Mine blast harmony search and its applications

Ali Sadollah, Ho Min Lee, Do Guen Yoo, Joong Hoon Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

A hybrid optimization method that combines the power of the harmony search (HS) algorithm with the mine blast algorithm (MBA) is presented in this study. The resulting mine blast harmony search (MBHS) utilizes the MBA for exploration and the HS for exploitation. The HS is inspired by the improvisation process of musicians, while the MBA is derived based on explosion of landmines. The HS used in the proposed hybrid method is an improved version, introducing a new concept for the harmony memory (HM) (i.e., dynamic HM), while the MBA is modified in terms of its mathematical formulation. Several benchmarks with many design variables are used to validate the MBHS, and the optimization results are compared with other algorithms. The obtained optimization results show that the proposed hybrid algorithm provides better exploitation ability (particularly in final iterations) and enjoys fast convergence to the optimum solution.

Original languageEnglish
Title of host publicationAdvances in Intelligent Systems and Computing
PublisherSpringer Verlag
Pages155-168
Number of pages14
Volume382
ISBN (Print)9783662479254
DOIs
Publication statusPublished - 2016
Event2nd International Conference on Harmony Search Algorithm, ICHSA 2015 - Seoul, Korea, Republic of
Duration: 2015 Aug 192015 Aug 21

Publication series

NameAdvances in Intelligent Systems and Computing
Volume382
ISSN (Print)21945357

Other

Other2nd International Conference on Harmony Search Algorithm, ICHSA 2015
CountryKorea, Republic of
CitySeoul
Period15/8/1915/8/21

Keywords

  • Global optimization
  • Harmony search
  • Hybrid metaheuristic methods
  • Large-scale problems
  • Mine blast algorithm

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Mine blast harmony search and its applications'. Together they form a unique fingerprint.

Cite this