Adaptive Differential Evolution based on Exploration and Exploitation Control

Hao BAI, Changwu HUANG, Xin YAO

Research output: Book Chapters | Papers in Conference ProceedingsConference paper (refereed)Researchpeer-review

Abstract

Search operator design and parameter tuning are essential parts of algorithm design. However, they often involve trial-and-error and are very time-consuming. A new differential evolution (DE) algorithm with adaptive exploration and exploitation control (AEEC-DE) is proposed in this work to tackle this challenge. The proposed method improves the performance of DE by automatically selecting trial vector generation strategies (both mutation and crossover operators) and dynamically generating the associated control parameter values. A probability-based exploration and exploitation measurement is introduced to estimate whether the state of each newly generated individual is in exploration or exploitation. The state of historical individuals is used to assess the exploration and exploitation capabilities of different generation strategies and parameter values. Then, the strategies and parameters of DE are adapted following the common belief that evolutionary algorithms (EAs) should start with exploration and then gradually change into exploitation. The performance of AEEC-DE is evaluated through experimental studies on a set of test problems and compared with several state-of-the-art adaptive DE variants. © 2021 IEEE
Original languageEnglish
Title of host publication2021 IEEE Congress on Evolutionary Computation, CEC 2021 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages41-48
Number of pages8
ISBN (Print)9781728183923
DOIs
Publication statusPublished - 28 Jun 2021
Externally publishedYes

Keywords

  • Algorithm configuration
  • Differential evolution
  • Exploitation
  • Exploration
  • Parameter control

Fingerprint

Dive into the research topics of 'Adaptive Differential Evolution based on Exploration and Exploitation Control'. Together they form a unique fingerprint.

Cite this