<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Heuristic Approach to Birthday Paradox Problem with Simulated Annealing and Cuckoo Search Algorithm</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Adrianna Benna Faculty of Applied Mathematics Silesian University of Technology Kaszubska 23</institution>
          ,
          <addr-line>44-100 Gliwice</addr-line>
          ,
          <country country="PL">Poland</country>
        </aff>
      </contrib-group>
      <fpage>22</fpage>
      <lpage>27</lpage>
      <abstract>
        <p>-In this paper, the application of heuristic methods to solve birthday paradox problem is presented. Methods are compared to show which of them gives better and quicker solution. Benchmark tests have been performed and discussed to show the results.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>Heuristic methods are used to find a solution or solve
problems which for some reasons cannot be solved by
traditional way. Sometimes finding the optimal or exact
solution, using classical methods is just immposible or takes
too much time. Then we can use heuristic solving to speed
up time of work or find approximate solution. It can be called
a shortcut but due to shortening the operation time it makes
those methods very practical. Even if our solution is not
exact, our approximated one can be only slightly different.
Those methods do not guarantee us the exact solution but in
some cases it is not necessary us necessary as for example
saving time.</p>
      <p>Cuckoo Search Algorithm (CSA) and Simulated Annealing
(SA) are the examples of the heuristic methods. To create those
alorithms, Computational Intelligence is used. Computational
Intelligence (CI) is considered as a methodology which uses
computer’s ability to learn specified skills or learn how to
behave in the new conditions. Created programs imitiate
intelligent behaviour of animals’ or humans’ organism. Despite
the fact that they are inspired by nature, the reason why they
are created is to solve real-world problems which for some
reasons, described in the prior paragraph, cannot be solved by
traditional way.</p>
    </sec>
    <sec id="sec-2">
      <title>II. RELATED WORKS</title>
      <p>
        CI methods find their applications in many different fields
of science. We can use them to perform some optimalisation
processes [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], for example optimalisation semantic web
services [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. They can be useful to simulate the process of
making decision [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Reconstruction or retriving of missing
Copyright c 2016 held by the author.
data is also possible thanks to CI [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Further applications,
presented in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] and [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], are image processing and positioning
the mass service system [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        The very first application of Simulated Annealing algorithm
was presented in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] as the method of optimalisation. Later,
this algorithm find applications in solving other problems so
it has been developed and improved to make the calculations
more precise [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. In the course of time, biological algorithms
like SA was perceived as precise and efficient ones and useful
in the minimalization of the continues functions described in
[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] and [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. SA algoritm allow us also to work on complex
structures of various populations [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] and users veryfication
of the cloud - based systems [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>
        Cuckoo Search Algorithm allow us to describe changes in
genes while adapting to the new environment. It can be used
to sizing thermal electricity panels [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. We can also find
CSA application for intelligent gathering video frame [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]
or optimal synthesis six - bar double dwell linkage problem
[
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. There were also presented multitasking planning
problem in [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. CSA gives are tools to create scenerios
and control the plots of computer games described in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]
and [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Optimalisation and stabilization of methods like
this is not a easy thing [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] but we can adequately change
the implementation code to achieve satysfying accuracy in
calculations [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
      </p>
      <p>In this article Simulated Annealing and Cuckoo Search
Algorithm are used to solve the Birthday Paradox Problem.
Algorithms are implemented in such way that they can help
us with searching probability to find similar dates.</p>
    </sec>
    <sec id="sec-3">
      <title>III. BIRTHDAY PARADOX PROBLEM</title>
      <p>
        Presented in this article famous probability problem can be
solved both traditionally and using CI methods. Traditional
approach and all details about paradox are described in [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
Our problem can be stated by question: what is the minimal
number n of randomly chosen people in the group that the
probability that there are two people with the same birthday
date is bigger that probability that there is not a pair like
that? After mathematical assessments or checking probability
of for example 1000 samples of randomly chosen groups of
n = 1; 2; 3; : : : we find out that the answer is n = 23. By
using CI methods, we can implement a program which will
check for determined parameters in which iteration we will get
first birthday pair and get approxiamate solution which after
rounding will give us exactly 23.
