Single objective optimization algorithms are the foundation of establishing more complex methods, like constrained optimization, niching and multi-objective algorithms. Therefore, improvements to single objective optimization algorithms are important because they can impact other domains as well. This paper proposes a method using turning-based mutation that is aimed to solve the problem of premature convergence of algorithms based on SHADE (Success-History based Adaptive Differential Evolution) in high dimensional search space. The proposed method is tested on the Single Objective Bound Constrained Numerical Optimization (CEC2020) benchmark sets in 5, 10, 15, and 20 dimensions for all SHADE, L-SHADE, and jSO algorithms. The effectiveness of the method is verified by population diversity measure and population clustering analysis. In addition, the new versions (Tb-SHADE, TbL-SHADE and Tb-jSO) using the proposed turning-based mutation get apparently better optimization results than the original algorithms (SHADE, L-SHADE, and jSO) as well as the advanced DISH and the jDE100 algorithms in 10, 15, and 20 dimensional functions, but only have advantages compared with the advanced j2020 algorithm in 5 dimensional functions.
For most of differential evolution (DE) algorithm variants, premature convergence is still challenging. The main reason is that the exploration and exploitation are highly coupled in the existing works. To address this problem, we present a novel DE variant that can symmetrically decouple exploration and exploitation during the optimization process in this paper. In the algorithm, the whole population is divided into two symmetrical subpopulations by ascending order of fitness during each iteration; moreover, we divide the algorithm into two symmetrical stages according to the number of evaluations (FEs). On one hand, we introduce a mutation strategy, DE/current/1, which rarely appears in the literature. It can keep sufficient population diversity and fully explore the solution space, but its convergence speed gradually slows as iteration continues. To give full play to its advantages and avoid its disadvantages, we propose a heterogeneous two-stage double-subpopulation (HTSDS) mechanism. Four mutation strategies (including DE/current/1 and its modified version) with distinct search behaviors are assigned to superior and inferior subpopulations in two stages, which helps simultaneously and independently managing exploration and exploitation in different components. On the other hand, an adaptive two-stage partition (ATSP) strategy is proposed, which can adjust the stage partition parameter according to the complexity of the problem. Hence, a two-stage differential evolution algorithm with mutation strategy combination (TS-MSCDE) is proposed. Numerical experiments were conducted using CEC2017, CEC2020 and four real-world optimization problems from CEC2011. The results show that when computing resources are sufficient, the algorithm is competitive, especially for complex multimodal problems.
Based on the current research status of security problems in the Internet of things and the communication characteristics of the internet of things, an Internet of things security protocol model that can resist known plaintext attacks was proposed. It realizes identity authentication, key distribution and data encryption in the process of information interaction. By using Casper and FDR tool to model and formalize the security protocol proposed, the security of this protocol was proved. The performance of the protocol was analyzed by comparing it with other IoT security protocols and calculating the expected network communication overhead.
Generating safe motion plans in real-time is a key requirement for deploying robot manipulators to assist humans in collaborative settings.In particular, robots must satisfy strict safety requirements to avoid self-damage or harming nearby humans.Satisfying these requirements is particularly challenging if the robot must also operate in real-time to adjust to changes in its environment.This paper addresses these challenges by proposing Reachability-based Signed Distance Functions (RDFs) as a neural implicit representation for robot safety.RDF, which can be constructed using supervised learning in a tractable fashion, accurately predicts the distance between the swept volume of a robot arm and an obstacle.RDF's inference and gradient computations are fast and scale linearly with the dimension of the system; these features enable its use within a novel real-time trajectory planning framework as a continuoustime collision-avoidance constraint.The planning method using RDF is compared to a variety of state-of-the-art techniques and is demonstrated to successfully solve challenging motion planning tasks for high-dimensional systems faster and more reliably than all tested methods.Code, data, and video demonstrations can be found at https://roahmlab.github.
ABSTRACT The antigentrification campaign has gained global attention because it is crucial for realising social justice, particularly against displacement. Numerous literature has focused on government management, however, there is a dearth of research on the resistance undertaken by the potential displacees. Therefore, this paper explores villagers' survivability when facing displacement threats within China's guanxi society. The guanxi provides a fresh lens on Chinese social development, distiling intergroup relationships into four states that reveal power dynamics within gentrification and enable a nuanced analysis of displacement and resistance. The case of Xiaozhou Village is examined, tracing villagers' living dynamics over the past three decades. The study reveals that villagers have effectively resisted sociocultural displacement pressure and exclusionary displacement by maintaining or preserving their fields. Guanxi provides a perspective for examining how villagers legally possess capital, engage in habitus‐driven competition against gentrifiers, and ultimately support their community cohesion. This paper contributes to a deeper understanding of the uneven micro‐geopolitics of gentrification and offers insights into the effective mitigation of displacement.
In this paper, the coevolution mechanism of trust-based partner switching among partitioned regions on an adaptive network is studied. We investigate a low-information approach to building trust and cooperation in public goods games. Unlike reputation, trust scores are only given to players by those with whom they have a relationship in the game, depending on the game they play together. A player's trust score for a certain neighbor is given and known by that player only. Players can adjust their connections to neighbors with low trust scores by switching their partners to other players. When switching partners, players divide other nodes in the network into three regions: immediate neighbors as the known region, indirectly connected second-order neighbors as the intermediate region, and other nodes as the unknown region. Such choices and compartmentalization often occur in global and regional economies. Our results show that preference for switching to partners in the intermediate region is not conducive to spreading cooperation, while random selection has the disadvantage of protecting the cooperator. However, selecting new partners in the remaining two regions based on the average trust score of the known region performs well in both protecting partners and finding potential cooperators. Meanwhile, by analyzing the parameters, we find that the influence of vigilance increasing against unsatisfactory behavior on evolution direction depends on the level of cooperation reward.
With the dependent relationship of tasks submitted by the users in the model of Cloud computing resources scheduling become stronger and stronger, it is worthy of studying how to optimize the scheduling strategy and algorithm to meet the different demands of the users, and it is absolutely importance. In this article, the author analysed the factors that will affect the entire task-sets execution firstly. Then proposed a new tasks scheduling model based on the original priority calculation method and the idea of redundant duplication of tasks. In the phase of tasks scheduling in the model, the execution results of all parent tasks of the subtask that being executing are considered. The costs of communication between task-sets has reduced by the method of redundant duplication of tasks, so that the execution time of some subtasks share be advanced, and the entire execution efficiency of task-sets can be increased. At the end of this article, from the comparative results of the space-time complexity of contrast algorithms and the algorithm proposed by the author during the process of processing dependent tasks, we can find that subtasks execution time can be advanced and the complete time of the whole task-set can be cut down to a certain extent