2013 XXIV International Conference on Information, Communication and Automation Technologies (ICAT) 2013
DOI: 10.1109/icat.2013.6684072
|View full text |Cite
|
Sign up to set email alerts
|

A novel evolution strategy for constrained optimization in engineering design

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…CMA-ES has been also integrated with ASCHEA, an approach proposed in [51] to adapt the tolerances on the equality constraints [39]. Other approaches rank individuals based on three independent rankings [52], namely objective function, constraint violation, and number of violated constraints, or use surrogate models to learn information about constraints [37], [40]. A repair mechanism was used in a problem-specific variant of CMA-ES for financial optimization [42].…”
Section: A Methods Based On Cma-esmentioning
confidence: 99%
“…CMA-ES has been also integrated with ASCHEA, an approach proposed in [51] to adapt the tolerances on the equality constraints [39]. Other approaches rank individuals based on three independent rankings [52], namely objective function, constraint violation, and number of violated constraints, or use surrogate models to learn information about constraints [37], [40]. A repair mechanism was used in a problem-specific variant of CMA-ES for financial optimization [42].…”
Section: A Methods Based On Cma-esmentioning
confidence: 99%
“…An approach performs selection based on three feasibility rules [16]: feasible individuals are compared on objectives, infeasible ones are compared on total constraint violations, and feasible individuals are always ranked before infeasible ones. Similarly, a recently proposed method modifies the ranking of individuals based on three independent rankings: by objective function, by constraint violation amount, and by number of violated constraints depending on if the solution is feasible or infeasible [17]. Other approaches reduce the probability of generating infeasible solutions when in the proximity of the constraint, by moving the mean of the population [18] or by explicitly controlling the step size using a lower bound [7].…”
Section: Related Workmentioning
confidence: 99%