Optimal Design of Truss-Plate Structures Using Two Improved Random Optimization Algorithms

Article Preview

Abstract:

The size optimization of truss-plate composite structure is presented in this paper. Two improved random optimization algorithms, heuristic particle swarm optimizer (HPOS) and quick search optimizer (QGSO), are combined with finite element method to achieve the optimal design of truss-plate structure. The discrete variables are converted by the mapping function method. An example of the composite structure is given to test this two improved random optimization algorithms. The results show that the QGSO have a better convergence rate than the HPSO in the early time. They are all converged at the same fitness value and feasible on composite structure optimization.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 163-167)

Pages:

2361-2364

Citation:

Online since:

December 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Y.C. Lam, D. Manickarajah, A. Bertolini. International Journal of Solids and Structures, Vol. 38 (2001), pp.8593-8616.

Google Scholar

[2] Li-juan Li, Xiao-tong Xu, Feng Liu. Advances in Structural Engineering, Vol. 13 (2010), pp.43-51.

Google Scholar

[3] Li L.J., Huang Z.B., Liu F. and Wu Q.H. Computers & Structures Vol. 85 (2007), pp.340-349.

Google Scholar

[4] L.J. Li, Z.B. Huang, F. Liu. Computers & Structures Vol. 87 (2009), p.435–443.

Google Scholar

[5] Kennedy, J. and Eberhart, R. C. (2001) Swarm Intelligence. Morgan Kaufmann Publishers.

Google Scholar

[6] S. He, Q.H. Wu. 2006 IEEE Congress on Evolutionary Computation, (2006), pp.4415-4421.

Google Scholar

[7] S. He, Q.H. Wu, J.Y. Wen, J.R. Saunders, R.C. Paton. Biosystems, Vol. 78 (2004), pp.135-147.

Google Scholar

[8] LJ Li, ZB Huang, F Liu. Computers and Structures, Vol. 87 (2009), pp.435-443.

Google Scholar

[9] Qin Guang, Liu Feng, Li Lijuan. 2009 International Conference on Computational Intelligence and Security, (2009), pp.249-253.

Google Scholar