A novel chaotic PSO algorithm based on tent map and its application to mechanical design

被引:0
|
作者
Wu, Meixian [1 ]
Zhang, Xueliang [1 ]
Zhang, Dongli [2 ]
机构
[1] School of Mechanical Engineering, Taiyuan University of Science and Technology, Taiyuan 030024, China
[2] School of Information and Communication Engineering, North University of China, Taiyuan 030051, China
来源
关键词
11;
D O I
10.12733/jics20101673
中图分类号
学科分类号
摘要
引用
收藏
页码:1789 / 1795
相关论文
共 50 条
  • [41] Tent Chaotic Map and Population Classification Evolution Strategy-Based Dragonfly Algorithm for Global Optimization
    Wang, Yu
    Zhang, Xia
    Yu, Dao-Jie
    Bai, Yi-Jie
    Du, Jian-Ping
    Tian, Zhou-Tai
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [42] Improved PSO algorithm based on chaos theory and its application to design flood hydrograph
    Dong, Si-Fang
    Dong, Zeng-Chuan
    Ma, Jun-Jian
    Chen, Kang-Ning
    WATER SCIENCE AND ENGINEERING, 2010, 3 (02) : 156 - 165
  • [44] A new perturbation method to the Tent map and its application
    Wang Xing-Yuan
    Wang Lin-Lin
    CHINESE PHYSICS B, 2011, 20 (05)
  • [45] A New Strategy of Chaotic PSO and Its Application in Optimization Design for Pipe Network
    Pan Guangyuan
    Qa Junfei
    Han Honggui
    2013 32ND CHINESE CONTROL CONFERENCE (CCC), 2013, : 8022 - 8027
  • [46] A new perturbation method to the Tent map and its application
    王兴元
    王林林
    Chinese Physics B, 2011, 20 (05) : 195 - 202
  • [47] Comparison of the adaptive inertia weight PSOs based on chaotic logistic map and tent map
    Cheng, Yu-Huei
    Kuo, Che-Nan
    Lai, Ching-Ming
    2017 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION (IEEE ICIA 2017), 2017, : 355 - 360
  • [49] An image encryption method based on Tent chaotic map in DCT domain
    Song, Jianhua
    Ding, Qun
    MECHANICS, SOLID STATE AND ENGINEERING MATERIALS, 2011, 279 : 456 - 460
  • [50] Image Encryption Based on Chaotic Tent Map in Time and Frequency Domains
    Hassani, Elham
    Eshghi, Mohammad
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 5 (01): : 97 - 110