      </p>
    </sec>
    <sec id="sec-4">
      <title>IV. SIMULATED ANNEALING</title>
      <p>
        Simulated Annealing (SA) is a method that is based on
the metallurgical process. The whole process consists of three
stages: heating the metal up to the high temperature, keep it in
those conditions and slowly cooling down. It is important to
keep thermodynamic equilibrium during the whole process and
that is why we can describe it by mathematical equations. In
[
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] we can find all important details about SA. In that atricle,
Birthday Paradox Problem is solved using SA algorithm. Now
we want to do the same for CSA and compare the results to
find out which of those two methods is better for solving this
problem.
      </p>
    </sec>
    <sec id="sec-5">
      <title>V. CUCKOO SEARCH ALGORITHM</title>
      <p>Cuckooo Search Algorithm (CSA) is a method of
optimalization, based on the Gauss distribution and simulate the
behaviour of some species of cuckoos which use others’ birds
nests to lay their own eggs. Those birds try to choose nests
where eggs have been recently laid to minimize probability
that hosts will drop them out. They can even imitiate the colour
or texture of those eggs to stay unnoticed. When hosts find out
the cuckoo egg, they can get rid of it or just ignore.</p>
      <sec id="sec-5-1">
        <title>A. Mathematical Model</title>
        <p>To use CSA to solve Birthday Paradox Problem we need a
few assumptions:
1) We have 365 nests which represent 365 days in the year
2) Number of cuckoos is constant
3) Each cuckoo has one egg to lay
4) Chance that the egg will be detected by hosts is
chance 2 (0; 1)
We can describe the process of finding the new solution by
equation
xt+1 = xit + L( ; ; )
i
(1)
where xt+1 = (x1; x2; : : : ; xk)t+1 is the (t + 1) th CSA
solution, n - number of cuckoos in the population and L( ; ; )
is a Le´vy flight determined for the given parameters:
step lenght, - minimum step lengh, - Le´vy flight scalling
parameter. We can obtain the value of the Le´vy flight by using
formula
8
&gt;&gt;r
&gt;
&gt;
L( ; ; ) = &lt;</p>
        <p>2
&gt;
&gt;
&gt;
&gt;:0;
exp[
(
2(
where H(xit+1) is a hosts’ decision about cuckoo egg,
chance is a value generated randomly during every decision
and p is defined at the beggining of the whole process,
chance; p 2 (0; 1).</p>
      </sec>
      <sec id="sec-5-2">
        <title>B. Implemented Algorithm</title>
        <p>The aplication of the CSA that was implemented for solving
Birthday Paradox Problem is presented in Algorithm 1. Instead
of generating full dates, we can use numbers 1 - 365 which
represent 365 days of the year (we don’t consider lap years). At
the beggining, we establish all the initial values and generate
the random population on the list population. Cuckoos are
flying according to (1), (2) and (3) and then, the lacking
cuckoos are replaced randomly at once. After that, we check if
there are two cuckoos with the same number in one generation.
If so, we write down the number of generation - generations
in the list result. When the list result is completed, we take
the average of all summands and that way we get the final
outcome for given parameters.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>VI. BENCHMARK TESTS For all sets of parameters we obtain 30 results each and after taking the average of them, the received values have been compared to find solution which is the closest to 23.</title>
      <sec id="sec-6-1">
        <title>A. Fitness Function</title>
        <p>To find the optimal solution, two different fitness functions
have been performed. First of them is a simple linear function
f (x) = x. Received results are placed in the Tab. I. As we
can see, this function does not allow as to obtain the exact
wanted value - 23. What is more, the particular outcomes
are not similar to each other in many cases. After many
trials, it has been stated that the most important impact to the
value of outcome has p and number of cuckoos. If they are
lower - we obtain too high values and when they are higher
- received values are too low. We can also notice that when
we take 500 or more samples, our results are more similar
and close to each other. What is surprising, the parameters ,
and does not have any significant influence to the final
result. The only noticed difference is that if those parameters
become high, the score is albo slightly higher. In the Tab.
