An Investigation and Comparison of Invasive Weed, Flower Pollination and Krill Evolutionary Algorithms
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 7
Abstract
Being inspired by natural phenomena and available biological processes in the nature is one of the difficult methods of problem solving in computer sciences. Evolutionary methods are a set of algorithms that are inspired from the nature and are based on their evolutionary mechanisms. Unlike other optimizing methods of problem solving, evolutionary algorithms do not require any prerequisites and usually offer solutions very close to optimized answers. Based on their behavior, evolutionary algorithms are divided into two categories of biological processes based on plant behavior and animal behavior. Various evolutionary algorithms have been proposed so far to solve optimization problems, some of which include evolutionary algorithm of invasive weed and flower pollination algorithm that are inspired by plants and krill algorithm inspired by the animal algorithm of sea animals. In this paper, a comparison is made for the first time between the accuracy and rate of involvement in local optimization of these new evolutionary algorithms to identify the best algorithm in terms of efficiency. Results of various tests show that invasive weed algorithm is more efficient and accurate than flower pollination and krill algorithms.
Authors and Affiliations
Marjan Abdeyazdan, Samaneh Dehno, Sayyed Tarighinejad
FTL Algorithm using Warm Block Technique for QLC+SLC Hybrid NAND Flash Memory
When applying the existing flash translation layer technique to a mixed NAND flash storage device composed of Quad Level Cell and Single Level Cell, because the characteristics of a semiconductor chip are not taken into...
IDENTIFICATION OF EMPLOYEES USING RFID IN IE-NTUA
During the last decade with the rapid increase in indoor wireless communications, location-aware services have received a great deal of attention for commercial, public-safety, and a military application, the greatest ch...
A Robust Audio Watermarking Technique Operates in MDCT Domain based on Perceptual Measures
the review presents a digital audio watermarking technique operating in the frequency domain with two variants. This technique uses the Modified Discrete Cosine Transform (MDCT) to move to the frequency domain. To ensure...
Relevance of the Indicators Observed in the Measurement of Social Resilience
This article scrutinizes the validation of the observed properties by the experts in the study of social resilience. To that purpose, it utilizes the method of factorial analysis of multi-correspondences (ACM) in the ref...
Recommender System based on Empirical Study of Geolocated Clustering and Prediction Services for Botnets Cyber-Intelligence in Malaysia
A recommender system is becoming a popular platform that predicts the ratings or preferences in studying human behaviors and habits. The predictive system is widely used especially in marketing, retailing and product dev...