<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Evolutionary Bacterial Foraging Algorithm to solve constraint numerical optimization problems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Betania Hernandez-Ocan~a</string-name>
          <email>betania.hernandez@ujat.mx</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Efren Mezura-Montes</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ma. Del Pilar Pozos-Parra</string-name>
          <email>pilar.pozos@ujat.mx</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Arti cial Intelligence, University of Veracruz</institution>
          ,
          <addr-line>Xalapa, Veracruz</addr-line>
          ,
          <country country="MX">Mexico</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Juarez Autonomous University of Tabasco</institution>
          ,
          <addr-line>Cunduacan, Tabasco</addr-line>
          ,
          <country country="MX">Mexico</country>
        </aff>
      </contrib-group>
      <fpage>58</fpage>
      <lpage>65</lpage>
      <abstract>
        <p>A version of Modi ed Bacterial Foraging Optimization Algorithm to solve Constraints Numerical Optimization is tested. The proposal uses mutation operator, skew mechanism and local search operator. To prove the e ectiveness of the mechanism and adaptations proposed, 24 well-known test problems are solved along set experiments. Performance measures are used for validating results obtained by the proposal and they are compared against state-of-the-art algorithms. The results show that the proposed algorithm is able to generate feasible solutions within of feasible region with few evaluations and improves them over the generations. Moreover, the results are competitive against the comparison algorithms based on performance measures found in the literature. Bacterial foraging optimization, mutation operator, swarm intelligence, Constrained optimization, premature convergence.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Recently nature-inspired meta-heuristic algorithms have gained popularity solving
Constrained Numerical Optimization Problems (CNOPs). These algorithms were created in
order to solve unconstrained optimization problems, but nevertheless the main feature
of the real world problems are the constraints. In answer to this, many
constraintshandling techniques have emerged, and have been added to nature-inspired algorithms
in several proposals. In [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] the di erent techniques found in the specialized literature
were grouped in twelve groups, which are based on Penalty functions, Decoders,
Special Operators and Separation of objective function and constraints, Feasibility rules,
Stochastic ranking, -constrained method, Novel penalty functions, Novel special
operators, Multi-objective concepts, and Ensemble of constraint-handling techniques.
The nature-inspired meta-heuristic algorithms have been divided in two classes 1) the
Evolutionary Algorithms (EAs) that emulate the evolution of species and the
survival of the ttest, and 2) the Swarm Intelligence Algorithms (SIAs) which have the
capability of emulate the collaborative behavior of some simple species searching for
food or shelter [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Some well-known EAs are Genetic Algorithms (GAs) [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], Evolution
Strategies (ES) [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ], Evolutionary Programming [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], Genetic Programming (GP) [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]
and Di erential Evolution (DE) [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. Some SIAs are the Particle Swarm Optimization
(PSO) [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and the Ant Colony Optimization (ACO) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], these last algorithms have
gained popularity for their great performance in solving CNOP. In 2002 other SIA
was proposed by Passino [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] called Bacterial Foraging Optimization (BFOA), which
emulates the behavior of bacteria E.Coli in the search of nutrients in its environment.
This behavior is summarize in four process (1) chemotaxis (swim-tumble movements),
(2) swarming (communication between bacteria), (3) reproduction (cloning of the best
bacteria) and (4) elimination-dispersal (replacement of the worst bacteria). In BFOA
each bacterium tries to maximize its obtained energy per each unit of time spent
on the foraging process while avoiding noxious substances. BFOA was used initially
to solve unconstrained optimization problems, however, more recently proposals add
some constraints-handling technique to solve CNOPs, where the penalty function is
the most used [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        Further investigations have address the fact that BFOA is particularly sensitive to the
step size parameter, a recent study of the step size was reported in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], where di
erent approaches were compared and the dynamic control mechanism was found to be
slightly superior to static, random, and adaptive versions. In [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] BFOA was adapted
in the proposal called Modi ed Bacterial Foraging Optimization Algorithm (MBFOA)
to solve CNOPs. The proposal inherits the four processes of BFOA, however, them are
divided as independent processes that interact sequentially, therefore the parameters
that determine the number of swim, number of tumble and the swarming loop were
eliminated. Moreover, The feasible rules, proposed by Deb [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], are used as a
constrainthandling technique. Unlike of BFOA where the step size is static, in MBFOA the step
size (used in the swim movements) was adapted according the boundary of the decision
variables.