I we can find two sets of parameters for each we got the
value very close to 23: p = 0; 105, = 2, = 6, = 7,
cuckoos = 12, samples = 100 and p = 0; 105, = 2,
= 6, = 7, cuckoos = 12, samples = 500 - the only
difference is in number of samples. In the Tab. I we can see
that particular results form the the first set are more divergent
than those form the second one.
(2)
Algorithm 1 Cuckoo Search Algorithm to obtain Birthday
Paradox Problem Solution
1: Define the value of the probability p , fitness function
f (x), parameters , , , number of cuckoos in each
generation and number of samples in each iteration
2: Set counter := 0, generations := 0 and decision := 0,
3: Declare lists: population, result,
4: while counter samples do
5: Generate a random population (on the list population),
6: while decision == 0 do
7: Cuckoos fly according to (1) and (2),
8: Hosts decide on eggs by (3),
9: Lacking cuckoos replaced randomly,
10: for i = 0 to cuckoos 1 do
11: for j = i + 1 to cuckoos do
12: if f (population[i]) == f (population[j]) then
13: decision = 1,
14: end if
15: end for
16: end for
17: if decision == 0 then
18: generations + +,
19: end if
20: end while
21: Add generations to the list result’
22: decision = 0, generations = 0,
23: counter + +,
24: Clear the list population,
25: end while
26: counter = 0,
27: Set sum = 0,
28: for i = 0 to samples do
29: Sum = Sum + result[i],
30: end for
31: Outcome = round(sum=samples),
32: Return Outcome.</p>
        <p>As the second fitness function, the power function has
been performed, f (x) = x6. Results are shown in the Tab.
II. It turns out that it gives better average outcomes. We
can determine parameters for which results are closer to 23
than in the prior testing. While changing parameters, we can
notice similar actions to the function f (x) = x. When p
and number of cuckoos get higher, the result is lower and
conversly. The more samples we take, differences between
particular outcomes are lower. What is new, parameters ,
and are more important - while and are singinificantly
higher than , the results get lower so in order to keep it in
the neighbouring of 23, we have to decrease p or number
of cuckoos. For parameters p = 0; 083, = 10, = 200,
= 300, cuckoos = 10, samples = 100 the excact value 23
has been received but because there were only 100 samples
in each iteration, the divergence in results is very serious so
we can say that it just happend accidentally. Anyway, there is
another set: p = 0; 210, = 1, = 2, = 3, cuckoos = 8,
samples = 500 for which divergence is not that high and final
result is still very close to 23.</p>
      </sec>
      <sec id="sec-6-2">
        <title>B. Conclusions</title>
        <p>Firstly, we have to choose which of two presented fitness
functions is better for Cuckoo Search Algotithm. Secondly,
we have to compare numerical results form both CSA and
SA algorithms to find the best one. For SA, 26 different sets
of parameters have been prestented for which average value
was the closest to 23. For CSA it was 13 sets of parameters
for first fitness function and 13 for second. 13 samples form
every kind have been taken to further calculations. While
taking the average of those averages we receive 22,87 for
SA, 23,26 for CSA f (x) = x, 22,92 for CSA f (x) = x6.
We can see that for SA and CSA f (x) = x6 the average is
closer to 23 than in case of CSA f (x) = x. However, by
counting average we cannot say how large are divergences
between particular samples or averages. Of course, we want
them to be as little as possible to make our result more stable.
