27.06.2013 Views

Evolution and Optimum Seeking

Evolution and Optimum Seeking

Evolution and Optimum Seeking

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The Two Membered <strong>Evolution</strong> Strategy 115<br />

5.1.4 The Treatment of Constraints<br />

Inequality constraints Gj(x) 0 for all j = 1(1)m are quite acceptable. Sign conditions<br />

may be formulated in the same manner <strong>and</strong> do not receive anyspecial treatment. In<br />

contrast to linear <strong>and</strong> non-linear programming, no sign conditions need to be set in order<br />

to keep within a bounded region. If a mutation falls in the forbidden region it is assessed<br />

as a worsening (in the sense of a lethal mutation) <strong>and</strong> the variation of the variables is not<br />

accepted.<br />

No particular penalty function, such asRosenbrock chooses for his method of rotating<br />

coordinates, has been developed for the evolution strategy. The user is free to use the<br />

techniques for example of Carroll (1961), Fiacco <strong>and</strong> McCormick (1968), or B<strong>and</strong>ler <strong>and</strong><br />

Charalambous (1974), to construct a suitable sequence of substitute objective functions<br />

<strong>and</strong> to solve the original constrained problem as a sequence of unconstrained problems.<br />

This, however, can be done outside the procedure.<br />

It is sometimes di cult to specify an allowed initial vector of the variables. If one were<br />

to wait until by chance a mutation satis ed all the constraints, it could take avery long<br />

time. Besides, during this search period the success checks could not be carried out as<br />

described above. It would nevertheless be desirable to apply the normal search algorithm<br />

e ectively to nd an allowed state. Box (1965) has given in the description of his complex<br />

method a simple way of proceeding from a forbidden starting point. He constructs an<br />

auxiliary objective function from the sum of the constraint function values of the violated<br />

constraints:<br />

mX<br />

~F (x) = Gj(x) j(x)<br />

where<br />

j(x) =<br />

j=1<br />

( ;1 if Gj(x) < 0<br />

0 otherwise<br />

(5.7)<br />

Each decrease in the value of ~F(x) represents an approach to the feasible region. When<br />

eventually ~ F(x) = 0, then x satis es all the constraints <strong>and</strong> can serve as a starting vector<br />

for the optimization proper. This procedure can be taken over without modi cation for<br />

the evolution strategy.<br />

5.1.5 Further Details of the Subroutine EVOL<br />

In Appendix B, Section B.1 a complete FORTRAN listing is given of a subroutine corresponding<br />

to the two membered evolution scheme that has been described. Thus no<br />

detailed algorithm will be formulated here, but a few further programming details will be<br />

mentioned.<br />

In nearly all digital computers there are library subroutines for generating uniformly<br />

distributed pseudor<strong>and</strong>om numbers. They work, as a rule, according to the multiplicative<br />

or additive congruence method (see Johnk, 1969 Niederreiter, 1992 Press et al., 1992).<br />

From any two numbers taken at r<strong>and</strong>om from a uniform distribution in the range [0 1], by<br />

using the transformation rules of Box <strong>and</strong> Muller (1958) one can generate two independent,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!