      </p>
      <p>
        The aim of this paper is tested a version of MBFOA which used mechanisms based
on evolutionary operators, Skew mechanism for the initial swarm and Local Search
Operator called Evolutionary MBFOA (EMBFOA) in 24 well-known test problems.
The results obtained will be compared against what is currently the most successful
and well-known algorithm of the state of the art: Memetic-SAMSDE [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. We evaluate
our results with performance measures found in the literature. An advantage of the
new proposal is that it uses the same parameter values for all test problems. It is the
rst time that the mutation is used as swim operator.
      </p>
      <p>The document is organized as follows: Section 2 brie y describes the EMBFOA. Section
3 presents and compares the results obtained by proposal and another state-of-the-art
algorithms. Finally, Section 4 presents the general conclusions and future works.
2</p>
      <p>Evolutionary Modi ed Bacterial Foraging Algorithm
Evolutionary Modi ed Bacterial Foraging Algorithm is an algorithm derived from
MBFOA in order to improve the performance in constrained spaces. Four modi cations
are made: (1) a skew mechanism for the initial swarm of bacteria is applied, (2) two
swim operators are applied in the chemotaxis process to improve the exploration and
exploitation of the bacteria; one of them uses a random step size easy to implement and
other one use mutation, (3) the elimination-dispersal process is adapted to preserve the
diversity of the swarm, and (4) a local search operator is added.</p>
      <p>In BFOA, MBFOA and EMBFOA a bacterium i represents a potential solution to
the CNOP (i.e., a n-dimensional real-value vector identi ed as x), and it is de ned as
i(j,G), where j is its chemotaxis loop index and G is the current cycle of the algorithm.
Skew mechanism for the initial swarm: The initial swarm of Sb bacteria is formed
from three groups. The rst group is formed of bacteria randomly skewed towards the
lower limit of the decision variables. The second group is formed of bacteria randomly
skewed towards the upper limit of the decision variables. Finally, a group of randomly
located bacteria without skew, as in the original MBFOA, is used. The formulas to set
the limits for the rst and second group per variable are presented in Equations 1 and
2.</p>
      <p>[Li; Li + ((Ui</p>
      <p>Li)=ss)]
[Ui
((Ui</p>
      <p>Li)=ss); Ui]
(1)
(2)
where ss is the skew size (ss &gt; 1), for which large values increase the skew e ect
and small values decrease the skew e ect. The aim of this skew in the initial swarm,
combined with the two swim operators and the random stepsize control, is to avoid the
swarm of bacteria converging prematurely (behavior observed in the original MBFOA
caused by its swarming , reproduction process and the xed stepsize), and improve the
exploration and exploitation of the search space in the initial phase of the search.
Chemotaxis: In this process two swims are interleaved, in each cycle only one of
the exploitation swim or exploration swim is performance. The process starts with the
exploitation swim (classical swim). However, a bacterium will not necessarily interleave
exploration and exploitation swims, because if the new position of a given swim, i(j +
1; G) has a better tness (based on the feasibility rules) than the original position
i(j; G), another similar swim in the same direction will be carried out in the next
cycle. Otherwise, a new tumble for the other swim will be computed. The process
stops after Nc attempts. The exploration swim uses the mutation between bacteria
and is computed as indicated in Equation 3:
i(j + 1; G) = i(j; G) + (
1)( 1r(j; G)
2r(j; G))
where 1r(j; G) and 2r(j; G) are two di erent randomly selected bacteria from the
swarm. is an user-de ned parameter used in the swarming that de nes the closeness
of the new position of a bacterium with respect to the position of the best bacterium,
in this operator, 1 is a positive control parameter for scaling the di erent vectors
into (0,1], i.e., it scales the area where a bacterium can move.</p>
      <p>The exploitation swim is computed as indicated in Equation 4:</p>
      <p>i(j + 1; G) = i(j; G) + C(i; G) (i)
where (i) is calculated with the original BFOA Equation 5 and C(i; G) is the random
stepsize of each bacterium update in each generation with the Equation 6.
