Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 831691, 14 pages
http://dx.doi.org/10.1155/2014/831691
Research Article

The Expanded Invasive Weed Optimization Metaheuristic for Solving Continuous and Discrete Optimization Problems

1Institute of Informatics, Silesian University of Technology, Akademicka 16, 44-100 Gliwice, Poland
2Department of Industrial Informatics, Silesian University of Technology, Krasińskiego 8, 40-019 Katowice, Poland
3Polish-Japanese Institute of Information Technology, Aleja Legionów 2, 41-902 Bytom, Poland

Received 23 August 2013; Accepted 18 January 2014; Published 19 March 2014

Academic Editors: M. A. Abido and G. Wei

Copyright © 2014 Henryk Josiński et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. F. Rothlauf, Design of Modern Heuristics. Principles and Application, Springer, 2011.
  2. C. Blum and A. Roli, “Metaheuristics in combinatorial optimization: overview and conceptual comparison,” ACM Computing Surveys, vol. 35, no. 3, pp. 268–308, 2003. View at Publisher · View at Google Scholar · View at Scopus
  3. A. R. Mehrabian and C. Lucas, “A novel numerical optimization algorithm inspired from weed colonization,” Ecological Informatics, vol. 1, no. 4, pp. 355–366, 2006. View at Publisher · View at Google Scholar · View at Scopus
  4. A. R. Mallahzadeh, H. Oraizi, and Z. Davoodi-Rad, “Application of the invasive weed optimization technique for antenna configurations,” Progress in Electromagnetics Research, vol. 79, pp. 137–150, 2008. View at Google Scholar · View at Scopus
  5. M. Sahraei-Ardakani, M. Roshanaei, A. Rahimi-Kian, and C. Lucas, “A study of electricity market dynamics using invasive weed colonization optimization,” in Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG '08), pp. 276–282, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  6. H. S. Rad and C. Lucas, “A recomniender system based on invasive weed optimization algorithm,” in Proceedings of the IEEE Congress on Evolutionary Computation (CEC '07), pp. 4297–4304, September 2007. View at Publisher · View at Google Scholar · View at Scopus
  7. D. Kostrzewa and H. Josiński, “Verification of the search space exploration strategy based on the solutions of the join ordering problem,” Advances in Intelligent and Soft Computing, vol. 103, pp. 447–455, 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. “TSP Art website,” http://www.oberlin.edu/math/faculty/bosch/tspart-page.html.
  9. Z. Michalewicz and D. B. Fogel, How to Solve It: Modern Heuristics, Springer, 2004.
  10. G. Tao and Z. Michalewicz, “Inver-over operator for the TSP,” in Parallel Problem Solving from Nature—PPSN V, vol. 1498 of Lecture Notes In Computer Science, pp. 803–812, Springer, 1998. View at Google Scholar
  11. Y.-W. Shang and Y.-H. Qiu, “A note on the extended Rosenbrock function,” Evolutionary Computation, vol. 14, no. 1, pp. 119–126, 2006. View at Google Scholar · View at Scopus
  12. A. J. Chipperfield, P. J. Fleming, and C. M. Fonseca, Genetic Algorithm Tools for Control Systems Engineering, Adaptive Computing in Engineering Design and Control, Plymouth, UK, 1994.
  13. Y. Shi and R. Eberhart, “Empirical study of particle swarm optimization,” in Proceedings of the Congress on Evolutionary Computation, pp. 1945–1950, 1999.
  14. T. Krzeszowski, B. Kwolek, and K. Wojciechowski, “Articulated body motion tracking by combined particle swarm optimization and particle filtering,” in Computer Vision and Graphics, vol. 6374 of Lecture Notes in Computer Science, pp. 147–154, Springer, 2010. View at Google Scholar
  15. D. B. Fogel and H. G. Beyer, “A note on the empirical evaluation of intermediate recombination,” Evolutionary Computation, vol. 3, no. 4, pp. 491–495, 1995. View at Google Scholar
  16. M. Dash and H. Liu, “Feature selection for classification,” in Intelligent Data Analysis, vol. 1, pp. 131–156, Elsevier, 1997. View at Google Scholar
  17. I. H. Witten and E. Frank, Data Mining: Practical Machine Learning Tools and Techniques, Elsevier, 2005.
  18. “UCI Machine Learning Repository,” http://archive.ics.uci.edu/ml/datasets/Semeion+Handwritten+Digit.
  19. “Webpage of the Human Motion Laboratory of the Polish-Japanese Institute of Information Technology,” http://hm.pjwstk.edu.pl.
  20. H. Lu, K. N. Plataniotis, and A. N. Venetsanopoulos, “MPCA: multilinear principal component analysis of tensor objects,” IEEE Transactions on Neural Networks, vol. 19, no. 1, pp. 18–39, 2008. View at Publisher · View at Google Scholar · View at Scopus
  21. M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten, “The WEKA data mining software: an update,” SIGKDD Explorations, vol. 11, no. 1, pp. 10–18, 2009. View at Google Scholar
  22. B. Ran and L. T. Yun, Handwritten Digit Recognition and Its Improvement, Department of Computer Science, School of Computing, National University of Singapore, 2010, http://cs2306-machine-learning.googlecode.com/svn/trunk/CS2306S_project/a.pdf.
  23. “Website of the Mona Lisa TSP Challenge,” http://www.tsp.gatech.edu/data/ml/monalisa.html.
  24. O. Kramer, Self-Adaptive Heuristics for Evolutionary Computation, Springer, 2008.