Page 176 - IJOCTA-15-1
P. 176

Y. Olmez et al. / IJOCTA, Vol.15, No.1, pp.166-182 (2025)
            is the random nonlinear weight in the range of    where v i (t + 1) is the position value of the i th  rab-
            (0, ∞) and determined by the following equation   bit at (t + 1) th  iteration. x j (t) denotes the cur-
            (13):                                             rent solution of the j th  rabbit. n 1 and r 1 denote
                                      !
                              2.randn                   the parameter with normal distribution and the
                          it                        it
            w =     1 −                 . rand.               random parameter, respectively. The equations
                        max it                    max it
                                                              for the hiding stage are given in Eqs. (18-19):
                                                       (13)
                                                                  v i (t + 1) = x i (t) + R. (r 4 .g − x i (t))  (18)
            where randn denoted a random value in [(−1) −
            (+1)]. max it is the number of the maximum iter-
            ations.                                                      g (t) = x i (t) + H.g r .x i (t)  (19)

            2.5. Cheetah optimization algorithm               Where r4 and H represent the random and the
                                                              hiding parameters, respectively. g is the chosen
            Cheetah Optimizer is one of the methods inspired  burrow for hiding. Finally, an energy factor is
            by nature and was introduced by Akbari et al. in  modeled the provide balance between the explo-
            2022. 28  The algorithm is developed by taking in-  ration and the exploitation phases using Eq. (10).
            spiration from the behavior of the cheetahs during
            the hunting stage. According to hunting behav-
                                                                                       it        1
            iors, the optimization method consists of three           A (t) = 4 1 −          ln          (20)
            strategies, which are searching, sitting and wait-                       max it      r
            ing, and attacking. According to the search strat-  where max it indicates the number of the itera-
            egy, the new solutions are updated by using Eq.   tions (it).
            (14):

                                                              2.7. Golden jackal optimization algorithm
                  x i,j (t + 1) = x i,j (t) + r −1 .a i,j (t)  (14)  Golden Jackal Optimization was also developed
                                        i,j
            where x (i,j) (t) and x (i,j) (t + 1) demonstrate the  inspired by nature and was introduced by Chopra
            current and the next positions of the ith cheetah  et al. in 2022. 30  It is based on the behavior of
            on d-dimension. r −1  and a   (t) denote random   golden jackals during the hunting process. The
                             (i,j)     (i,j)
            parameters and the step length of the cheetah, re-  hunting techniques of the jackals are modeled as
            spectively. According to the second strategy, sit-  three stages: searching, encircling, and attacking.
            ting and waiting, the new solutions are calculated  The male jackal leads the prey. The jackals’ posi-
            as in Eq. (15):                                   tions are updated via Eq. (21) corresponding to
                                                              the prey.

                          x i,j (t + 1) = x i,j (t)    (15)                  x m (t + 1) + x fm (t + 1)
                                                                  x (t + 1) =                            (21)
            Finally, according to the third strategy, attack-                           2
            ing, the new positions are found via the following  where x m (t + 1) and x fm (t + 1) demonstrate the
            equation (16):                                    male and female jackals obtained using Eqs. (22)-
                                                              (23)
                  x i,j (t + 1) = x β,j (t) + r i,j .β i,j (t)  (16)
                                                               x m (t + 1) = x m (t) − E. |x m (t) − rl.p (t)| (22)
            Where r i,j and x β,j (t) denote the turning param-
            eter and position of the prey, respectively. β i,j (t)
            is the interaction parameter.
                                                               x fm (t + 1) = x f (t) − E. |x f (t) − rl.p (t)|  (23)
            2.6. Artificial rabbit optimization               where x m (t) and x m (t + 1) denote the current and
                 algorithm                                    the next positions of the male jackal and x f (t)
                                                              and x f (t + 1) represent the current and the next
            Artificial Rabbit Optimization is a nature-
                                                              value of the female jackal. p(t) is the prey posi-
            inspired algorithm proposed by Wang et al. in
                                                              tion. E and rl indicate an energy function and
            2022.
                                                              a random vector generated with Levy distribu-
                                                              tion, respectively. When a jackal pair attacks the
                v i (t + 1) = x j (t) + R. (x i (t) − x j (t))  prey, its evading energy decreases, and the jackals
                                                       (17)
                         +round (0.5. (0.05 + r 1 )) .n 1     surround the prey identified in the previous step.
                                                           170
   171   172   173   174   175   176   177   178   179   180   181