(i) =</p>
      <p>
        (i)
p T (i) (i)
C(i; G) = R
(i)
where (i) is a uniformly distributed random vector of size n with elements within the
[
        <xref ref-type="bibr" rid="ref1">-1,1</xref>
        ].
where (i) is a randomly generated vector of size n with elements within of the range
of the each decision variable: [U pperk; Lowerk], k = 1; ::::n, and R is an user-de ned
parameter to scale the stepsize, this value should be close to zero, eg. 5.00E-04. The
initial C(i; 0) is generated using (i). This random stepsize allows that the bacteria
can move in di erent direction into of the search space and avoids the premature
convergence as is suggest in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>It is important to remark that the exploration swim (Equation 3) performs larger
(3)
(4)
(5)
(6)
movements due the mutation operator which used bacteria randomly. On the other
hand, the exploitation swim (Equation 4) generates small movements using the random
stepsize in the search process.</p>
      <p>Swarming: In the half cycle of the chemotaxis process the swarming operator is applied
with the Equation 7, where is an user-de ned parameter positive into (1, 2]. However,
in this proposal if a solution violates the boundary of decision variables, unlike of
MBFOA, a new solution xi is generated randomly which is bounded by lower and
upper limits Li xi Ui.</p>
      <p>i(j + 1; G) = i(j; G) + ( B(G)
i(j; G))
(7)
where i(j + 1; G) is the new position of bacterium i, i(j; G) is the current position of
bacterium i, B(G) is the current position of the best bacterium in the swarm so far
at generation G, and de nes the closeness of the new position of bacterium i with
respect to the position of the best bacterium B(G). The attractor movement applies
twice in a chemotaxis loop, while in the remaining steps the tumble-swim movement
is carried out.</p>
      <p>Reproduction: To reduce premature convergence due to bacteria duplication, The
reproduction takes place only at certain cycles of the algorithm (de ned by the RepCycle
parameter) deleting the Sr worst bacteria and duplicating the remaining Sb-Sr.
Elimination-dispersal: To preserver and increase the diversity of swarm, the
eliminationdispersal process takes place at certain cycles of the search process de ned by the
EliCycle user-de ned parameter. The number of bacteria to eliminate-dispersal is
dened by the user in the parameter Se. In this proposal, the diversity of swarm is
necessary because the mutation is e ective when there is already some level of diversity
in the existing swam. Moreover, the generation of new bacteria avoids the premature
convergence.</p>
      <p>
        Local Search Operator: Sequential Quadratic Programming (SQP) [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] is
incorporated into EMBFOA as a local search operator in order to help the algorithm to
generate better results and based on the improved behavior observed by memetic
algorithms [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. SQP is also used once in the middle of the search process. However,
the user can de ne the frequency of usage of the local search operator by de ning the
parameter local search frequency LSG. The structure of EMBFOA is showed in the
Figure 1.
      </p>
      <p>Results and analysis
In this section are presented and compared the results obtained by EMBFOA in the
CEC2006 benchmark against MBFOA and Memetic-SAMSDE which is one the best
state-of-the-art algorithms for solving this benchmark. EMBFOA was coded in Matlab
R2009b, and run on a PC with a 3.5 Core 2 Duo Processor, 4GB RAM, and Windows
7.</p>
      <p>
        The 95%-con dence Wilcoxon Signed Rank Test (WSRT) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] suggested for
natureinspired algorithms comparison in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] is used as the statistical test to validate the
di erences in the samples of runs. The scores are based on the best tness value of
each algorithm in each test problem.
      </p>
      <p>
        The input parameter values used by MBFOA are: Sb=40, Nc=20, Sr=2, R=1.20E-03
and =1.5. For EMBFOA the parameters are: Sb= 40, Nc= 20, Sr= 2, R=
1.20E03, = 1.5, RepCycle= 100, EliCycle= 50, LSG= 1 and (GM AX=2) generations,
M axLS= 5,000 Fes and ss= 8; they were ne-tuned by the iRace tool [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. The iRace
obtained ve possible values for each parameter and the average of the ve values was
used. In this case, the only xed parameter were GM AX according to the termination
condition of the maximum number of evaluations (Max FEs) of CEC2006 benchmark,
and the maximum number of evaluations for the local search operator M axLS which
is 5; 000 evaluations.
