IEEE Computational Intelligence Magazine - May 2021 - 86

2) Encoding via Iterative
score within the time budget, we
Utility Edge Inserting
propose four heuristic rules to select
As discussed, we propose to encode
utility edges at each iteration, detailed
each chromosome by a sequence of
as follows.
utility edges that satisfy any one of the
❏❏ Rule 1: Number priority. Intuitiveabove-mentioned four heuristic rules.
ly, the path utility is higher if more
As a result, the encoded chromosome is
utility edges can be included in the
a combination of utility edges that are
planned path. Motivated by this,
selected based on mixed heuristic rules.
we select the spatially nearest utility
In other words, the utility edges in a chromoedge to the starting node at one
some may be selected according to different
iteration. As a result, more time is
heuristic rules. Compared to previous
expected to be left for accommoevolutionary algorithms that commonly
dating more utility edges in future
adopt a universal heuristic in generating a
iterations.
chromosome [21], [38], our proposed
❏❏ Rule 2: Value priority. Similarly, the
chromosome encoding method could
path utility is higher if the utility
yield more diverse chromosomes while
edge with higher value can be
still maintaining a suitable size of popuincluded in the planned path. Thus,
lation. In more detail, the population of
we select the reachable utility edge
chromosomes is generated by an iterawith the highest utility value at one
tive procedure which mainly includes
iteration. Such selection is not easy
in practice since the utility value
is time-dependent. To simplify
the issue, we rely on the average
Algorithm 1 Encoding via iterative utility edge inserting.
utility value across all times [20],
instead of the detailed time-   Input:  n o, t 0, timeTable
dependent utility values.
  Output:  Chr
❏❏ Rule 3: Time-sensitivity and
 1: 
function encoding(n o, t 0, timeTable)
changing range priority. It is  2:   Chr ! 4
expected that the path utility can  3:   E ! 4
be potentially higher if the utili-  4:   for r ! {rule1, rule2, rule3, rule4} do
ty edge with a higher changing  5:     E !selectUE (n o, t 0, timeTable, r)
frequency and a wider changing  6:   if E is not empty then
range can be included in the  7:     for e ! E do
planned path. To account them  8:       t 0 ! t 0 + Tavg (n 0, e);
comprehensively, we use the   9:       Update n o
ratio of the change range to the  10:        Br ! encoding (n o, t 0, timeTable)
time-sensitivity, then select the  11:       if Br is not empty then
reachable utility edge with the  12:         for br ! Br do
highest ratio value.
 13:            Chr ! Chr , (e + br)
❏❏ Rule 4: Random priority. We
 14:       else
randomly select a reachable utili-  15:         Chr ! Chr , e
ty edge, to avoid the case where  16:     return Chr
the previous three rules may be  17: function selectUE (n o, t 0, timeTable, r)
inclined to select utility edges  18:    candidateE ! 4
located at a small area in the  19:    t (e) ! 0
road network.
 20:    e ! getE(timeTable, r)
In a nutshell, based on the first  21:    candidateE ! candidateE , e
three heuristic rules, we intend to  22:    t (e) ! t 0 + Tavg (n 0, e)
exploit the potentials of " high-quality "  23:   if t (e) $ Ct (e) and t (e) # Ut (e) then
utility edges in certain aspects to obtain  24:      timeTable ! timeTable \ e
the optimal path. On the contrary,  25:     if timeTable is not empty then
based on the last heuristic rule, we aim  26:        e ! getE(timeTable, r)
to explore more possibilities and avoid  27:        candidateE ! candidateE , e
the local optimum.
 28:     return candidateE

