完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Kuo, T | en_US |
dc.contributor.author | Hwang, SY | en_US |
dc.date.accessioned | 2014-12-08T15:02:44Z | - |
dc.date.available | 2014-12-08T15:02:44Z | - |
dc.date.issued | 1996-04-01 | en_US |
dc.identifier.issn | 1083-4419 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1109/3477.485880 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/1377 | - |
dc.description.abstract | Genetic algorithms are a class of adaptive search techniques based on the principles of population genetics. The metaphor underlying genetic algorithms is that of natural evolution. Applying the ''survival-of-the-fittest'' principle, traditional genetic algorithms allocate more trials to above-average schemata, However, increasing the sampling rate of schemata that are above average does not guarantee convergence to a global optimum; the global optimum could be a relatively isolated peak or located in schemata that have large variance in performance, In this paper we propose a novel selection method, disruptive selection. This method adopts a nonmonotonic fitness function that is quite different from traditional monotonic fitness functions, Unlike traditional genetic algorithms, this method favors both superior and inferior individuals. Experimental results show that GA's using the proposed method easily find the optimal solution of a function that is hard for traditional GA's to optimize, We also present convergence analysis to estimate the occurrence ratio of the optima of a deceptive function after a certain number of generations of a genetic algorithm, Experimental results show that GA's using disruptive selection in some occasions find the optima more quickly and reliably than GA's using directional selection, These results suggest that disruptive selection can be useful in solving problems that have large variance within schemata and problems that are GA-deceptive. | en_US |
dc.language.iso | en_US | en_US |
dc.title | A genetic algorithm with disruptive selection | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/3477.485880 | en_US |
dc.identifier.journal | IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS | en_US |
dc.citation.volume | 26 | en_US |
dc.citation.issue | 2 | en_US |
dc.citation.spage | 299 | en_US |
dc.citation.epage | 307 | en_US |
dc.contributor.department | 交大名義發表 | zh_TW |
dc.contributor.department | 資訊科學與工程研究所 | zh_TW |
dc.contributor.department | National Chiao Tung University | en_US |
dc.contributor.department | Institute of Computer Science and Engineering | en_US |
dc.identifier.wosnumber | WOS:A1996UD02400008 | - |
dc.citation.woscount | 33 | - |
顯示於類別: | 期刊論文 |