24 well-known CNOPs found in [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] were used in the experiments. Max Fes allowed for
each one of the 24 test problems was 240,000 evaluations. The tolerance for equality
constraints was set to " = 1E 04, this value is proposed in the specialized literature
of nature-inspired algorithms to solve CNOPs [
        <xref ref-type="bibr" rid="ref1 ref19 ref20">1, 19, 20</xref>
        ].
      </p>
      <p>
        In this experiment the performance of EMBFOA is compared against MBFOA and
some EAs, such as Mememtic Self-Adaptive Multi-Strategy Di erential Evolution
(MemeticSAMSDE) which is currently one of the best state-of-the-art algorithm for solving the
set of test problems used in this paper. This algorithm also uses SQP as local search.
Unlike the EMBFOA that uses SPQ only twice, in Memetic-SAMSDE is used each 50
generations. The Adaptive Penalty Formulation with GA (APF-GA) [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ], the
Modi ed Di erential Evolution (MDE) [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], the Adaptive Tradeo Model with evolution
strategy (ATMES) [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ], the Multimembered evolution strategy (SMES) [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], and the
Stochastic ranking with evolution strategy (SR+ES) [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. Even when ATMES, SMES
and SR solved solely the rst 13 test problems a computation against them is shown.
The number of evaluations computed by APF-GA and MDE was 500,000. SR+ES used
350,000 evaluations while for Memetic-SAMSDE, EMBFOA, ATMES and SMES used
240,000 evaluations. The number of independent runs used by EMBFOA,
MemeticSAMSDE, ATMES, SMES and SR+ES was 30, and APF-GA and MDE used 25
independent runs. In the Table 1 the results of all algorithms for the 24 test problems are
present whit the best solutions of each test problem is highlighted in bold. From the
results obtained by each algorithm, the Wilcoxon Sign-Rank test suggest that there is
signi cant di erence between EMBFOA and MBFOA and there is no signi cant
difference between EMBFOA, Memetic-SAMSDE and MDE. However the last algorithm
uses 500,000 evaluations which are the double evaluation used by EMBFOA. There
is a signi cant di erence in favor of EMBFOA when it is compared against APF-GA,
ATMES, SME and SR+ES. Moreover APF-GA and SR+ES used more number of
evaluations than EMBFOA.
      </p>
      <p>In this experiment the performance of EMBFOA was compared against ve
state-ofthe-art nature-inspired algorithms used to solve CNOPs successfully, with the results
this is the rst attempt to design a BFOA-based algorithm that uses mutation as swim
operator. As future work, EMBFOA will be tested in more CNOPs and a study on the
impact of the population size and the way it is generated over the performance of the
algorithm, will be performed.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Carlos</surname>
            <given-names>A. Coello</given-names>
          </string-name>
          <string-name>
            <surname>Coello</surname>
          </string-name>
          .
          <article-title>Theoretical and Numerical Constraint Handling Techniques used with Evolutionary Algorithms: A Survey of the State of the Art</article-title>
          .
          <source>Computer Methods in Applied Mechanics and Engineering</source>
          ,
          <volume>191</volume>
          (
          <fpage>11</fpage>
          -12):
          <volume>1245</volume>
          {
          <fpage>1287</fpage>
          ,
          <year>January 2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>G.W.</given-names>
            <surname>Corde</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.I.</given-names>
            <surname>Foreman</surname>
          </string-name>
          . Nonparametric Statistics for Non-Statisticians:
          <article-title>A Step-by-Step Approach</article-title>
          . John Wiley, Hoboken, NJ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Kalyanmoy</given-names>
            <surname>Deb</surname>
          </string-name>
          .
          <article-title>An E cient Constraint Handling Method for Genetic Algorithms</article-title>
          .
