Next Article in Journal
A Ground Moving Target Detection Method for Seismic and Sound Sensor Based on Evolutionary Neural Networks
Previous Article in Journal
The Importance of Rehabilitation Programs Using Balneary Treatments in Patients with Spinal Cord Injury
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Editorial

Special Features and Applications on Applied Metaheuristic Computing

1
Information Technology and Management Program, Ming Chuan University, No. 5 De Ming Rd., Gui Shan District, Taoyuan City 333, Taiwan
2
Department of Engineering Science and Ocean Engineering, National Taiwan University, Taipei 106, Taiwan
*
Author to whom correspondence should be addressed.
Appl. Sci. 2022, 12(18), 9342; https://doi.org/10.3390/app12189342
Submission received: 14 September 2022 / Accepted: 14 September 2022 / Published: 18 September 2022
(This article belongs to the Topic Applied Metaheuristic Computing)

1. Introduction

In recent years, many important yet complex problems, either continuous or combinatorial, suffer the intractability of the problem of nature. This is because the classic exact methods are constrained with strict assumptions, such as differentiability or linearity for continuous objective functions or constrained size for combinatorial problems. Instead of using exact methods such as calculus or mathematical programming, heuristics have been used as alternatives for seeking approximation solutions. However, it is argued that the error bound of the solutions obtained by heuristics to the optimal ones is usually loose and it is not acceptable for some accuracy-critical applications, as in finance and security domains. Moreover, the heuristics are problem-dependent and lack generalization for solving various genuine problems. Applied Metaheuristic Computing (AMC) has emerged as a prevailing optimization technique for tackling perplexing engineering and business problems. This is partly due to AMC’s ability to guide the search course beyond the local optimality, which impairs the capability of traditional heuristics, and partly due to AMC providing general frameworks which can be applied to solve a broad range of problems. We have witnessed many successful AMC applications in various domains, such as scheduling, routing, ordering, bin packing, assignment, facility layout planning, renewable energy, portfolio optimization, classification, and forecasting, among others. The aim of this topic series was to collect quality papers proposing cutting-edge methodology and innovative applications which drive the advances of AMC. The manuscript submission to this topic series was closed on 31 March 2022. We received 116 submissions and 33 papers were published. The acceptance rate is 28%. Due to the success of this topic series, we are launching the second volume to collect more cutting-edge papers in the field of AMC.

2. Special Features on AMC

The most commonly seen AMC algorithms include genetic algorithm (GA), genetic programming (GP), evolutionary strategy (ES), evolutionary programming (EP), memetic algorithm (MA), particle swarm optimization (PSO), ant colony optimization (ACO), artificial bee colony (ABC), differential evolution (DE), firefly algorithm (FA), simulated annealing (SA), tabu search (TS), scatter search (SS), variable neighborhood search (VNS), and GRASP, to name a few. In this topic series, we considered special features which have been adopted to enhance the effectiveness of AMC. One notable feature is to apply metaheuristics to learn the architecture of neural networks or to optimize the hyperparameters of machine learning algorithms. The first paper, authored by J. Chou, T. Pham, and C. Ho, developed a metaheuristic-optimized machine-learning algorithm for multi-level classification in civil and construction engineering [1]. In particular, the FA fine-tunes the hyperparameters of the least squares support vector machine (LSSVM) to construct an optimized LSSVM multi-level classification model. The second paper, authored by R. Caraka, H. Yasin, R. Chen, N. Goldameir, B. Supatmanto, T. Toharudin, M. Basyuni, P. Gio, and B. Pardamean, used GA to evolve a hybrid cascade neural network for space–time pollution data forecasting [2]. The third paper, authored by S. Jiao, C. Wang, R. Gao, Y. Li, and Q. Zhang, improved the Harris Hawks optimization algorithm by a multi-strategy search. The proposed method was used to optimize the LSSVM to model the reactive power output [3].
The other fast-growing research direction in AMC is developing a multi-objective optimization framework for various metaheuristics. The paper authored by I. Masich, M. Kulachenko, P. Stanimirović, A. Popov, E. Tovbis, A. Stupina, and I. Kazakovtsev proposed a multi-criteria genetic algorithm for pattern generation in logical data analysis. The proposed method has a flexibility of allowing the pattern to maximally cover the objects in the target class and minimize the covered objects in the opposite class. The generated patterns by using the multi-criteria genetic algorithm are more meaningful than using the traditional fuzzy approaches [4]. The paper by A. Alqaili, M. Qais, and A. Al-Mansour developed a new discrete multi-objective integer search algorithm to optimize the road pavement performance and minimize the maintenance cost at the same time [5]. The paper by B. Changaival, K. Lavangnananda, G. Danoy, D. Kliazovich, F. Guinand, M. Brust, J. Musial, and P. Bouvry applied the NSGA-II, which is a famous multi-objective version of GA, for determining the optimal station locations of carsharing fleet service [6]. The objectives for setting fleet stations include maximum user coverage, least walking distance, and flexibility for returning. The paper authored by R. Díaz, E. Solares, V. de-León-Gómez, and F. Salas tackled the portfolio optimization problem by using a three-phase multi-objective approach [7]. In the first phase, an artificial neural network was constructed to predict the stock price. Then, an EA was applied to select the stocks. Finally, MOEA/D, which is a multi-objective EA, was adopted to optimize the stock portfolio considering multiple criteria.

