2022
DOI: 10.1002/cpe.7496
|View full text |Cite
|
Sign up to set email alerts
|

Multi‐objective firefly algorithm with multi‐strategy integration

Abstract: In the optimization process of multi-objective firefly algorithm, population is easy to fall into local optimum, which leads to poor population distribution and convergence. In order to solve this problem, this article proposes a multi-objective firefly algorithm with multi-strategy integration (MOFA-MSI). First, in order to improve the distribution of population, MOFA-MSI proposes a cloning strategy, which calculates the distribution degree of individuals in population, clones them according to their distribu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 37 publications
0
3
0
Order By: Relevance
“…On a soft real-time single processor system, Fahmy developed a fuzzy method for aperiodic work scheduling. The total throughput time of the task is lowered by assessing the priority of the work that is now running and altering the priority of the job in the queue, and the technique is utilized in a multiobjective algorithm [46]. Zhou et al [47] proposed a heterogeneous earliest completion time algorithm based on fuzzy dominance sorting in the Infrastructure as a Service (IaaS) workflow, which greatly improved the running speed.…”
Section: Related Workmentioning
confidence: 99%
“…On a soft real-time single processor system, Fahmy developed a fuzzy method for aperiodic work scheduling. The total throughput time of the task is lowered by assessing the priority of the work that is now running and altering the priority of the job in the queue, and the technique is utilized in a multiobjective algorithm [46]. Zhou et al [47] proposed a heterogeneous earliest completion time algorithm based on fuzzy dominance sorting in the Infrastructure as a Service (IaaS) workflow, which greatly improved the running speed.…”
Section: Related Workmentioning
confidence: 99%
“…In the past machine learning process, the relative entropy KL D is mainly used to determine the difference between the practical probability distribution ( ) P X and the predicted probability distribution ( ) Q X . From Eq (6), it is clear that the difference between ( ) P X and ( ) Q X can be determined by cross entropy, and it is more convenient to calculate the differexnce between two probability distributions by using cross entropy than relative entropy.…”
Section: Relative Entropy and Cross Entropymentioning
confidence: 99%
“…Traditional NID techniques achieve intrusion detection by comparing attacks identified in the feature code database, but this method has a high leakage rate and lag [1]. Recently, with the rapid development of artificial intelligence [2][3][4][5] and machine learning technologies [6][7][8], machine learning-based NID methods are gradually becoming a research hotspot.…”
Section: Introductionmentioning
confidence: 99%
“…7 This algorithm is applied in many different fields such as GA. These algorithms can be used in many different fields such as extracting features in image processing, [37][38][39][40] engineering problems, 13,[41][42][43][44] solving NP hard problems, [45][46][47] classification, clustering 48 and health. 36,49 Such algorithms provide successful results in cases where the objective function is discontinuous and in limited optimization operations.…”
Section: Introductionmentioning
confidence: 99%