          <source>Computer Methods in Applied Mechanics and Engineering</source>
          ,
          <volume>186</volume>
          (
          <issue>2</issue>
          /4):
          <volume>311</volume>
          {
          <fpage>338</fpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>J.</given-names>
            <surname>Derrac</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Garc</surname>
          </string-name>
          <string-name>
            <surname>a</surname>
          </string-name>
          , D. Molina, and
          <string-name>
            <given-names>F.</given-names>
            <surname>Herrera</surname>
          </string-name>
          .
          <article-title>A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms</article-title>
          .
          <source>Swarm and Evolutionary Computation</source>
          ,
          <volume>1</volume>
          (
          <issue>1</issue>
          ):3{
          <fpage>18</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>M.</given-names>
            <surname>Dorigo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Maniezzo</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Colorni</surname>
          </string-name>
          .
          <article-title>The Ant System: Optimization by a Colony of Cooperating Agents</article-title>
          .
          <source>IEEE Transactions of Systems</source>
          , Man and
          <string-name>
            <surname>Cybernetics-Part</surname>
            <given-names>B</given-names>
          </string-name>
          ,
          <volume>26</volume>
          (
          <issue>1</issue>
          ):
          <volume>29</volume>
          {
          <fpage>41</fpage>
          ,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>A.E.</given-names>
            <surname>Eiben</surname>
          </string-name>
          and
          <string-name>
            <given-names>J. E.</given-names>
            <surname>Smith</surname>
          </string-name>
          . Introduction to Evolutionary Computing.
          <source>Natural Computing Series</source>
          . Springer Verlag,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Saber</surname>
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Elsayed</surname>
          </string-name>
          , Ruhul A.
          <string-name>
            <surname>Sarker</surname>
            ,
            <given-names>and Daryl L.</given-names>
          </string-name>
          <string-name>
            <surname>Essam</surname>
          </string-name>
          .
          <article-title>On an evolutionary approach for constrained optimization problem solving</article-title>
          .
          <source>Applied soft computing</source>
          ,
          <volume>12</volume>
          (
          <issue>0</issue>
          ):
          <volume>3208</volume>
          {
          <fpage>3227</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Andries</surname>
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Engelbrecht</surname>
          </string-name>
          .
          <source>Computational Intelligence. An Introduction. John Wiley &amp; Sons, 2nd edition</source>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Lawrence</surname>
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Fogel</surname>
          </string-name>
          . Intelligence Through Simulated Evolution.
          <article-title>Forty years of Evolutionary Programming</article-title>
          . John Wiley &amp; Sons, New York,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Betania</surname>
          </string-name>
          Hernandez-Ocan~
          <article-title>a, Efren Mezura-Montes, and Pilar Pozos-Parra. A review of the bacterial foraging algorithm in constrained numerical optimization</article-title>
          .
          <source>In Proccedings of the Congress on Evolutionary Computation (CEC'2013)</source>
          , pages
          <fpage>2695</fpage>
          {
          <fpage>2702</fpage>
          . IEEE,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Betania</surname>
          </string-name>
          Hernandez-Ocan~
          <article-title>a, Pilar Pozos-Parra, and Efren Mezura-Montes. Stepsize control on the modi ed bacterial foraging algorithm for constrained numerical optimization</article-title>
          .
          <source>In Proceedings of the 2014 Conference on Genetic and Evolutionary Computation</source>
          ,
          <source>GECCO '14</source>
          , pages
          <fpage>25</fpage>
          {
          <fpage>32</fpage>
          , New York, NY, USA,
          <year>2014</year>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Alireza</surname>
            <given-names>Kasaiezadeh</given-names>
          </string-name>
          , Amir Khajepour,
          <string-name>
            <given-names>and Steven L.</given-names>
            <surname>Waslander</surname>
          </string-name>
          .
          <article-title>Spiral bacterial foraging optimization method: Algorithm, evaluation and convergence analysis</article-title>
          .