3. Special Applications on AMC

In addition to classic AMC applications, we saw some special applications in this topic series. There are four papers which address efficient methods of energy management. The first paper by H. Lin, P. Wang, W. Lin, K. Chao, and Z. Yang analyzed the attack sources of robot networks (botnets) for a renewable energy management system [8]. The authors applied a revised locust swarm optimization algorithm to search near-global optima of the most probable attack paths via the internet protocol traceback schemes. The second paper, authored by M. Kara, A. Laouid, M. AlShaikh, M. Hammoudeh, A. Bounceur, R. Euler, A. Amamra, and B. Laouid proposed a multi-round Proof of Work (PoW) consensus algorithm for preserving energy consumption and resisting attacks [9]. The other two papers deal with power microgrid operations. The paper authored by T. Nguyen, T. Ngo, T. and Dao, T. Nguyen proposed an improved sparrow search algorithm by incorporating the mutation mechanism of the firefly algorithm [10]. The improved version ensures the share of green power generation and a safe symmetry power grid among distributed clean power sources. The last paper, authored by N. Ning, Y. Liu, H. Yang, and L. Li presented a scheme for efficiently running an energy storage station. An improved aquila optimizer for the optimal configuration of the combined cooling, heating, and power microgrid was proposed to symmetrically enhance the economic and environmental protection performance [11].
AMC has intensively contributed to improve information security. The paper by R. Abu Khurma, I. Almomani, and I. Aljarah, proposed an IoT botnet intrusion detection system (IDS) by hybridizing the salp swarm algorithm (SSA) and ant lion optimization (ALO) [12]. The proposed method outperformed several existing approaches in terms of standard performance measures. The paper authored by L. Wang, L. Gu, and Y. Tang developed an IDS to deal with massive redundant alarms when monitoring the frequent occurrence of network security events [13]. The proposed method uses the whale optimization algorithm to conduct an alarm hierarchical clustering. The results showed that the proposed algorithm can effectively reduce the load of IDS and staff. The paper authored by A. Aldallal, and F. Alisa presented another IDS to secure data in cloud cyberspace using a hybrid metaheuristic. The method combines a support vector machine and a GA to enhance the detection rate [14]. The paper by M. Madbouly, Y. Mokhtar, and S. Darwish employed a quantum game theory approach to select the optimal recovery method for mobile databases as a response to environmental failures in mobile computing such as the number of processes, the time needed to send messages, and the number of messages logged-in time [15]. The paper authored by J. Pan, X. Sun, H. Yang, V. Snášel, and S. Chu introduced a two-level mechanism and look-up table approach to solve the problem of sufficient diversity of features for information hiding [16]. The method has better capacity and image quality such that the storage and security are ensured. The paper by M. Ali, A. Ismail, H. Elgohary, S. Darwish, and S. Mesbah employed fuzzy hash within blockchain for tracing Chain of Custody (CoC) in preserving digital evidence in cybercrime [17]. The fuzzy hash functions within blockchain can demonstrate the CoC evidence has not been tampered. Software reliability is also an important issue in information security. The paper authored by Y. Kim, K. Song, H. Pham, and I. Chang developed a software reliability model where the software failures are interdependent and a software failure, if not immediately detected, can cause a sequence of failures and resulting massive losses [18]. The paper authored by E. Sakalauskas, I. Timofejeva, and A. Kilciauskas presented a new sigma-identification protocol based on matrix power function (MPF). The authors showed that the given protocol ensures the NP-completeness of MPF and it is resistant against direct and eavesdropping attacks [19].
