IEEE Computational Intelligence Magazine - February 2020 - 54

can change: 1) the set of nodes [13], and
2) the weights on the arcs [11]. A change
to any of these problem components will
also cause a change to the weight matrix
defined in Equation  1 and, thus, it may
affect the algorithm's output: the best
output before a change may not be the
best (or even feasible) after the change.
Real-world applications that encompass
the aforementioned types of dynamic
changes can be found in many fields,
including transportation. For example,
changes in the traffic situation (i.e.,
weight changes) or changes in the visiting locations (i.e., node changes).
1) DTSP with Node Changes
The key idea to generate a dynamic test
case with this type of changes is to replace
nodes from the current working node set
N in(T ), where N in(0) = N, with newly
introduced nodes drawn from another set
N out(T ). The latter set N out(T ) is initially generated with n new random nodes
in the range of the N set. A dynamic
change of this type occurs as follows.

1

Node Changes
. . .
n

. . .

1

n
(a)
1

Weight Changes
. . .
n

Every f evaluations exactly ^mnh nodes
are randomly selected from N out(T ) to
replace exactly ^mnh randomly selected
nodes from N in(T ), where m (m ! (0, 1])
defines the magnitude of change. The
higher the value of m, the more nodes
will be replaced. In this way, the weight
matrix will be affected because the
weights on the arcs connecting the
replaced nodes will be modified.
2) DTSP with Weight Changes
A dynamic test case with this type of
changes can be generated by assigning an
increasing/decreasing factor value to the
arc connecting nodes i and j as follows:
w ij(T + 1) =
w ij(0) + R ij, if arc (i, j ) ! A S(T ),
(3)
'
w ij(T ),
otherwise,

where w ij(0) is the initial weight of arc
(i, j ) (from the static TSP instance when
T = 0), R ij is a normally distributed
random number (with zero mean and
standard deviation set proportional to
w ij(0) as in [20]) that defines the modified f actor value to arc (i, j ), and
A S(T ) 1 A defines the set of arcs randomly selected for the change at that
period. Consider that the size of the set
A is defined by the number of arcs as
follows: n(n - 1). Then, the size of
A S(T ) is defined by the magnitude of
change (i.e., m ! (0, 1]) and the size of
A. Therefore, every f evaluations
exactly ^mn (n - 1)h arcs will be selected
to change their weights. The higher the
value of m, the more arcs will be selected for changes.

1

. . .

C. Some Additional Remarks

n
(b)
FIGURE 1 Illustration of the weight matrix
when node (a) and weight (b) dynamic
changes (with m = 0.2 in this example)
occur. Gray boxes denote a change to the
weight. Note that the symmetry with respect
to the main diagonal line is due to the fact
that symmetric problem instances are used
to generate DTSPs.

54

It must be noted that there are some
ACO algorithms that benefit from the
use of less ants (e.g., the Ant Colony
System [1]), resulting in less evaluations
per algorithmic iteration, and some
other ACO algorithms that benefit from
the use of more ants (e.g., the hyper
populated ant colonies [25], [26]),
resulting in more evaluations per algorithmic iteration. Therefore, the frequency of change is expressed in
evaluations in the described dynamic
benchmark framework. In this way, a fair

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE | FEBRUARY 2020

comparison between the competing
algorithms is ensured with the generated
DTSP test cases because the dynamic
changes occur at exactly the same period of time (i.e., all algorithms have
exactly the same number of evaluations
available between the environmental
changes). Also, the period of change is
restricted either at the start or at the end
of an algorithmic iteration [27].
From the way the magnitude of change
is defined for both DTSP types, there
exists an interesting observation: the
weights of the same number of arcs, but
not necessarily the same arcs, are modified
when the same value of m is selected for
DTSPs that utilize symmetric problem
instances. For example, in Figure  1 the
dynamic change with magnitude set to
m = 0.2 will change one node for a
problem of size five (i.e., ^0.2 # 5h) when
node changes occur and four arcs for the
same problem (i.e., ^0.2 # 5(5 - 1)h)
when weight changes occur. Consider
that there are two arcs connecting a pair
of nodes and their weights are the same in
symmetric problem instances. For a problem of size five in a fully connected graph,
each node is connected with the remaining four nodes; therefore, when one node
is replaced, the weights of eight arcs in
total will be modified as shown in Figure  1(a). For the same problem, the
weights of the four selected arcs will be
modified when weight changes occur,
but, due to the symmetric property of the
problem instance, each time the weight of
an arc (i, j ) changes, the weight of the arc
( j, i ) changes to the same value. As a
result, the weights of eight arcs in total
will actually change (as in the case of
node changes) as shown in Figure 1(b).
III. Classification of ACO
Algorithms
A. ACO for the Dynamic Travelling
Salesperson Problem

In the ACO metaheuristic, a colony of ~
artificial ants constructs solutions by incrementally selecting feasible solution components. Each solution component is
associated with a pheromone value which
is used to guide artificial ants when selecting the next solution component. Since



