SlideShare a Scribd company logo
1 of 19
CUCKOO SEARCH ALGORITHM
Submited By-
Prachi Gulihar 31603216
Riya Bilaiya 31603223
Table of contents
1.Cuckoo search algorithm (History and main idea)
3. Characteristics of Cuckoo search
7. References
2. Behavior of Cuckoo breeding
6. Application of the Cuckoo search Algorithm
4. Lѐvy Flights
5. Cuckoo search Algorithm
History and main idea
•A method of global optimization based on the
behavior of cuckoos was proposed by Yang &
Deb (2009).
•The original “cuckoo search (CS) algorithm”
is based on the idea of the following :-
 How cuckoos lay their eggs in the host nests.
How, if not detected and destroyed, the eggs
are hatched to chicks by the hosts.
How a search algorithm based on such a
scheme can be used to find the global optimum
of a function.
Behavior of Cuckoo breeding
•The CS was inspired by the obligate
brood parasitism of some cuckoo species
by laying their eggs in the nests of host
birds.
•Some cuckoos have evolved in such a
way that female parasitic cuckoos can
imitate the colors and patterns of the
eggs of a few chosen host species.
•This reduces the probability of the eggs
being abandoned and, therefore,
increases their reproductivity .
•If host birds discover the eggs are not
their own, they will either throw them
away or simply abandon their nests and
build new ones.
•Parasitic cuckoos often choose a nest
where the host bird just laid its own
eggs.
•In general, the cuckoo eggs hatch
slightly earlier than their host eggs.
•Once the first cuckoo chick is hatched,
his first instinct action is to evict the host
eggs by blindly propelling the eggs out
of the nest.
•This action results in increasing the
cuckoo chick’s share of food provided by
its host bird .
•Moreover, studies show that a cuckoo
chick can imitate the call of host chicks to
gain access to more feeding opportunity.
Characteristics of Cuckoo search
•Each egg in a nest represents a solution,
and a cuckoo egg represents a new
solution.
•The aim is to employ the new and
potentially better solutions (cuckoos) to
replace not-so-good solutions in the nests.
• In the simplest form, each nest has one
egg.
•The algorithm can be extended to more
complicated cases in which each nest has
multiple eggs representing a set of
solutions
The CS is based on three idealized rules:
• Each cuckoo lays one egg at a time, and
dumps it in a randomly chosen nest
• The best nests with high quality of eggs
(solutions) will carry over to the next
generations
• The number of available host nests is
fixed, and a host can discover an alien egg
with probability p ϵ [0,1] .
• In this case, the host bird can either
throw the egg away or abandon the nest
to build a completely new nest in a new
Lѐvy Flights
•In nature, animals search for food in a
random or quasi-random manner.
•Generally, the foraging path of an animal is
effectively a random walk because the next
move is based on both the current
location/state and the transition probability
to the next location.
•The chosen direction implicitly depends on
a probability, which can be modeled
mathematically.
•A Lévy flight is a random walk in which
the step-lengths are distributed according
to a heavy-tailed probability distribution.
•After a large number of steps, the distance
from the origin of the random walk tends
to a stable distribution.
Cuckoo search Algorithm
The following steps describe the main concepts of Cuckoo
search algorithm
Step1. Generate initial population of n host nests.
( 𝑎𝑖,𝑟𝑖) : a candidate for optimal parameters
Steps of Cuckoo search
Step2. Lay the egg (𝑎𝑘′,𝑏𝑘′) in the k nest.
• K nest is randomly selected.
• Cuckoo’s egg is very similar to host egg.
Where
𝑎𝑘′=𝑎𝑘+𝑅𝑎𝑛𝑑𝑜𝑚𝑤𝑎𝑙𝑘(Lѐvy flight)𝑎𝑘
𝑟𝑘′=𝑟𝑘+𝑅𝑎𝑛𝑑𝑜𝑚𝑤𝑎𝑙𝑘(Lѐvy flight)𝑟𝑘
Step3. Compare the fitness of cuckoo’s egg with the fitness of
the host egg.
Root Mean Square Error (RMSE)
Step4. If the fitness of cuckoo’s egg is better than host egg,
replace the egg in nest k by cuckoo’s egg.
Step5. If host bird notice it, the nest is abandoned and new
one is built. (p <0.25) (to avoid local optimization)
Iterate steps 2 to 5 until termination criterion satisfied
Application of the CS Algorithm
•Engineering optimization problems
•NP hard combinatorial optimization problems
•Data fusion in wireless sensor networks
•Nanoelectronic technology based operation-amplifier
•Train neural network
•Manufacturing scheduling
•Nurse scheduling problem
References
Xin-She Yang, Nature-Inspired Optimization Algorithms,
Elsevier, (2014).
Xin-She Yang, Cuckoo Search and Firefly Algorithm: Theory
and Applications, Springer, (2013).
Thank you

