Known as two cornerstones of problem solving by search, exploitation and exploration are extensively discussed for implementation and application of evolutionary algorithms (EAs). However, only a few researches focus on evaluation and theoretical estimation of exploitation and exploration. Considering that exploitation and exploration are two issues regarding global search and local search, this paper proposes to evaluate them via the success probability and the one-step improvement rate computed in different domains of integration. Then, case studies are performed by analyzing performances of (1+1) random univariate search and (1+1) evolutionary programming on the sphere function and the cheating problem. By rigorous theoretical analysis, we demonstrate that both exploitation and exploration of the investigated elitist EAs degenerate exponentially with the problem dimension $n$. Meanwhile, it is also shown that maximization of exploitation and exploration can be achieved by setting an appropriate value for the standard deviation $\sigma$ of Gaussian mutation, which is positively related to the distance from the present solution to the center of the promising region.
[1]
Enrique Alba,et al.
The exploration/exploitation tradeoff in dynamic cellular genetic algorithms
,
2005,
IEEE Transactions on Evolutionary Computation.
[2]
Marjan Mernik,et al.
A parameter control method of evolutionary algorithms using exploration and exploitation measures with a practical application for fitting Sovova's mass transfer model
,
2013,
Appl. Soft Comput..
[3]
Riccardo Poli,et al.
A Model for Analysing the Collective Dynamic Behaviour and Characterising the Exploitation of Population-Based Algorithms
,
2014,
Evolutionary Computation.
[4]
A. E. Eiben,et al.
On Evolutionary Exploration and Exploitation
,
1998,
Fundam. Informaticae.
[5]
Kazuyuki Inoue,et al.
Analyzing exploration exploitation trade-off by means of P-I similarity index and dictyostelium based genetic algorithm
,
2015,
2015 IEEE Congress on Evolutionary Computation (CEC).
[6]
Marjan Mernik,et al.
Exploration and exploitation in evolutionary algorithms: A survey
,
2013,
CSUR.