Reference Hub6
A Complementary Cyber Swarm Algorithm

A Complementary Cyber Swarm Algorithm

Peng-Yeng Yin, Fred Glover, Manuel Laguna, Jia-Xian Zhu
Copyright: © 2011 |Volume: 2 |Issue: 2 |Pages: 20
ISSN: 1947-9263|EISSN: 1947-9271|EISBN13: 9781613509326|DOI: 10.4018/jsir.2011040102
Cite Article Cite Article

MLA

Yin, Peng-Yeng, et al. "A Complementary Cyber Swarm Algorithm ." IJSIR vol.2, no.2 2011: pp.22-41. http://doi.org/10.4018/jsir.2011040102

APA

Yin, P., Glover, F., Laguna, M., & Zhu, J. (2011). A Complementary Cyber Swarm Algorithm . International Journal of Swarm Intelligence Research (IJSIR), 2(2), 22-41. http://doi.org/10.4018/jsir.2011040102

Chicago

Yin, Peng-Yeng, et al. "A Complementary Cyber Swarm Algorithm ," International Journal of Swarm Intelligence Research (IJSIR) 2, no.2: 22-41. http://doi.org/10.4018/jsir.2011040102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

A recent study (Yin et al., 2010) showed that combining particle swarm optimization (PSO) with the strategies of scatter search (SS) and path relinking (PR) produces a Cyber Swarm Algorithm that creates a more effective form of PSO than methods that do not incorporate such mechanisms. This paper proposes a Complementary Cyber Swarm Algorithm (C/CyberSA) that performs in the same league as the original Cyber Swarm Algorithm but adopts different sets of ideas from the tabu search (TS) and the SS/PR template. The C/CyberSA exploits the guidance information and restriction information produced in the history of swarm search and the manipulation of adaptive memory. Responsive strategies using long term memory and path relinking implementations are proposed that make use of critical events encountered in the search. Experimental results with a large set of challenging test functions show that the C/CyberSA outperforms two recently proposed swarm-based methods by finding more optimal solutions while simultaneously using a smaller number of function evaluations. The C/CyberSA approach further produces improvements comparable to those obtained by the original CyberSA in relation to the Standard PSO 2007 method (Clerc, 2008).

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.