Two papers were devoted to determining the optimal assembly sequence of mechanical parts. The first paper, authored by M. Suszyński and K. Peta, determined the best assembly sequence model by clustering 10,000 artificial neural networks which were created by using various network-training methods and activation functions [20]. The proposed model can predict the optimal assembly time of mechanical parts. The second paper, authored by M. Suszyński, K. Peta, V. Černohlávek, and M. Svoboda, on the other hand, creates a large number of artificial neural networks with a different means. It considers various criteria of Design for Assembly (DFA) as the input data and then predicts the assembly time [21].
Object detection and recognition has long been an interesting area for classic AMC applications. The paper by C. Ticala, C. Pintea, and O. Matei provided a new edge detection method for medical images [22]. The method is based on a sensitive ACO where a vector called pheromone sensitivity level is used to control the ant’s sensibility to the pheromone attraction. The paper authored by D. Wang, J. Ni, and T. Du presented an image recognition method for coal gangue recognition [23]. The adaptive shrinking grid search chaos wolf optimization algorithm was proposed to optimize the parameters of the neural network to enhance the image recognition accuracy. The paper authored by A. Alzbier and C. Chen constructed a denoising network consisting of a kernel prediction network and a deep generative adversarial network. Compared with the state-of-the-art result, the proposed denoising network has a better denoising effect and shorter running time [24]. The paper by V. Hrytsyk, M. Medykovskyy, and M. Nazarkevych provided a subjective assessment of various edge-detection filters for reproducing the object image in a room under different lighting conditions during educational activity in Ukraine [25]. It was found that there exist dependencies between priority to certain filters and the lighting condition.
The rest of the papers in this topic series address miscellaneous applications. The paper authored by E. Matos, R. Parmezan Bonidia, D. Sipoli Sanches, R. Santos Pozza, and L. Dias Hiera Sampaio compared the performance of several heuristics including GA, PSO, and VNS for increasing the throughput of sequence allocation schemes in massive multi-user MIMO 5G networks [26]. The paper authored by L. Lara-Valencia, D. Caicedo, and Y. Valencia-Gonzalez presented a whale optimization algorithm (WOA) for the design of tuned mass dampers under earthquake excitations [27]. Multiple objectives including reducing the maximum horizontal displacement and the root mean square of displacements of the structures were implemented to improve the seismic safety. The paper by G. Csányi, D. Nagy, R. Vági, J. Vadász, and T. Orosz addressed the challenging issues and symmetrical problems of legal document anonymization. The existing methods are reviewed and illustrated by case studies from the Hungarian legal practice [28]. The paper authored by S. Liu, Z. Zhou, S. Dai, I. Iqbal, and Y. Yang presented a fast computation method for the green function which represents the seismic fields [29]. The computation method was able to evaluate the Sommerfeld integral efficiently and accurately and the result showed that the computational time was reduced by about 40%. The paper authored by X. Shen and D. Ihenacho developed a hybrid metaheuristic algorithm by combining DE and PSO for resolving the complex mathematical models of gas cyclone design [30]. The paper by M. Li, H. Sang, P. Liu, and G. Huang provided new practical criteria for identifying the positive definiteness of H-tensors [31]. An application and several numerical examples were provided to illustrate the effectiveness of the method. The paper by Y. Alotaibi presents a new clustering algorithm based on tabu search (TS) and adaptive search memory (ASM) [32]. As k-means clustering result is easily spoiled by the biased initial seeds, the TS and ASM were applied to search the elite initial seeds and irritate k-means clustering from there. Finally, the paper by Z. Lian, D. Luo, B. Dai, and Y. Chen presented a new discrete search algorithm based on Levy random distribution in order to obtain an escape from the local optima. The simulation results showed the fast convergence and search effectiveness of the proposed scheme [33].

Author Contributions

Conceptualization, P.-Y.Y. and R.-I.C.; writing—original draft preparation, P.-Y.Y. and R.-I.C.; writing—review and editing, P.-Y.Y. and R.-I.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Acknowledgments