More Related Content

What's hot

Particle swarm optimization
Particle swarm optimization Particle swarm optimization
Particle swarm optimization Ahmed Fouad Ali
 
Ant colony optimization
Ant colony optimizationAnt colony optimization
Ant colony optimizationAbdul Rahman
 
Particle swarm optimization
Particle swarm optimizationParticle swarm optimization
Particle swarm optimizationSuman Chatterjee
 
Ant colony optimization
Ant colony optimizationAnt colony optimization
Ant colony optimizationvk1dadhich
 
Artificial bee colony (abc)
Artificial bee colony (abc)Artificial bee colony (abc)
Artificial bee colony (abc)quadmemo
 
Cuckoo search
Cuckoo searchCuckoo search
Cuckoo searchNepalAdz
 
Ant Colony Optimization - ACO
Ant Colony Optimization - ACOAnt Colony Optimization - ACO
Ant Colony Optimization - ACOMohamed Talaat
 
Artificial bee colony algorithm
Artificial bee colony algorithmArtificial bee colony algorithm
Artificial bee colony algorithmSatyasis Mishra
 
Artificial Bee Colony: An introduction
Artificial Bee Colony: An introductionArtificial Bee Colony: An introduction
Artificial Bee Colony: An introductionAdel Rahimi
 
Cuckoo Search & Firefly Algorithms
Cuckoo Search & Firefly AlgorithmsCuckoo Search & Firefly Algorithms
Cuckoo Search & Firefly AlgorithmsMustafa Salam
 
Cuckoo Search via Levy Flights
Cuckoo Search via Levy FlightsCuckoo Search via Levy Flights
Cuckoo Search via Levy FlightsXin-She Yang
 
Particle Swarm Optimization
Particle Swarm OptimizationParticle Swarm Optimization
Particle Swarm OptimizationStelios Petrakis
 
Ant colony optimization
Ant colony optimizationAnt colony optimization
Ant colony optimizationUnnitaDas
 
Bee algorithm
Bee algorithmBee algorithm
Bee algorithmkousick
 
Ant Colony Optimization (ACO)
Ant Colony Optimization (ACO)Ant Colony Optimization (ACO)
Ant Colony Optimization (ACO)Mahmoud El-tayeb
 
Genetic Algorithms
Genetic AlgorithmsGenetic Algorithms
Genetic Algorithmsanas_elf
 
Yapay arı kolonisi algoritması
Yapay arı kolonisi algoritmasıYapay arı kolonisi algoritması
Yapay arı kolonisi algoritmasıOrhan ERIPEK
 

What's hot (20)

Particle swarm optimization
Particle swarm optimization Particle swarm optimization
Particle swarm optimization
 
Ant colony optimization
Ant colony optimizationAnt colony optimization
Ant colony optimization
 
Particle swarm optimization
Particle swarm optimizationParticle swarm optimization
Particle swarm optimization
 
Ant colony optimization
Ant colony optimizationAnt colony optimization
Ant colony optimization
 
Artificial bee colony (abc)
Artificial bee colony (abc)Artificial bee colony (abc)
Artificial bee colony (abc)
 
Cuckoo search
Cuckoo searchCuckoo search
Cuckoo search
 
Ant Colony Optimization - ACO
Ant Colony Optimization - ACOAnt Colony Optimization - ACO
Ant Colony Optimization - ACO
 
