Citation: | DAI Chaohua, ZHU Yunfang, CHEN Weirong. Cloud Theory-Based Genetic Algorithm[J]. Journal of Southwest Jiaotong University, 2006, 19(6): 729-732. |
HOLLAND J H.Adaptation in natural and artificial system[M]. Cambridge:MIT Press,1975:100-120.[2] 张葛祥,金炜东.量子遗传算法的改进及其应用[J]. 西南交通大学学报,2003,38(6):717-722.ZHANG Gexiang,JIN Weidong.Improvement of quantum genetic algorithm and its application[J]. Journal of Southwest Jiaotong University,2003,38(6):717-722.[3] SRINIVAS M,PATNAIK L M.Adaptive probabilities of crossover and mutation in genetic algorithm[J]. IEEE Transactions on System,Man and Cybernetics,1994,24(4):656-667.[4] 王小平,曹立明.遗传算法--理论、应用与软件实现[M]. 西安:西安交通大学出版社,2002:20-100.[5] 李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J]. 计算机研究与发展,1995,32(6):15-20.LI Deyi,MENG Haijun,SHI Xuemei.Membership clouds and membership cloud generators[J]. Journal of Computer Research and Development,1995,32(6):15-20.[6] 张飞舟,范跃祖,沈程智,等.基于隶属云发生器的智能控制[J]. 航空学报,1999,20(1):89-92.ZHANG Feizhou,FAN Yuezu,SHEN Chengzhi,et al.Intelligent control based membership cloud generators[J]. Acta Aeronautica et Astronautica Sinica,1999,20(1):89-92.[7] WANG Shuliang,LI Deren,SHI Wenzhong,et al.Cloud model-based spatial data mining[J]. Geographical Information Science,2003,9(2):7-78.[8] 李兴生.基于云模型和数据场的分类和聚类挖掘研究[D]. 南京:中国人民解放军理工大学,2003:16-19.[9] 赵卫伟,李德毅.基于云模型的入侵检测方法[J]. 计算机工程与应用,2003,39(26):158-160.ZHAO Weiwei,LI Deyi.Intrusion detection using cloud model[J]. Computer Eng.and Appl.,2003,39 (26):158-160.[10] 宋远骏,杨孝宗,李德毅,等.考虑环境因素的计算机可靠性云模型评价[J]. 计算机研究与发展,2001,38(5):631-636.SONG Yuanjun,YANG Xiaozong,LI Deyi,et al.Reliability count evaluation of computers based on cloud models for environmental factors[J]. Journal of Computer Research and Development,2001,38 (5):631-636.[11] 刘常昱,李德毅,杜鹢,等.正态云模型的统计分析[J]. 信息与控制,2005,34(2):236-239.LIU Changyu,LI Deyi,DU Yi,et al.Some statistical analysis of the normal cloud model[J]. Information and Control,2005,4(2):236-239.
|