I would like to thank all the contributing authors for their innovative and well managed works. This topic series would not be possible without their enthusiasm for charting advanced AMC research. My thanks are also given to the anonymous reviewers for their unselfish and professional reviews which have helped shape the standard of this topic series. Finally, I am grateful to all the guest editors and the editorial team of MDPI.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chou, J.; Pham, T.; Ho, C. Metaheuristic Optimized Multi-Level Classification Learning System for Engineering Management. Appl. Sci. 2021, 11, 5533. [Google Scholar] [CrossRef]
  2. Caraka, R.; Yasin, H.; Chen, R.; Goldameir, N.; Supatmanto, B.; Toharudin, T.; Basyuni, M.; Gio, P.; Pardamean, B. Evolving Hybrid Cascade Neural Network Genetic Algorithm Space–Time Forecasting. Symmetry 2021, 13, 1158. [Google Scholar] [CrossRef]
  3. Jiao, S.; Wang, C.; Gao, R.; Li, Y.; Zhang, Q. Harris Hawks Optimization with Multi-Strategy Search and Application. Symmetry 2021, 13, 2364. [Google Scholar] [CrossRef]
  4. Masich, I.; Kulachenko, M.; Stanimirović, P.; Popov, A.; Tovbis, E.; Stupina, A.; Kazakovtsev, L. Formation of Fuzzy Patterns in Logical Analysis of Data Using a Multi-Criteria Genetic Algorithm. Symmetry 2022, 14, 600. [Google Scholar] [CrossRef]
  5. Alqaili, A.; Qais, M.; Al-Mansour, A. Integer Search Algorithm: A New Discrete Multi-Objective Algorithm for Pavement Maintenance Management Optimization. Appl. Sci. 2021, 11, 7170. [Google Scholar] [CrossRef]
  6. Changaival, B.; Lavangnananda, K.; Danoy, G.; Kliazovich, D.; Guinand, F.; Brust, M.; Musial, J.; Bouvry, P. Optimization of Carsharing Fleet Placement in Round-Trip Carsharing Service. Appl. Sci. 2021, 11, 11393. [Google Scholar] [CrossRef]
  7. Díaz, R.; Solares, E.; de-León-Gómez, V.; Salas, F. Stock Portfolio Management in the Presence of Downtrends Using Computational Intelligence. Appl. Sci. 2022, 12, 4067. [Google Scholar] [CrossRef]
  8. Lin, H.; Wang, P.; Lin, W.; Chao, K.; Yang, Z. Identifying the Attack Sources of Botnets for a Renewable Energy Management System by Using a Revised Locust Swarm Optimisation Scheme. Symmetry 2021, 13, 1295. [Google Scholar] [CrossRef]
  9. Kara, M.; Laouid, A.; AlShaikh, M.; Hammoudeh, M.; Bounceur, A.; Euler, R.; Amamra, A.; Laouid, B. A Compute and Wait in PoW (CW-PoW) Consensus Algorithm for Preserving Energy Consumption. Appl. Sci. 2021, 11, 6750. [Google Scholar] [CrossRef]
  10. Nguyen, T.; Ngo, T.; Dao, T.; Nguyen, T. Microgrid Operations Planning Based on Improving the Flying Sparrow Search Algorithm. Symmetry 2022, 14, 168. [Google Scholar] [CrossRef]
  11. Ning, N.; Liu, Y.; Yang, H.; Li, L. Design and Optimization of Combined Cooling, Heating, and Power Microgrid with Energy Storage Station Service. Symmetry 2022, 14, 791. [Google Scholar] [CrossRef]
  12. Abu Khurma, R.; Almomani, I.; Aljarah, I. IoT Botnet Detection Using Salp Swarm and Ant Lion Hybrid Optimization Model. Symmetry 2021, 13, 1377. [Google Scholar] [CrossRef]
  13. Wang, L.; Gu, L.; Tang, Y. Research on Alarm Reduction of Intrusion Detection System Based on Clustering and Whale Optimization Algorithm. Appl. Sci. 2021, 11, 11200. [Google Scholar] [CrossRef]
  14. Aldallal, A.; Alisa, F. Effective Intrusion Detection System to Secure Data in Cloud Using Machine Learning. Symmetry 2021, 13, 2306. [Google Scholar] [CrossRef]
  15. Madbouly, M.; Mokhtar, Y.; Darwish, S. Quantum Game Application to Recovery Problem in Mobile Database. Symmetry 2021, 13, 1984. [Google Scholar] [CrossRef]
  16. Pan, J.; Sun, X.; Yang, H.; Snášel, V.; Chu, S. Information Hiding Based on Two-Level Mechanism and Look-Up Table Approach. Symmetry 2022, 14, 315. [Google Scholar] [CrossRef]
