A chaos search immune algorithm with its application to neuro-fuzzy controller design

被引:63
作者
Zuo, X. Q. [1 ]
Fan, Y. S. [1 ]
机构
[1] Tsinghua Univ, Dept Automat, Beijing 100084, Peoples R China
基金
中国博士后科学基金;
关键词
D O I
10.1016/j.chaos.2005.08.126
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
In this paper, a chaos search immune algorithm (CSIA) is proposed by integrating the chaos optimization algorithm and the clonal selection algorithm. First, optimization variables are expressed by chaotic variables through solution space transformation. Then, taking advantages of the ergodic and stochastic properties of chaotic variables, a chaos search is performed in the neighbourhoods of high affinity antibodies to exploit local solution space, and the motion of the chaotic variables in their ergodic space is used to explore the whole solution space. Furthermore, a generalized radial basis function neuro-fuzzy controller (GRBFNFC) is constructed and designed automatically by the proposed CSIA. Application of the CSIA-designed GRBFNFC to real-time control of an inverted pendulum system is discussed. Experimental results demonstrate that the designed GRBFNFC has very satisfactory performance. (c) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:94 / 109
页数:16
相关论文
共 25 条
[1]   Periodic solutions and chaos in a non-linear model for the delayed cellular immune response [J].
Canabarro, AA ;
Gléria, IM ;
Lyra, ML .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2004, 342 (1-2) :234-241
[2]  
Chen G., 1998, CHAOS ORDER METHODOL
[3]  
Cheng F Y, 1995, INFORM CONTR, p[24, 189]
[4]   Shape optimization of electromagnetic devices using immune algorithm [J].
Chun, JS ;
Kim, MK ;
Jung, HK ;
Hong, SK .
IEEE TRANSACTIONS ON MAGNETICS, 1997, 33 (02) :1876-1879
[5]  
Dasgupta D., 1996, P 5 INT C INT SYST R, P19
[6]  
DASGUPTA D, 1995, CS955 U NEW MEX DEP
[7]  
de Castro LeandroN., 2002, ARTIFICIAL IMMUNE SY
[8]   Learning and optimization using the clonal selection principle [J].
de Castro, LN ;
Von Zuben, FJ .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (03) :239-251
[9]  
Forrest S., 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P202, DOI 10.1109/RISP.1994.296580
[10]  
GOLDBERG DE, 1989, GENETIC ALGORITHM SE