86

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE | MAY 2021

the following two steps. The two steps
are performed until no reachable edges
can be selected from the edge timetable
for each chromosome.
Step 1: Utility edge selection. The
utility edge selection is conducted on
top of the chromosome. Specifically,
the last utility edge in the chromosome
is firstly set as the parent edge. Then,
the child edges E are selected from
the timetable according to the four
heuristic rules under the reachability
constraint.
Step 2: Chromosome growing. If E
is empty, the chromosome will stop
growing. Meanwhile, the iteration will
be terminated. If E is not empty, the
chromosome will continue to grow in
both size and length by inserting and
appending each utility edge in E into the
input chromosome. Thus, with respect
to the size, one chromosome would
grow into | E | new chromosomes
in total. With respect to the length,
all of the newly generated chromosomes would contain one more utility edge in the sequence.
We argue that the encoding efficiency of the iterative edge inserting
can be guaranteed. On one hand,
the pool size for the selection is relatively limited and small since the
number of utility edges is limited
and small. On the other hand, the
chromosome population size should
not be big since during one-time
chromosome growing, four new
chromosomes at most are generated.
More importantly, the number of
iterations is also upper-bounded by
the given time budget. We will give
more detailed quantitative analysis
in Appendix A.
We also provide the pseudocode of encoding via iterative utility
edge inserting, as shown in Algorithm 1. The input are n o , t 0 and
the timeTable, while the output is
the population of chromosomes
Chr. Abstractly, our proposed algor ithm encodes chromosomes
recursively. It should be noted that
n o refers to the tail node of the
parent chromosome edge, which is
updated dur ing the recursion.