  17. Ali, M.; Ismail, A.; Elgohary, H.; Darwish, S.; Mesbah, S. A Procedure for Tracing Chain of Custody in Digital Image Forensics: A Paradigm Based on Grey Hash and Blockchain. Symmetry 2022, 14, 334. [Google Scholar] [CrossRef]
  18. Kim, Y.; Song, K.; Pham, H.; Chang, I. A Software Reliability Model with Dependent Failure and Optimal Release Time. Symmetry 2022, 14, 343. [Google Scholar] [CrossRef]
  19. Sakalauskas, E.; Timofejeva, I.; Kilciauskas, A. Sigma Identification Protocol Construction Based on MPF. Symmetry 2021, 13, 1683. [Google Scholar] [CrossRef]
  20. Suszyński, M.; Peta, K. Assembly Sequence Planning Using Artificial Neural Networks for Mechanical Parts Based on Selected Criteria. Appl. Sci. 2021, 11, 10414. [Google Scholar] [CrossRef]
  21. Suszyński, M.; Peta, K.; Černohlávek, V.; Svoboda, M. Mechanical Assembly Sequence Determination Using Artificial Neural Networks Based on Selected DFA Rating Factors. Symmetry 2022, 14, 1013. [Google Scholar] [CrossRef]
  22. Ticala, C.; Pintea, C.; Matei, O. Sensitive Ant Algorithm for Edge Detection in Medical Images. Appl. Sci. 2021, 11, 11303. [Google Scholar] [CrossRef]
  23. Wang, D.; Ni, J.; Du, T. An Image Recognition Method for Coal Gangue Based on ASGS-CWOA and BP Neural Network. Symmetry 2022, 14, 880. [Google Scholar] [CrossRef]
  24. Alzbier, A.; Chen, C. DGAN-KPN: Deep Generative Adversarial Network and Kernel Prediction Network for Denoising MC Renderings. Symmetry 2022, 14, 395. [Google Scholar] [CrossRef]
  25. Hrytsyk, V.; Medykovskyy, M.; Nazarkevych, M. Estimation of Symmetry in the Recognition System with Adaptive Application of Filters. Symmetry 2022, 14, 903. [Google Scholar] [CrossRef]
  26. Matos, E.; Parmezan Bonidia, R.; Sipoli Sanches, D.; Santos Pozza, R.; Dias Hiera Sampaio, L. Pilot Sequence Allocation Schemes in Massive MIMO Systems Using Heuristic Approaches. Appl. Sci. 2022, 12, 5117. [Google Scholar] [CrossRef]
  27. Lara-Valencia, L.; Caicedo, D.; Valencia-Gonzalez, Y. A Novel Whale Optimization Algorithm for the Design of Tuned Mass Dampers under Earthquake Excitations. Appl. Sci. 2021, 11, 6172. [Google Scholar] [CrossRef]
  28. Csányi, G.; Nagy, D.; Vági, R.; Vadász, J.; Orosz, T. Challenges and Open Problems of Legal Document Anonymization. Symmetry 2021, 13, 1490. [Google Scholar] [CrossRef]
  29. Liu, S.; Zhou, Z.; Dai, S.; Iqbal, I.; Yang, Y. Fast Computation of Green Function for Layered Seismic Field via Discrete Complex Image Method and Double Exponential Rules. Symmetry 2021, 13, 1969. [Google Scholar] [CrossRef]
  30. Shen, X.; Ihenacho, D. Design of Gas Cyclone Using Hybrid Particle Swarm Optimization Algorithm. Appl. Sci. 2021, 11, 9772. [Google Scholar] [CrossRef]
  31. Li, M.; Sang, H.; Liu, P.; Huang, G. Practical Criteria for H-Tensors and Their Application. Symmetry 2022, 14, 155. [Google Scholar] [CrossRef]
  32. Alotaibi, Y. A New Meta-Heuristics Data Clustering Algorithm Based on Tabu Search and Adaptive Search Memory. Symmetry 2022, 14, 623. [Google Scholar] [CrossRef]
  33. Lian, Z.; Luo, D.; Dai, B.; Chen, Y. A Levy Distribution Based Searching Scheme for the Discrete Targets in Vast Region. Symmetry 2022, 14, 272. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Yin, P.-Y.; Chang, R.-I. Special Features and Applications on Applied Metaheuristic Computing. Appl. Sci. 2022, 12, 9342. https://doi.org/10.3390/app12189342

AMA Style

Yin P-Y, Chang R-I. Special Features and Applications on Applied Metaheuristic Computing. Applied Sciences. 2022; 12(18):9342. https://doi.org/10.3390/app12189342

Chicago/Turabian Style

Yin, Peng-Yeng, and Ray-I Chang. 2022. "Special Features and Applications on Applied Metaheuristic Computing" Applied Sciences 12, no. 18: 9342. https://doi.org/10.3390/app12189342

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop