Computing Reviews

Exploration and exploitation in evolutionary algorithms:a survey
Črepinšek M., Liu S., Mernik M. ACM Computing Surveys45(3):1-33,2013.Type:Article
Date Reviewed: 08/21/13

In this survey paper, the authors tackle an important issue concerning the solution of an optimization problem using search. The paper revisits almost 100 papers in connection with exploration and exploitation in evolutionary algorithms (EAs).

The paper addresses the following issues:

  • How exploration and exploitation can be achieved in EAs;
  • When and how to control exploration and exploitation; and
  • How to balance exploration and exploitation in situations driven by diversity.

It is commonly accepted that “exploration and exploitation in EAs is achieved by selection, mutation, and crossover,” but it is difficult to distinguish between exploration and exploitation within these processes. Until now, it seemed like achieving a good balance between exploration and exploitation required proper settings for control parameters and the effective representation of individuals.

Due to existing experimental studies, exploration and exploitation should be controlled online and balanced during the run. The authors classify different diversity measures at three levels: genotype, phenotype, and the composite measure. The surveyed genotype measures are based on difference, distance, entropy, probability, and history. The phenotypic diversity measures are based on difference, distance, entropy, and probability.

The authors also present different techniques for maintaining the diversity of the population: non-niching approaches (those based on population, selection, crossover, and mutation, as well as a hybrid method) and niching approaches (those based on fitness, replacement, and preservation, as well as a hybrid method). The paper identifies other techniques for achieving exploration and exploitation through diversity control, diversity learning, and direct approaches.

The paper ends with suggestions for important future research directions.

Reviewer:  Petrica Pop Review #: CR141490 (1311-1033)

Reproduction in whole or in part without permission is prohibited.   Copyright 2024 ComputingReviews.com™
Terms of Use
| Privacy Policy