IEEE Computational Intelligence Magazine - May 2021

Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - May 2021

Contents
IEEE Computational Intelligence Magazine - May 2021 - Cover1
IEEE Computational Intelligence Magazine - May 2021 - Cover2
IEEE Computational Intelligence Magazine - May 2021 - Contents
IEEE Computational Intelligence Magazine - May 2021 - 2
IEEE Computational Intelligence Magazine - May 2021 - 3
IEEE Computational Intelligence Magazine - May 2021 - 4
IEEE Computational Intelligence Magazine - May 2021 - 5
IEEE Computational Intelligence Magazine - May 2021 - 6
IEEE Computational Intelligence Magazine - May 2021 - 7
IEEE Computational Intelligence Magazine - May 2021 - 8
IEEE Computational Intelligence Magazine - May 2021 - 9
IEEE Computational Intelligence Magazine - May 2021 - 10
IEEE Computational Intelligence Magazine - May 2021 - 11
IEEE Computational Intelligence Magazine - May 2021 - 12
IEEE Computational Intelligence Magazine - May 2021 - 13
IEEE Computational Intelligence Magazine - May 2021 - 14
IEEE Computational Intelligence Magazine - May 2021 - 15
IEEE Computational Intelligence Magazine - May 2021 - 16
IEEE Computational Intelligence Magazine - May 2021 - 17
IEEE Computational Intelligence Magazine - May 2021 - 18
IEEE Computational Intelligence Magazine - May 2021 - 19
IEEE Computational Intelligence Magazine - May 2021 - 20
IEEE Computational Intelligence Magazine - May 2021 - 21
IEEE Computational Intelligence Magazine - May 2021 - 22
IEEE Computational Intelligence Magazine - May 2021 - 23
IEEE Computational Intelligence Magazine - May 2021 - 24
IEEE Computational Intelligence Magazine - May 2021 - 25
IEEE Computational Intelligence Magazine - May 2021 - 26
IEEE Computational Intelligence Magazine - May 2021 - 27
IEEE Computational Intelligence Magazine - May 2021 - 28
IEEE Computational Intelligence Magazine - May 2021 - 29
IEEE Computational Intelligence Magazine - May 2021 - 30
IEEE Computational Intelligence Magazine - May 2021 - 31
IEEE Computational Intelligence Magazine - May 2021 - 32
IEEE Computational Intelligence Magazine - May 2021 - 33
IEEE Computational Intelligence Magazine - May 2021 - 34
IEEE Computational Intelligence Magazine - May 2021 - 35
IEEE Computational Intelligence Magazine - May 2021 - 36
IEEE Computational Intelligence Magazine - May 2021 - 37
IEEE Computational Intelligence Magazine - May 2021 - 38
IEEE Computational Intelligence Magazine - May 2021 - 39
IEEE Computational Intelligence Magazine - May 2021 - 40
IEEE Computational Intelligence Magazine - May 2021 - 41
IEEE Computational Intelligence Magazine - May 2021 - 42
IEEE Computational Intelligence Magazine - May 2021 - 43
IEEE Computational Intelligence Magazine - May 2021 - 44
IEEE Computational Intelligence Magazine - May 2021 - 45
IEEE Computational Intelligence Magazine - May 2021 - 46
IEEE Computational Intelligence Magazine - May 2021 - 47
IEEE Computational Intelligence Magazine - May 2021 - 48
IEEE Computational Intelligence Magazine - May 2021 - 49
IEEE Computational Intelligence Magazine - May 2021 - 50
IEEE Computational Intelligence Magazine - May 2021 - 51
IEEE Computational Intelligence Magazine - May 2021 - 52
IEEE Computational Intelligence Magazine - May 2021 - 53
IEEE Computational Intelligence Magazine - May 2021 - 54
IEEE Computational Intelligence Magazine - May 2021 - 55
IEEE Computational Intelligence Magazine - May 2021 - 56
IEEE Computational Intelligence Magazine - May 2021 - 57
IEEE Computational Intelligence Magazine - May 2021 - 58
IEEE Computational Intelligence Magazine - May 2021 - 59
IEEE Computational Intelligence Magazine - May 2021 - 60
IEEE Computational Intelligence Magazine - May 2021 - 61
IEEE Computational Intelligence Magazine - May 2021 - 62
IEEE Computational Intelligence Magazine - May 2021 - 63
IEEE Computational Intelligence Magazine - May 2021 - 64
IEEE Computational Intelligence Magazine - May 2021 - 65
IEEE Computational Intelligence Magazine - May 2021 - 66
IEEE Computational Intelligence Magazine - May 2021 - 67
IEEE Computational Intelligence Magazine - May 2021 - 68
IEEE Computational Intelligence Magazine - May 2021 - 69
IEEE Computational Intelligence Magazine - May 2021 - 70
IEEE Computational Intelligence Magazine - May 2021 - 71
IEEE Computational Intelligence Magazine - May 2021 - 72
IEEE Computational Intelligence Magazine - May 2021 - 73
IEEE Computational Intelligence Magazine - May 2021 - 74
IEEE Computational Intelligence Magazine - May 2021 - 75
IEEE Computational Intelligence Magazine - May 2021 - 76
IEEE Computational Intelligence Magazine - May 2021 - 77
IEEE Computational Intelligence Magazine - May 2021 - 78
IEEE Computational Intelligence Magazine - May 2021 - 79
IEEE Computational Intelligence Magazine - May 2021 - 80
IEEE Computational Intelligence Magazine - May 2021 - 81
IEEE Computational Intelligence Magazine - May 2021 - 82
IEEE Computational Intelligence Magazine - May 2021 - 83
IEEE Computational Intelligence Magazine - May 2021 - 84
IEEE Computational Intelligence Magazine - May 2021 - 85
IEEE Computational Intelligence Magazine - May 2021 - 86
IEEE Computational Intelligence Magazine - May 2021 - 87
IEEE Computational Intelligence Magazine - May 2021 - 88
IEEE Computational Intelligence Magazine - May 2021 - 89
IEEE Computational Intelligence Magazine - May 2021 - 90
IEEE Computational Intelligence Magazine - May 2021 - 91
IEEE Computational Intelligence Magazine - May 2021 - 92
IEEE Computational Intelligence Magazine - May 2021 - 93
IEEE Computational Intelligence Magazine - May 2021 - 94
IEEE Computational Intelligence Magazine - May 2021 - 95
IEEE Computational Intelligence Magazine - May 2021 - 96
IEEE Computational Intelligence Magazine - May 2021 - 97
IEEE Computational Intelligence Magazine - May 2021 - 98
IEEE Computational Intelligence Magazine - May 2021 - 99
IEEE Computational Intelligence Magazine - May 2021 - 100
IEEE Computational Intelligence Magazine - May 2021 - Cover3
IEEE Computational Intelligence Magazine - May 2021 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com