Abstract
Clonal Selection Algorithm (CSA), inspired by the clonal selection theory, has gained much attention and wide applications. In most common forms, the CSAs use a binary representation of variables, and the emulated immune operators, mutation, proliferation, selection, for example, are made to act on it. However, the binary representation often suffers from the so-called Hamming Cliff problem. In order to overcome this problem, a Gray-coded CSA is presented and used to solve optimization problems. The algorithm is applied to numerous bench-mark problems of numerical optimization problems and the computational results show effectiveness of the proposed algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Afaneh, S., Zitar, R.A., Alhamami, A.: Virus detection using clonal selection algorithm with genetic algorithm (VDC algorithm). Appl. Soft Comput. 13(1), 239–246 (2013)
Bayar, N., Darmoul, S., Hajri-Gabouj, S., Pierreval, H.: Fault detection, diagnosis and recovery using artificial immune systems: a review. Eng. Appl. Artif. Intell. 46(Part A), 43–57 (2015)
Burnet, F.M.: The Clonal Selection Theory of Acquired Immunity. Cambridge Press, New York (1959)
Gao, S., Vairappan, C., Wang, Y., Cao, Q., Tang, Z.: Gravitational search algorithm combined with chaos for unconstrained numerical optimization. Appl. Math. Comput. 231, 48–62 (2014)
Goldsby, R.A., Kindt, T.J., Osborne, B.A., Kuby, J.: Immunology. W. H. Freeman Co., New York (2002)
Inkaya, T., Kayaligil, S., Evin Özdemirel, N.: Ant colony optimization based clustering methodology. Appl. Soft Comput. 28, 301–311 (2015)
U.S. Department of Health, Human Services National Institutes of Health: Understanding The Immune System - How It Works. NIH Publication (2003)
Ryu, T., Kanemaru, T., Kataoka, S., Arihama, K., Yoshitake, A., Arakawa, D., Ando, J.: Optimization of energy saving device combined with a propeller using real-coded genetic algorithm. Int. J. Naval Archit. Ocean Eng. 6(2), 406–417 (2014)
Seresht, N.A., Azmi, R.: MAIS-IDS: a distributed intrusion detection system using multi-agent AIS approach. Eng. Appl. Artif. Intell. 35, 286–298 (2014)
Stibor, T.: Foundations of r-contiguous matching in negative selection for anomaly detection. Nat. Comput. 8(3), 613–641 (2008)
Wang, J., Liao, J., Zhou, Y., Cai, Y.: Differential evolution enhanced with multiobjective sorting-based mutation operators. IEEE Trans. Syst. Man. Cybern. 44(12), 2792–2805 (2014)
Yao, X., Liu, Y., Lin, G.: Evolutionary programming made faster. IEEE Trans. Evol. Comput. 3(2), 82–102 (1999)
Zhang, Y.D., Wang, S.H., Wu, L.N., Huo, Y.K.: Artificial immune system for protein folding model. JCIT J. Convergence Inf. Technol. 6(1), 55–61 (2011)
Zuo, X.Q., Fan, Y.S.: A chaos search immune algorithm with its application to neuro-fuzzy controller design. Chaos Solitons Fractals 30(1), 94–109 (2006)
Acknowledgements
This work was supported by the Prospective Joint Research of University-Industry Cooperation of Jiangsu (No. BY2015248, BY2016056-02), the Six Talent Peaks Project of Jiangsu (No. XXRJ-013), Lianyungang Science and Technology Project (No. CG1413, CG1501), and the Natural Science Foundation of Huaihai Institute of Technology (No. z2015005, z2015012).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Dai, H., Yang, Y. (2016). Gray-Coded Clonal Selection Algorithm for Optimization Problem. In: Yin, H., et al. Intelligent Data Engineering and Automated Learning – IDEAL 2016. IDEAL 2016. Lecture Notes in Computer Science(), vol 9937. Springer, Cham. https://doi.org/10.1007/978-3-319-46257-8_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-46257-8_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-46256-1
Online ISBN: 978-3-319-46257-8
eBook Packages: Computer ScienceComputer Science (R0)