          <source>Engineering Optimization</source>
          ,
          <volume>46</volume>
          (
          <issue>4</issue>
          ):
          <volume>439</volume>
          {
          <fpage>464</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>James</given-names>
            <surname>Kennedy</surname>
          </string-name>
          and
          <string-name>
            <given-names>Russell C.</given-names>
            <surname>Eberhart</surname>
          </string-name>
          . Swarm Intelligence. Morgan Kaufmann, UK,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>John R. Koza</surname>
            ,
            <given-names>Martin A.</given-names>
          </string-name>
          <string-name>
            <surname>Keane</surname>
            ,
            <given-names>Matthew J.</given-names>
          </string-name>
          <string-name>
            <surname>Streeter</surname>
            ,
            <given-names>William</given-names>
          </string-name>
          <string-name>
            <surname>Mydlowec</surname>
            ,
            <given-names>Jessen</given-names>
          </string-name>
          <string-name>
            <surname>Yu</surname>
            , and
            <given-names>Guido</given-names>
          </string-name>
          <string-name>
            <surname>Lanza</surname>
          </string-name>
          .
          <article-title>Genetic Programming IV: Routine Human-Competitive Machine Intelligence</article-title>
          . Kluwer Academic Publishers, Hingham, MA, USA,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>J.J. Liang</surname>
            , Thomas Philip Runarsson, Efrn Mezura-Montes, Maurice Clerc,
            <given-names>P.N.</given-names>
          </string-name>
          <string-name>
            <surname>Suganthan</surname>
          </string-name>
          , Carlos A.
          <string-name>
            <surname>Coello Coello</surname>
            , and
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Deb</surname>
          </string-name>
          .
          <article-title>Problem de nitions and evaluation criteria for the cec 2006 special session on constrained real-parameter optimization</article-title>
          .
          <source>Technical report</source>
          , School of EEE Nanyang Technological University, Singapore,
          <year>September 2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Manuel</surname>
            Lopez-Iban~ez, Jeremie Dubois-Lacoste, Thomas Sttzle, and
            <given-names>Mauro</given-names>
          </string-name>
          <string-name>
            <surname>Birattari</surname>
          </string-name>
          .
          <article-title>The irace package, iterated race for automatic algorithm con guration</article-title>
          .
          <source>Technical Report TR/IRIDIA/2011-004</source>
          , IRIDIA, Universite Libre de Bruxelles, Belgium,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17. E.
          <article-title>Mezura-Montes and Carlos A. Coello Coello. A simple multimembered evolution strategy to solve constrained optimization problems</article-title>
          . Evolutionary Computation, IEEE Transactions on,
          <volume>9</volume>
          (
          <issue>1</issue>
          ):1{
          <fpage>17</fpage>
          ,
          <string-name>
            <surname>Feb</surname>
          </string-name>
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18. E.
          <string-name>
            <surname>Mezura-Montes</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Velazquez-Reyes</surname>
            , and
            <given-names>C.A. Coello</given-names>
          </string-name>
          <string-name>
            <surname>Coello</surname>
          </string-name>
          .
          <article-title>Modi ed di erential evolution for constrained optimization</article-title>
          .
          <source>In Evolutionary Computation</source>
          ,
          <year>2006</year>
          .
          <article-title>CEC 2006</article-title>
          .
          <article-title>IEEE Congress on</article-title>
          , pages
          <volume>25</volume>
          {
          <fpage>32</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Efren</surname>
          </string-name>
          Mezura-Montes, editor.
          <source>Constraint-Handling in Evolutionary Optimization</source>
          , volume
          <volume>198</volume>
          <source>of Studies in Computational Intelligence</source>
          . Springer-Verlag,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Efren</surname>
          </string-name>
          Mezura-Montes and
          <article-title>Carlos A. Coello Coello. Constraint-handling in natureinspired numerical optimization: Past, present and future</article-title>
          .