On the Fig. 1 the divergence between particular samples for
single set of parameters is presented - purple from SA, red
form CSA, f (x) = x6 and green from CSA, f (x) = x. As
we can see, the smallest differences we have for SA, the
most incompatible are results from CSA, f (x) = x. Similar
conclusions we have after studying the standard deviation
of those numbers. We want to know how wide those results
are interspersed around 23. The lower standard deviation is,
the lower is dissipation of averages. Indeed, we get standard
deviation 0,215 for CSA f (x) = x, 0,027 for CSA f (x) = x6
and 0,026 for SA. It only confirms prior findings. On the
Fig. 2, 3 and 4 we can see that with the same values on the
vertical axis, the highest amplitude is for the CSA, f (x) = x
and the most stable is chart for SA samples. This explains
values of standard deviation.</p>
        <p>To sum up, there is no doubt that application the second
fitness function gives us better results but if we compare
Cuckoo Search Algorithm and Simulated Annealing it turns
out that for this problem SA is unbeatably better. In our
comparisons, samples for CSA, f (x) = x6 gave us results
very similar to samples from SA but we have to remember
that in the SA we could set parameters in such a way that
almost every particular result which is taken to average equals
23. In CSA it is immposible to establish parameters to obtain
such exact value in the final result. We have numbers from the
range 16-29 and that is why Simulated Annealing is better to
use than Cuckoo Search Algirithm in this problem.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>VII. FINAL REMARKS</title>
      <p>In this article Cuckoo Search Algorithm has been
implemented to obtain the solution for the Birthday Paradox
Problem. Benchmark tests have been performed to establish
the best parameters which gives us the solution. The results
have been compared to the prior results for the same problem
but solved using Simulate Annealing Algorithm. Algorithm
with the best solution for this problem has been chosen.
27
22
24
24
19
20
22
24
24
25
23
22
24
24
23
20
23
25
19
22
23
24
21
23
20
17
25
25
24
23
Fig. 4: Chart of distribution of averages for samples from SA.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woz</surname>
          </string-name>
          <article-title>´niak, “Fitness function for evolutionary computation applied in dynamic object simulation and positioning</article-title>
          ,”
          <source>in IEEE SSCI 2014: 2014 IEEE Symposium Series on Computational Intelligence - CIVTS 2014: 2014 IEEE Symposium on Computational Intelligence in Vehicles and Transportation Systems, Proceedings. 9-12 December</source>
          , Orlando, Florida, USA: IEEE,
          <year>2014</year>
          , pp.
          <fpage>108</fpage>
          -
          <lpage>114</lpage>
          , DOI: 10.1109/CIVTS.
          <year>2014</year>
          .
          <volume>7009485</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>V.</given-names>
            <surname>Chifu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Pop</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Salomie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Suia</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Niculici</surname>
          </string-name>
          , “
          <article-title>Optimizing the semantic web service composition process using cuckoo search,” in IDC'2012 - Studies in Computational Intelligence</article-title>
          , no.
          <source>382</source>
          . Springer,
          <year>2012</year>
          , pp.
          <fpage>93</fpage>
          -
          <lpage>102</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woz</surname>
          </string-name>
          ´niak,
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kosmider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          , and E. Tramontana, “
          <article-title>A novel approach toward x-ray images classifier,”</article-title>
          <source>in IEEE SSCI 2015 - 2015 IEEE Symposium Series on Computational Intelligence, Proceedings. 8- 10 December</source>
          , Cape Town, RSA: IEEE,
          <year>2015</year>
          , pp.
          <fpage>1635</fpage>
          -
          <lpage>1641</lpage>
          ,
          <source>DOI: 22 24 22 23 24 23 22 23 24 24 22 24 24 22 22 22 23 24 22 22 23 22 23 23 23 21 23 25 21 23 10</source>
          .1109/SSCI.
          <year>2015</year>
          .
          <volume>230</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woz</surname>
          </string-name>
          ´niak, D. Połap,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Nowicki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          , G. Pappalardo, and E. Tramontana, “
          <article-title>Novel approach toward medical signals classifier</article-title>
          ,” in IEEE IJCNN 2015
          <article-title>-</article-title>
          2015
          <source>IEEE International Joint Conference on Neural Networks, Proceedings. 12-17 July</source>
          , Killarney, Ireland: IEEE,
          <year>2015</year>
          , pp.
          <fpage>1924</fpage>
          -
          <lpage>1930</lpage>
          , DOI: 10.1109/IJCNN.
          <year>2015</year>
          .
