Abstract
Background: Limitations exist in traditional optimization algorithms. Studies show that bio-inspired alternatives have overcome these drawbacks. Bio-inspired algorithm mimics the characteristics of natural occurrences to solve complex problems. Particle swarm optimization, firefly algorithm, bat algorithms, gray wolf optimizer, among others are examples of bio-inspired algorithms. Researchers make certain assumptions while designing these models which limits their performance in some optimization domains. Efforts to find a solution to deal with these challenges leads to the multiplicity of variants.
Objectives: This study explores the improvement strategies in four popular swarm intelligence in the literature. Specifically, particle swarm optimization, firefly algorithm, bat algorithm, and gray wolf optimizer. It also tries to identify the exact modification position in the algorithm kernel that yielded the positive outcome. The primary goal is to understand the trends and the relationship in their performance.
Methods: The best evidence review methodology approach is employed. Two ancient but valuable and two recent and efficient swarm intelligence, are selected for this study.
Results: Particle swarm optimization, firefly algorithm, bat algorithm, and gray wolf optimizer exhibit local optima entrapment in their standard states. The same enhancement strategy produced effective outcome across these four swarm intelligence. The exact approach is chaotic-based optimization. However, the implementation produced the desired result at different stages of these algorithms.
Conclusion: Every bio-inspired algorithm comprises two or more updating functions. Researchers need a proper guide on what and how to apply a strategy for an optimum result.
Keywords: Computational optimization, metaheuristic, swarm intelligence, particle swarm optimization, firefly algorithm, bat algorithm, grey wolf optimizer.
Graphical Abstract
[http://dx.doi.org/10.1201/9780429445927-6]
[http://dx.doi.org/10.1007/s13369-017-2471-9]
[http://dx.doi.org/10.1109/ICNN.1995.488968]
[http://dx.doi.org/10.1109/CEC.1999.785513]
[http://dx.doi.org/10.1007/BFb0040812]
[http://dx.doi.org/10.1016/j.chaos.2004.11.095]
[http://dx.doi.org/10.1109/IranianCIS.2014.6802527]
[http://dx.doi.org/10.1504/IJSI.2013.055801]
[http://dx.doi.org/10.5267/j.ijiec.2010.01.001]
[http://dx.doi.org/10.1016/j.jcp.2007.06.008]
[http://dx.doi.org/10.1016/j.cnsns.2012.06.009]
[http://dx.doi.org/10.1109/81.933333]
[http://dx.doi.org/10.1504/IJBIC.2013.055093]
[http://dx.doi.org/10.1016/j.ijepes.2014.07.058]
[http://dx.doi.org/10.1016/j.asoc.2014.10.010]
[http://dx.doi.org/10.1016/j.advengsoft.2013.12.007]
[http://dx.doi.org/10.1109/IDAACS.2017.8095129]