing user routines and behavior during login processes. Our experiments on a large dataset show that SmartSSO achieves over 98% accuracy in hit-precision.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

A memetic algorithm with fuzzy-based population control for the joint order batching and picker routing problem

Renchao Wu, Jianjun He, Xin Li, Zuguo Chen

Summary: This paper proposes a memetic algorithm with fuzzy-based population control (MA-FPC) to solve the joint order batching and picker routing problem (JOBPRP). The algorithm incorporates batch exchange crossover and a two-level local improvement procedure. Experimental results show that MA-FPC outperforms existing algorithms in terms of solution quality.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Refining one-class representation: A unified transformer for unsupervised time-series anomaly detection

Guoxiang Zhong, Fagui Liu, Jun Jiang, Bin Wang, C. L. Philip Chen

Summary: In this study, we propose the AMFormer framework to address the problem of mixed normal and anomaly samples in deep unsupervised time-series anomaly detection. By refining the one-class representation and introducing the masked operation mechanism and cost sensitive learning theory, our approach significantly improves anomaly detection performance.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

A data-driven optimisation method for a class of problems with redundant variables and indefinite objective functions

Jin Zhou, Kang Zhou, Gexiang Zhang, Ferrante Neri, Wangyang Shen, Weiping Jin

Summary: In this paper, the authors focus on the issue of multi-objective optimisation problems with redundant variables and indefinite objective functions (MOPRVIF) in practical problem-solving. They propose a dual data-driven method for solving this problem, which consists of eliminating redundant variables, constructing objective functions, selecting evolution operators, and using a multi-objective evolutionary algorithm. The experiments conducted on two different problem domains demonstrate the effectiveness, practicality, and scalability of the proposed method.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

A Monte Carlo fuzzy logistic regression framework against imbalance and separation

Georgios Charizanos, Haydar Demirhan, Duygu Icen

Summary: This article proposes a new fuzzy logistic regression framework that addresses the problems of separation and imbalance while maintaining the interpretability of classical logistic regression. By fuzzifying binary variables and classifying subjects based on a fuzzy threshold, the framework demonstrates superior performance on imbalanced datasets.

INFORMATION SCIENCES (2024)