期刊文献+

一种改进的遗传算法及其应用 被引量:3

A Modified Genetic Algorithm and Its Application
在线阅读 下载PDF
导出
摘要 针对标准遗传算法的不收敛性,提出了几种改进措施:提出了共同特征位的概念,给出消除群体中的共同特征位的方法;交叉和变异概率可变;实施最优保留。实验表明,改进算法具有全局优化能力。 Considering the deficiency of standard genetic algorithm; severa improved methodsare proposed: the conception of common characteristic bit is proposed, the probability ofcrossover and mutation are adjustal adaptively; the best solution is nserved. the simulationshows the modified gentic algorithms can find global maximum.
出处 《黑龙江商学院学报》 CAS 2000年第2期1-3,共3页 Journal of Harbin Commercial University(Natural Sciences Edition)
关键词 遗传算法 收敛性 共同特征位 函数优化 应用 genetic algorithms, convergence, common characteristic bit function optimization
  • 相关文献

参考文献2

  • 1[1]Rudolph G.Convergence properties of canonical genetic algorithms[[J].IEEE Trans.Neural Networks,1994,5(1):96-101.
  • 2[2]Holland J.H.Genetic algorithms[J].Scientific American,1992(7):66-72

同被引文献24

  • 1伍宏涛,杨义先.数字水印的技术、理论与应用(1)[J].电视技术,2004,28(8):71-74. 被引量:12
  • 2[1]AGNETIS A.Planning the routing mix in FASs to minimize total transportation time[J].International Journal of Flexible Manufacturing Systems,1996,(2):131~157.
  • 3[2]DEMEULEMEESTER L,LAPORTE G,LOUVEAUX FV.Optimal sequencing of skip collections and deliveries[J].Journal of the Operational Research Society,1997,(1):57~64.
  • 4[1]PETITCOLAS,F.A.ANDERSON,R.J.KUHN.M.G.Information hiding-a survey[J].Proceeding of IEEE,1999,87(7):1062~1078.
  • 5[2]VOYATZIS,G.PITAS.I.The use of watermarks in the protection of digital multimedia products[J].Proceeding of IEEE,1999,87(7):1197~1207.
  • 6[3]BARNETT.R.Digital watermarking:applications,techniques and challenges [J].Electronics & Communication Engineering Journal.1999,11(4):173~183.
  • 7[4]ACKEN.J.M.How watermarking adds value to digital content[J].Communications of the ACM.1998,41(7):74~77.
  • 8[5]SCHYNDEL,R.G.van A.Z.Tirkel,C.F.Osborne.A digital watermark.International Conference on Image Processing,Austin,Texas,U.S.A.,[J].1994 IEEE,(2):86~90.
  • 9[6]BENDER W.,GRUHL D.,Morimoto N.,Techniques for data hiding[J].IBM system journal,1996,35(3):313~336.
  • 10[7]NIKOLAIDIS N.,PITAS I.Copyright protection of image using robust digital signatures[A].IEEE Proceeding on International Conference on Acoustics,Speech,and Signal Processing[C].Atlanta,IEEE Press,1996:2168~2171.

引证文献3

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部