Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (4)

Search Parameters:
Keywords = greedy rank one update algorithm

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
49 pages, 24339 KB  
Article
An Enhanced Slime Mould Algorithm Based on Best–Worst Management for Numerical Optimization Problems
by Tongzheng Li, Hongchi Meng, Dong Wang, Bin Fu, Yuanyuan Shao and Zhenzhong Liu
Biomimetics 2025, 10(8), 504; https://doi.org/10.3390/biomimetics10080504 - 1 Aug 2025
Cited by 2 | Viewed by 2234
Abstract
The Slime Mould Algorithm (SMA) is a widely used swarm intelligence algorithm. Encouraged by the theory of no free lunch and the inherent shortcomings of the SMA, this work proposes a new variant of the SMA, called the BWSMA, in which three improvement [...] Read more.
The Slime Mould Algorithm (SMA) is a widely used swarm intelligence algorithm. Encouraged by the theory of no free lunch and the inherent shortcomings of the SMA, this work proposes a new variant of the SMA, called the BWSMA, in which three improvement mechanisms are integrated. The adaptive greedy mechanism is used to accelerate the convergence of the algorithm and avoid ineffective updates. The best–worst management strategy improves the quality of the population and increases its search capability. The stagnant replacement mechanism prevents the algorithm from falling into a local optimum by replacing stalled individuals. In order to verify the effectiveness of the proposed method, this paper conducts a full range of experiments on the CEC2018 test suite and the CEC2022 test suite and compares BWSMA with three derived algorithms, eight SMA variants, and eight other improved algorithms. The experimental results are analyzed using the Wilcoxon rank-sum test, the Friedman test, and the Nemenyi test. The results indicate that the BWSMA significantly outperforms these compared algorithms. In the comparison with the SMA variants, the BWSMA obtained average rankings of 1.414, 1.138, 1.069, and 1.414. In comparison with other improved algorithms, the BWSMA obtained average rankings of 2.583 and 1.833. Finally, the applicability of the BWSMA is further validated through two structural optimization problems. In conclusion, the proposed BWSMA is a promising algorithm with excellent search accuracy and robustness. Full article
(This article belongs to the Special Issue Nature-Inspired Metaheuristic Optimization Algorithms 2025)
Show Figures

Figure 1

37 pages, 8314 KB  
Article
Slime Mould Algorithm Based on a Gaussian Mutation for Solving Constrained Optimization Problems
by Gauri Thakur, Ashok Pal, Nitin Mittal, Asha Rajiv and Rohit Salgotra
Mathematics 2024, 12(10), 1470; https://doi.org/10.3390/math12101470 - 9 May 2024
Cited by 9 | Viewed by 2178
Abstract
The slime mould algorithm may not be enough and tends to trap into local optima, low population diversity, and suffers insufficient exploitation when real-world optimization problems become more complex. To overcome the limitations of SMA, the Gaussian mutation (GM) with a novel strategy [...] Read more.
The slime mould algorithm may not be enough and tends to trap into local optima, low population diversity, and suffers insufficient exploitation when real-world optimization problems become more complex. To overcome the limitations of SMA, the Gaussian mutation (GM) with a novel strategy is proposed to enhance SMA and it is named as SMA-GM. The GM is used to increase population diversity, which helps SMA come out of local optima and retain a robust local search capability. Additionally, the oscillatory parameter is updated and incorporated with GM to set the balance between exploration and exploitation. By using a greedy selection technique, this study retains an optimal slime mould position while ensuring the algorithm’s rapid convergence. The SMA-GM performance was evaluated by using unconstrained, constrained, and CEC2022 benchmark functions. The results show that the proposed SMA-GM has a more robust capacity for global search, improved stability, a faster rate of convergence, and the ability to solve constrained optimization problems. Additionally, the Wilcoxon rank sum test illustrates that there is a significant difference between the optimization outcomes of SMA-GM and each compared algorithm. Furthermore, the engineering problem such as industrial refrigeration system (IRS), optimal operation of the alkylation unit problem, welded beam and tension/compression spring design problem are solved, and results prove that the proposed algorithm has a better optimization efficiency to reach the optimum value. Full article
(This article belongs to the Section E1: Mathematics and Computer Science)
Show Figures

Figure 1

14 pages, 321 KB  
Article
Towards a Vector Field Based Approach to the Proper Generalized Decomposition (PGD)
by Antonio Falcó, Lucía Hilario, Nicolás Montés, Marta C. Mora and Enrique Nadal
Mathematics 2021, 9(1), 34; https://doi.org/10.3390/math9010034 - 25 Dec 2020
Cited by 1 | Viewed by 2366
Abstract
A novel algorithm called the Proper Generalized Decomposition (PGD) is widely used by the engineering community to compute the solution of high dimensional problems. However, it is well-known that the bottleneck of its practical implementation focuses on the computation of the so-called best [...] Read more.
A novel algorithm called the Proper Generalized Decomposition (PGD) is widely used by the engineering community to compute the solution of high dimensional problems. However, it is well-known that the bottleneck of its practical implementation focuses on the computation of the so-called best rank-one approximation. Motivated by this fact, we are going to discuss some of the geometrical aspects of the best rank-one approximation procedure. More precisely, our main result is to construct explicitly a vector field over a low-dimensional vector space and to prove that we can identify its stationary points with the critical points of the best rank-one optimization problem. To obtain this result, we endow the set of tensors with fixed rank-one with an explicit geometric structure. Full article
(This article belongs to the Special Issue Applications of Partial Differential Equations in Engineering)
23 pages, 1373 KB  
Article
Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks
by Jie Ji, Guohua Wu, Jinguo Shuai, Zhen Zhang, Zhen Wang and Yizhi Ren
Sensors 2019, 19(18), 3886; https://doi.org/10.3390/s19183886 - 9 Sep 2019
Cited by 4 | Viewed by 2892
Abstract
The privacy and security of the Internet of Things (IoT) are emerging as popular issues in the IoT. At present, there exist several pieces of research on network analysis on the IoT network, and malicious network analysis may threaten the privacy and security [...] Read more.
The privacy and security of the Internet of Things (IoT) are emerging as popular issues in the IoT. At present, there exist several pieces of research on network analysis on the IoT network, and malicious network analysis may threaten the privacy and security of the leader in the IoT networks. With this in mind, we focus on how to avoid malicious network analysis by modifying the topology of the IoT network and we choose closeness centrality as the network analysis tool. This paper makes three key contributions toward this problem: (1) An optimization problem of removing k edges to minimize (maximize) the closeness value (rank) of the leader; (2) A greedy (greedy and simulated annealing) algorithm to solve the closeness value (rank) case of the proposed optimization problem in polynomial time; and (3)UpdateCloseness (FastTopRank)—algorithm for computing closeness value (rank) efficiently. Experimental results prove the efficiency of our pruning algorithms and show that our heuristic algorithms can obtain accurate solutions compared with the optimal solution (the approximation ratio in the worst case is 0.85) and outperform the solutions obtained by other baseline algorithms (e.g., choose k edges with the highest degree sum). Full article
(This article belongs to the Special Issue Threat Identification and Defence for Internet-of-Things)
Show Figures

Figure 1

Back to TopTop