          <volume>7280556</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          , M. Woz´niak,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          , E. Tramontana, and R. Damasˇevic˘ius, “
          <article-title>Is the colony of ants able to recognize graphic objects?” Communications in Computer</article-title>
          and Information Science - ICIST'
          <year>2015</year>
          , vol.
          <volume>538</volume>
          , pp.
          <fpage>376</fpage>
          -
          <lpage>387</lpage>
          ,
          <year>2015</year>
          , DOI: 10.1007/978-3-
          <fpage>319</fpage>
          -24770-0
          <fpage>33</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woz</surname>
          </string-name>
          ´niak,
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gabryel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Nowicki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          , and E. Tramontana, “
          <article-title>Can we preprocess 2d images using artificial bee colony</article-title>
          <source>?” Lecture Notes in Artificial Intelligence - ICAISC</source>
          '
          <year>2015</year>
          , vol.
          <volume>9119</volume>
          , pp.
          <fpage>660</fpage>
          -
          <lpage>671</lpage>
          ,
          <year>2015</year>
          , DOI: 10.1007/978-3-
          <fpage>319</fpage>
          -19324-3
          <fpage>59</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woz</surname>
          </string-name>
          ´niak, M. Gabryel,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Nowicki</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Nowak</surname>
          </string-name>
          , “
          <article-title>An application of firefly algorithm to position traffic in nosql database systems</article-title>
          ,
          <source>” Advances in Intelligent Systems and Computing - KICSS'2014</source>
          , vol.
          <volume>416</volume>
          , pp.
          <fpage>259</fpage>
          -
          <lpage>272</lpage>
          ,
          <year>2016</year>
          , DOI: 10.1007/978-3-
          <fpage>319</fpage>
          -27478-2
          <fpage>18</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kirkpatrick</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Vecchi</surname>
          </string-name>
          , “
          <article-title>Optimization by simmulated annealing,” Science</article-title>
          , vol.
          <volume>220</volume>
          , no.
          <issue>4598</issue>
          , pp.
          <fpage>671</fpage>
          -
          <lpage>680</lpage>
          ,
          <year>1983</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>L.</given-names>
            <surname>Ingber</surname>
          </string-name>
          , “
          <article-title>Very fast simulated re-annealing</article-title>
          ,
          <source>” Mathematical and Computer Modelling</source>
          , vol.
          <volume>12</volume>
          , no.
          <issue>8</issue>
          , pp.
          <fpage>967</fpage>
          -
          <lpage>973</lpage>
          ,
          <year>1989</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woz</surname>
          </string-name>
          <article-title>´niak and D</article-title>
          . Połap, “
          <article-title>On some aspects of genetic and evolutionary methods for optimization purposes</article-title>
          ,”
          <source>International Journal of Electronics and Telecommunications</source>
          , vol.
          <volume>61</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>7</fpage>
          -
          <lpage>16</lpage>
          ,
          <year>2015</year>
          , DOI: 10.1515/eletel-2015-0001.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Corana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Marchesi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Martini</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Ridella</surname>
          </string-name>
          , “
          <article-title>Minimizing multimodal functions of continuous variables with the simulated annealing algorithm</article-title>
          ,
          <source>” ACM Transactions on Mathematical Software</source>
          , vol.
          <volume>13</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>262</fpage>
          -
          <lpage>280</lpage>
          ,
          <year>1987</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>I.</given-names>
            <surname>Dupanloup</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Schneider</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L.</given-names>
            <surname>Excoffier</surname>
          </string-name>
          , “
          <article-title>A simulated annealing approach to define the genetic structure of populations,” Molecular Ecology</article-title>
          , vol.
          <volume>11</volume>
          , no.
          <issue>12</issue>
          , pp.
          <fpage>2571</fpage>
          -
          <lpage>2581</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woz</surname>
          </string-name>
          ´niak, D. Połap, G. Borowik, and
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          , “
          <article-title>A first attempt to cloud-based user verification in distributed system,” in Asia-Pacific Conference on Computer Aided System Engineering APCASE'</article-title>
          <year>2015</year>
          .