          <source>Swarm and Evolutionary Computation</source>
          ,
          <volume>1</volume>
          (
          <issue>4</issue>
          ):
          <volume>173</volume>
          {
          <fpage>194</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Efren</surname>
          </string-name>
          Mezura-Montes and
          <article-title>Betania Hernandez-Ocan~a. Modi ed bacterial foraging optimization for engineering design</article-title>
          . In
          <string-name>
            <surname>Cihan H. Dagli</surname>
          </string-name>
          and et al., editors,
          <source>Proceedings of the Arti cial Neural Networks in Enginnering Conference (ANNIE'2009)</source>
          , volume
          <volume>19</volume>
          <source>of Intelligent Engineering Systems Through Arti cial Neural Networks</source>
          , pages
          <volume>357</volume>
          {
          <fpage>364</fpage>
          ,
          <string-name>
            <surname>St</surname>
            . Louis,
            <given-names>MO</given-names>
          </string-name>
          , USA,
          <year>November 2009</year>
          . ASME Press.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>Ferrante</given-names>
            <surname>Neri</surname>
          </string-name>
          and
          <string-name>
            <given-names>Carlos</given-names>
            <surname>Cotta</surname>
          </string-name>
          .
          <article-title>Memetic algorithms and memetic computing optimization: A literature review</article-title>
          .
          <source>Swarm and Evolutionary Computation</source>
          ,
          <volume>2</volume>
          :1{
          <fpage>14</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Kevin</surname>
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Passino</surname>
          </string-name>
          .
          <article-title>Biomimicry of bacterial foraging for distributed optimization and control</article-title>
          .
          <source>IEEE Control Systems Magazine</source>
          ,
          <volume>22</volume>
          (
          <issue>3</issue>
          ):
          <volume>52</volume>
          {
          <fpage>67</fpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>M. J. D. Powell</surname>
          </string-name>
          .
          <article-title>Algorithms for Nonlinear Constraints that use Lagrangian Functions</article-title>
          .
          <source>Mathematical Programming</source>
          ,
          <volume>14</volume>
          :
          <fpage>224</fpage>
          {
          <fpage>248</fpage>
          ,
          <year>1978</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <given-names>K.</given-names>
            <surname>Price</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Storn</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Lampinen</surname>
          </string-name>
          .
          <article-title>Di erential Evolution: A Practical Approach to Global Optimization</article-title>
          .
          <source>Natural Computing Series</source>
          . Springer-Verlag,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <given-names>T.P.</given-names>
            <surname>Runarsson</surname>
          </string-name>
          and
          <string-name>
            <given-names>Xin</given-names>
            <surname>Yao</surname>
          </string-name>
          .
          <article-title>Stochastic ranking for constrained evolutionary optimization</article-title>
          .
          <source>Evolutionary Computation</source>
          , IEEE Transactions on,
          <volume>4</volume>
          (
          <issue>3</issue>
          ):
          <volume>284</volume>
          {
          <fpage>294</fpage>
          ,
          <string-name>
            <surname>Sep</surname>
          </string-name>
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Hans-Paul Schwefel</surname>
          </string-name>
          , editor.
          <source>Evolution and Optimization</source>
          Seeking. Wiley, New York,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <given-names>B.</given-names>
            <surname>Tessema</surname>
          </string-name>
          and
          <string-name>
            <surname>G.G. Yen.</surname>
          </string-name>
          <article-title>An adaptive penalty formulation for constrained evolutionary optimization</article-title>
          .
          <source>Systems, Man and Cybernetics</source>
          ,
          <string-name>
            <surname>Part</surname>
            <given-names>A</given-names>
          </string-name>
          :
          <article-title>Systems and Humans</article-title>
          , IEEE Transactions on,
          <volume>39</volume>
          (
          <issue>3</issue>
          ):
          <volume>565</volume>
          {
          <fpage>578</fpage>
          , May
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Yong</surname>
            <given-names>Wang</given-names>
          </string-name>
          , Zixing Cai,
          <string-name>
            <surname>Yuren Zhou</surname>
            , and
            <given-names>Wei</given-names>
          </string-name>
          <string-name>
            <surname>Zeng</surname>
          </string-name>
          .
          <article-title>An adaptive tradeo model for constrained evolutionary optimization</article-title>
          .
          <source>Evolutionary Computation</source>
          , IEEE Transactions on,
          <volume>12</volume>
          (
          <issue>1</issue>
          ):
          <volume>80</volume>
          {
          <fpage>92</fpage>
          ,
          <string-name>
            <surname>Feb</surname>
          </string-name>
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>