A cascade evolutionary algorithm for the bodyguard allocation problem

Graphical abstractDisplay Omitted HighlightsThis paper address the bodyguard allocation problem (BAP) through an evolutionary approach.The paper proposes a two-stage cascade evolutionary algorithm that outperforms the state-of-the-art algorithm, known as CBAP, for this problem.The paper presents the computational experiments of the evaluation of both algorithms. The bodyguard allocation problem (BAP) is an optimization problem that illustrates the behavior of processes with contradictory individual goals in some distributed systems. The objective function of this problem is the maximization of a parameter called the social welfare. Although the main method proposed to solve this problem, known as CBAP, is simple and time efficient, it lacks the ability to generate a diverse set of solutions, which is one of the most important feature to improve the chances to reach the global optimum. To overcome this drawback, we address the BAP with an evolutionary algorithm, the EBAP. Later, we take advantage of the best properties of both algorithms, EBAP and CBAP, to generate a two-stage cascade evolutionary algorithm called FFC-BAP. Extensive experimental results show that the algorithm FFC-BAP outperforms both the EBAP and the CBAP, in terms of quality of solutions.

[1]  Mitsuo Gen,et al.  Genetic algorithm approach on multi-criteria minimum spanning tree problem , 1999, Eur. J. Oper. Res..

[2]  Andrei Z. Broder,et al.  Generating random spanning trees , 1989, 30th Annual Symposium on Foundations of Computer Science.

[3]  P. Erdos,et al.  On the evolution of random graphs , 1984 .

[4]  Frank Neumann,et al.  Minimum Spanning Trees Made Easier , 2010 .

[5]  M. F. Fuller,et al.  Practical Nonparametric Statistics; Nonparametric Statistical Inference , 1973 .

[6]  G. Raidl An efficient evolutionary algorithm for the degree-constrained minimum spanning tree problem , 2000, Proceedings of the 2000 Congress on Evolutionary Computation. CEC00 (Cat. No.00TH8512).

[7]  H. Lilliefors On the Kolmogorov-Smirnov Test for Normality with Mean and Variance Unknown , 1967 .

[8]  Kalyanmoy Deb,et al.  Handling many-objective problems using an improved NSGA-II procedure , 2012, 2012 IEEE Congress on Evolutionary Computation.

[9]  Albert-László Barabási,et al.  Internet: Diameter of the World-Wide Web , 1999, Nature.

[10]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.

[11]  A. E. Eiben,et al.  Introduction to Evolutionary Computing , 2003, Natural Computing Series.

[12]  Carsten Wiuf,et al.  A Markov Chain Approach to Randomly Grown Graphs , 2008, J. Appl. Math..

[13]  Hector Garcia-Molina,et al.  Streaming Live Media over a Peer-to-Peer Network , 2001 .

[14]  Christian Blum,et al.  Metaheuristics in combinatorial optimization: Overview and conceptual comparison , 2003, CSUR.

[15]  Andreas S. Schulz,et al.  On the performance of user equilibria in traffic networks , 2003, SODA '03.

[16]  Franz Rothlauf,et al.  Network Random Keys-A Tree Representation Scheme for Genetic and Evolutionary Algorithms , 2005 .

[17]  Eli Upfal,et al.  Stochastic models for the Web graph , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.

[18]  Christos H. Papadimitriou,et al.  Worst-case equilibria , 1999 .

[19]  Dinesh C. Verma,et al.  ALMI: An Application Level Multicast Infrastructure , 2001, USITS.

[20]  Tim Roughgarden,et al.  The price of stability for network design with fair cost allocation , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.

[21]  David K. Smith,et al.  Recent Advances in the Study of the Dandelion Code, Happy Code, and Blob Code Spanning Tree Representations , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[22]  Carlos A. Coello Coello,et al.  Evolutionary multiobjective optimization , 2011, WIREs Data Mining Knowl. Discov..

[23]  David H. Wolpert,et al.  No free lunch theorems for optimization , 1997, IEEE Trans. Evol. Comput..

[24]  Daniel Fajardo-Delgado,et al.  The Bodyguard Allocation Problem , 2013, IEEE Transactions on Parallel and Distributed Systems.

[25]  Jun Wang Computational Intelligence In Manufacturing Handbook , 2000 .

[26]  David K. Smith,et al.  The Dandelion Code: A New Coding of Spanning Trees for Genetic Algorithms , 2007, IEEE Transactions on Evolutionary Computation.

[27]  S. Picciotto How to encode a tree , 2017, 1710.08463.

[28]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[29]  Marjan Mernik,et al.  Replication and comparison of computational experiments in applied evolutionary computing: Common pitfalls and guidelines to avoid them , 2014, Appl. Soft Comput..

[30]  Marc Toussaint,et al.  On Classes of Functions for which No Free Lunch Results Hold , 2001, Inf. Process. Lett..

[31]  Bryant A. Julstrom,et al.  Edge sets: an effective evolutionary coding of spanning trees , 2003, IEEE Trans. Evol. Comput..

[32]  B. Bollobás The evolution of random graphs , 1984 .

[33]  E. Ziv,et al.  Inferring network mechanisms: the Drosophila melanogaster protein interaction network. , 2004, Proceedings of the National Academy of Sciences of the United States of America.

[34]  Pablo Moscato,et al.  Handbook of Memetic Algorithms , 2011, Studies in Computational Intelligence.

[35]  David K. Smith,et al.  From the Dandelion Code to the Rainbow code: a class of bijective spanning tree representations with linear complexity and bounded locality , 2006, IEEE Transactions on Evolutionary Computation.

[36]  H E Stanley,et al.  Classes of small-world networks. , 2000, Proceedings of the National Academy of Sciences of the United States of America.

[37]  Kun-Mao Chao,et al.  Spanning trees and optimization problems , 2004, Discrete mathematics and its applications.

[38]  A. E. Eiben,et al.  A critical note on experimental research methodology in EC , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[39]  Andreas S. Schulz,et al.  On the Performance of User Equilibrium in Traffic Networks , 2015 .

[40]  Francisco J. Rodríguez,et al.  Arbitrary function optimisation with metaheuristics , 2012, Soft Comput..

[41]  Lada A. Adamic,et al.  Power-Law Distribution of the World Wide Web , 2000, Science.

[42]  Stefan Bornholdt,et al.  Handbook of Graphs and Networks: From the Genome to the Internet , 2003 .

[43]  Mitsuo Gen,et al.  An effective genetic algorithm approach to the quadratic minimum spanning tree problem , 1998, Comput. Oper. Res..