          <fpage>14</fpage>
          -
          <issue>16</issue>
          <year>July</year>
          , Quito, Ecuador: IEEE,
          <year>2015</year>
          , pp.
          <fpage>226</fpage>
          -
          <lpage>231</lpage>
          , DOI: 10.1109/APCASE.
          <year>2015</year>
          .
          <volume>47</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>J.</given-names>
            <surname>Cabello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cejudo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Luque</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Ruiz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Deb</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Tewari</surname>
          </string-name>
          , “
          <article-title>Optimization of the sizing of a solar thermal electricity plant: Mathematical programming versus genetic algorithms,” in CEC'2009 Proceedings</article-title>
          . IEEE,
          <year>2009</year>
          , pp.
          <fpage>1193</fpage>
          -
          <lpage>1200</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>G. S.</given-names>
            <surname>Walia</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Kapoor</surname>
          </string-name>
          , “
          <article-title>Intelligent video target tracking using an evolutionary particle filter based upon improved cuckoo search,” Expert Systems with Applications</article-title>
          , vol.
          <volume>41</volume>
          , no.
          <issue>14</issue>
          , pp.
          <fpage>6315</fpage>
          -
          <lpage>6326</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>R.</given-names>
            <surname>Bulatovic</surname>
          </string-name>
          ´, S. Bordevic´, and
          <string-name>
            <given-names>V.</given-names>
            <surname>Dordevic</surname>
          </string-name>
          ´, “
          <article-title>Cuckoo search algorithm: a metaheuristic approach to solving the problem of optimum synthesis of a six-bar double dwell linkage</article-title>
          ,
          <source>” Mechanism and Machine Theory</source>
          , vol.
          <volume>61</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>K.</given-names>
            <surname>Chandrasekaran</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Simon</surname>
          </string-name>
          ,
          <article-title>“Multi-objective scheduling problem: hybrid appraoch using fuzzy assisted cuckoo search algorithm,” Swarm and Evolutionary Computation</article-title>
          , vol.
          <volume>5</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>16</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          , M. Woz´niak, C. Napoli, and E. Tramontana, “Is swarm intelligence able to create mazes?”
          <source>International Journal of Electronics and Telecommunications</source>
          , vol.
          <volume>61</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>305</fpage>
          -
          <lpage>310</lpage>
          ,
          <year>2015</year>
          , DOI: 10.1515/eletel-2015-0039.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          , M. Woz´niak, C. Napoli, and E. Tramontana, “
          <article-title>Real-time cloud-based game management system via cuckoo search algorithm</article-title>
          ,”
          <source>International Journal of Electronics and Telecommunications</source>
          , vol.
          <volume>61</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>333</fpage>
          -
          <lpage>338</lpage>
          ,
          <year>2015</year>
          , DOI: 10.1515/eletel-2015-0043.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>M.</given-names>
            <surname>Clerc</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Kennedy</surname>
          </string-name>
          , “
          <article-title>The particle swarmexplosion, stability and convergence in a multidimensional complex space</article-title>
          ,
          <source>” IEEE Transactions on Evolutionary Computation</source>
          , vol.
          <volume>6</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>58</fpage>
          -
          <lpage>73</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>I.</given-names>
            <surname>Fister</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X. S.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Brest</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and I. F.</given-names>
            <surname>Jr</surname>
          </string-name>
          ., “
          <article-title>Modified firefly algorithm using quaternion representation,” Expert Systems with Applications</article-title>
          , vol.
          <volume>40</volume>
          , no.
          <issue>18</issue>
          , pp.
          <fpage>7220</fpage>
          -
          <lpage>7230</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>A.</given-names>
            <surname>Benna</surname>
          </string-name>
          ”
          <article-title>On Application of Anealing Algorithm to Birthday Paradox Problem”</article-title>
          , in International Conference for Young Researchers in Informatics, Mathematics, and
          <string-name>
            <surname>Engineering</surname>
            <given-names>ICYRIME</given-names>
          </string-name>
          '
          <year>2016</year>
          .
          <fpage>27</fpage>
          -29 June, Catania, Italy,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>