Paper
28 February 2024 Deployment of optoelectronic devices based on improved NSGA-II
Hua Gong, Guoshuang Sui, Ke Xu, Wenjuan Sun, Yiying Shi
Author Affiliations +
Proceedings Volume 13071, International Conference on Mechatronic Engineering and Artificial Intelligence (MEAI 2023); 1307116 (2024) https://doi.org/10.1117/12.3025526
Event: International Conference on Mechatronic Engineering and Artificial Intelligence (MEAI 2023), 2023, Shenyang, China
Abstract
In order to improve the security of the defended targets in our region and efficiently utilize various types of optoelectronic devices, the research is conducted on optoelectronic devices deployment within the region. With the objectives of maximizing the protection effectiveness and minimizing devices operational cost, a multi-objectives optimization model is established by considering constraints such as devices-target visibility conditions and device types, quantities, etc. Non-dominated sorting genetic algorithmⅡ (NSGA-Ⅱ) improved by Q-learning is designed to solve the model. To address the difficulty of fixed parameter settings adapting to dynamic changes, Q-learning is adopted to adaptively adjust the crossover probability and variation probability. In order to search for Pareto front solutions that are close to the global optimal more efficiently. The correctness of the model and the effectiveness of the algorithm are verified through simulation examples.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Hua Gong, Guoshuang Sui, Ke Xu, Wenjuan Sun, and Yiying Shi "Deployment of optoelectronic devices based on improved NSGA-II", Proc. SPIE 13071, International Conference on Mechatronic Engineering and Artificial Intelligence (MEAI 2023), 1307116 (28 February 2024); https://doi.org/10.1117/12.3025526
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Optoelectronic devices

Mathematical optimization

Instrument modeling

Defense and security

Genetic algorithms

Genetics

Back to Top