IEEE Computational Intelligence Magazine - February 2020

Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - February 2020

Contents
IEEE Computational Intelligence Magazine - February 2020 - Cover1
IEEE Computational Intelligence Magazine - February 2020 - Cover2
IEEE Computational Intelligence Magazine - February 2020 - Contents
IEEE Computational Intelligence Magazine - February 2020 - 2
IEEE Computational Intelligence Magazine - February 2020 - 3
IEEE Computational Intelligence Magazine - February 2020 - 4
IEEE Computational Intelligence Magazine - February 2020 - 5
IEEE Computational Intelligence Magazine - February 2020 - 6
IEEE Computational Intelligence Magazine - February 2020 - 7
IEEE Computational Intelligence Magazine - February 2020 - 8
IEEE Computational Intelligence Magazine - February 2020 - 9
IEEE Computational Intelligence Magazine - February 2020 - 10
IEEE Computational Intelligence Magazine - February 2020 - 11
IEEE Computational Intelligence Magazine - February 2020 - 12
IEEE Computational Intelligence Magazine - February 2020 - 13
IEEE Computational Intelligence Magazine - February 2020 - 14
IEEE Computational Intelligence Magazine - February 2020 - 15
IEEE Computational Intelligence Magazine - February 2020 - 16
IEEE Computational Intelligence Magazine - February 2020 - 17
IEEE Computational Intelligence Magazine - February 2020 - 18
IEEE Computational Intelligence Magazine - February 2020 - 19
IEEE Computational Intelligence Magazine - February 2020 - 20
IEEE Computational Intelligence Magazine - February 2020 - 21
IEEE Computational Intelligence Magazine - February 2020 - 22
IEEE Computational Intelligence Magazine - February 2020 - 23
IEEE Computational Intelligence Magazine - February 2020 - 24
IEEE Computational Intelligence Magazine - February 2020 - 25
IEEE Computational Intelligence Magazine - February 2020 - 26
IEEE Computational Intelligence Magazine - February 2020 - 27
IEEE Computational Intelligence Magazine - February 2020 - 28
IEEE Computational Intelligence Magazine - February 2020 - 29
IEEE Computational Intelligence Magazine - February 2020 - 30
IEEE Computational Intelligence Magazine - February 2020 - 31
IEEE Computational Intelligence Magazine - February 2020 - 32
IEEE Computational Intelligence Magazine - February 2020 - 33
IEEE Computational Intelligence Magazine - February 2020 - 34
IEEE Computational Intelligence Magazine - February 2020 - 35
IEEE Computational Intelligence Magazine - February 2020 - 36
IEEE Computational Intelligence Magazine - February 2020 - 37
IEEE Computational Intelligence Magazine - February 2020 - 38
IEEE Computational Intelligence Magazine - February 2020 - 39
IEEE Computational Intelligence Magazine - February 2020 - 40
IEEE Computational Intelligence Magazine - February 2020 - 41
IEEE Computational Intelligence Magazine - February 2020 - 42
IEEE Computational Intelligence Magazine - February 2020 - 43
IEEE Computational Intelligence Magazine - February 2020 - 44
IEEE Computational Intelligence Magazine - February 2020 - 45
IEEE Computational Intelligence Magazine - February 2020 - 46
IEEE Computational Intelligence Magazine - February 2020 - 47
IEEE Computational Intelligence Magazine - February 2020 - 48
IEEE Computational Intelligence Magazine - February 2020 - 49
IEEE Computational Intelligence Magazine - February 2020 - 50
IEEE Computational Intelligence Magazine - February 2020 - 51
IEEE Computational Intelligence Magazine - February 2020 - 52
IEEE Computational Intelligence Magazine - February 2020 - 53
IEEE Computational Intelligence Magazine - February 2020 - 54
IEEE Computational Intelligence Magazine - February 2020 - 55
IEEE Computational Intelligence Magazine - February 2020 - 56
IEEE Computational Intelligence Magazine - February 2020 - 57
IEEE Computational Intelligence Magazine - February 2020 - 58
IEEE Computational Intelligence Magazine - February 2020 - 59
IEEE Computational Intelligence Magazine - February 2020 - 60
IEEE Computational Intelligence Magazine - February 2020 - 61
IEEE Computational Intelligence Magazine - February 2020 - 62
IEEE Computational Intelligence Magazine - February 2020 - 63
IEEE Computational Intelligence Magazine - February 2020 - 64
IEEE Computational Intelligence Magazine - February 2020 - 65
IEEE Computational Intelligence Magazine - February 2020 - 66
IEEE Computational Intelligence Magazine - February 2020 - 67
IEEE Computational Intelligence Magazine - February 2020 - 68
IEEE Computational Intelligence Magazine - February 2020 - 69
IEEE Computational Intelligence Magazine - February 2020 - 70
IEEE Computational Intelligence Magazine - February 2020 - 71
IEEE Computational Intelligence Magazine - February 2020 - 72
IEEE Computational Intelligence Magazine - February 2020 - 73
IEEE Computational Intelligence Magazine - February 2020 - 74
IEEE Computational Intelligence Magazine - February 2020 - 75
IEEE Computational Intelligence Magazine - February 2020 - 76
IEEE Computational Intelligence Magazine - February 2020 - 77
IEEE Computational Intelligence Magazine - February 2020 - 78
IEEE Computational Intelligence Magazine - February 2020 - 79
IEEE Computational Intelligence Magazine - February 2020 - 80
IEEE Computational Intelligence Magazine - February 2020 - 81
IEEE Computational Intelligence Magazine - February 2020 - 82
IEEE Computational Intelligence Magazine - February 2020 - 83
IEEE Computational Intelligence Magazine - February 2020 - 84
IEEE Computational Intelligence Magazine - February 2020 - 85
IEEE Computational Intelligence Magazine - February 2020 - 86
IEEE Computational Intelligence Magazine - February 2020 - 87
IEEE Computational Intelligence Magazine - February 2020 - 88
IEEE Computational Intelligence Magazine - February 2020 - 89
IEEE Computational Intelligence Magazine - February 2020 - 90
IEEE Computational Intelligence Magazine - February 2020 - 91
IEEE Computational Intelligence Magazine - February 2020 - 92
IEEE Computational Intelligence Magazine - February 2020 - 93
IEEE Computational Intelligence Magazine - February 2020 - 94
IEEE Computational Intelligence Magazine - February 2020 - 95
IEEE Computational Intelligence Magazine - February 2020 - 96
IEEE Computational Intelligence Magazine - February 2020 - 97
IEEE Computational Intelligence Magazine - February 2020 - 98
IEEE Computational Intelligence Magazine - February 2020 - 99
IEEE Computational Intelligence Magazine - February 2020 - 100
IEEE Computational Intelligence Magazine - February 2020 - Cover3
IEEE Computational Intelligence Magazine - February 2020 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com