Hierarchical Chaotic Wingsuit Flying Search Algorithm with Balanced Exploitation and Exploration for Optimization

Sicheng Liu, Kaiyu Wang, Haichuan Yang, Tao Zheng, Zhenyu Lei, Meng Jia, Shangce Gao

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

Wingsuit flying search is a meta-heuristic algorithm that effectively searches for optimal solutions by narrowing down the search space iteratively. However, its performance is affected by the balance between exploration and exploitation. We propose a four-layered hierarchical population structure algorithm, multi-layered chaotic wingsuit flying search (MCWFS), to promote such balance in this paper. The proposed algorithm consists of memory, elite, sub-elite, and population layers. Communication between the memory and elite layers enhances exploration ability while maintaining population diversity. The information flow from the population layer to the elite layer ensures effective exploitation. We evaluate the performance of the proposed MCWFS algorithm by conducting comparative experiments on IEEE Congress on Evolutionary Computation (CEC) benchmark functions. Experimental results prove that MCWFS is superior to the original algorithm in terms of solution quality and search performance. Compared with other representative algorithms, MCWFS obtains more competitive results on composite problems and real-world problems.

Original languageEnglish
Pages (from-to)83-93
Number of pages11
JournalIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
VolumeE108.A
Issue number2
DOIs
StatePublished - 2025/02

Keywords

  • evolutionary algorithm
  • exploration and exploitation
  • population structure
  • wingsuit flying search

ASJC Scopus subject areas

  • Signal Processing
  • Computer Graphics and Computer-Aided Design
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Hierarchical Chaotic Wingsuit Flying Search Algorithm with Balanced Exploitation and Exploration for Optimization'. Together they form a unique fingerprint.

Cite this