Artificial bee colony algorithm
Artificial bee colony algorithmArtificial bee colony algorithm
Artificial bee colony algorithm
 
Artificial Bee Colony: An introduction
Artificial Bee Colony: An introductionArtificial Bee Colony: An introduction
Artificial Bee Colony: An introduction
 
bat algorithm
bat algorithmbat algorithm
bat algorithm
 
Cuckoo Search & Firefly Algorithms
Cuckoo Search & Firefly AlgorithmsCuckoo Search & Firefly Algorithms
Cuckoo Search & Firefly Algorithms
 
Cuckoo Search via Levy Flights
Cuckoo Search via Levy FlightsCuckoo Search via Levy Flights
Cuckoo Search via Levy Flights
 
Firefly algorithm
Firefly algorithmFirefly algorithm
Firefly algorithm
 
Particle Swarm Optimization
Particle Swarm OptimizationParticle Swarm Optimization
Particle Swarm Optimization
 
Final project
Final projectFinal project
Final project
 
Ant colony optimization
Ant colony optimizationAnt colony optimization
Ant colony optimization
 
Bee algorithm
Bee algorithmBee algorithm
Bee algorithm
 
Ant Colony Optimization (ACO)
Ant Colony Optimization (ACO)Ant Colony Optimization (ACO)
Ant Colony Optimization (ACO)
 
Genetic Algorithms
Genetic AlgorithmsGenetic Algorithms
Genetic Algorithms
 
Yapay arı kolonisi algoritması
Yapay arı kolonisi algoritmasıYapay arı kolonisi algoritması
Yapay arı kolonisi algoritması
 

Similar to Cuckoo search

cuckoosearchalgorithm-141028173457-conversion-gate02 (1).pptx
cuckoosearchalgorithm-141028173457-conversion-gate02 (1).pptxcuckoosearchalgorithm-141028173457-conversion-gate02 (1).pptx
cuckoosearchalgorithm-141028173457-conversion-gate02 (1).pptxgopikahari7
 
Final report aaa 2
Final report aaa 2Final report aaa 2
Final report aaa 2Faheem ahmed
 
Beamer presentation template___feather_theme
Beamer presentation template___feather_themeBeamer presentation template___feather_theme
Beamer presentation template___feather_themeSambhramBasu
 
Engineering Optimisation by Cuckoo Search
Engineering Optimisation by Cuckoo SearchEngineering Optimisation by Cuckoo Search
Engineering Optimisation by Cuckoo SearchXin-She Yang
 
Innovative computational intelligence ai techniques - Ahmed Yousry
Innovative computational intelligence ai techniques - Ahmed YousryInnovative computational intelligence ai techniques - Ahmed Yousry
Innovative computational intelligence ai techniques - Ahmed YousryAhmed Yousry
 
The Cuckoo Search Algorithm: A review.
The Cuckoo Search Algorithm: A review.The Cuckoo Search Algorithm: A review.
The Cuckoo Search Algorithm: A review.IRJET Journal
 
Swarm intelligence and particle swarm optimization
Swarm intelligence and particle swarm optimizationSwarm intelligence and particle swarm optimization
Swarm intelligence and particle swarm optimizationMuhammad Haroon
 
Swarm intelligence and particle swarm optimization
Swarm intelligence and particle swarm optimizationSwarm intelligence and particle swarm optimization
Swarm intelligence and particle swarm optimizationMuhammad Haroon
 
Comparative analysis of abc and ics
Comparative analysis of abc and icsComparative analysis of abc and ics
Comparative analysis of abc and icsBiswajit Panday
 
Out performance of cuckoo search
Out performance of cuckoo searchOut performance of cuckoo search
Out performance of cuckoo searchijaia
 
Chicken Swarm as a Multi Step Algorithm for Global Optimization
Chicken Swarm as a Multi Step Algorithm for Global OptimizationChicken Swarm as a Multi Step Algorithm for Global Optimization
Chicken Swarm as a Multi Step Algorithm for Global Optimizationinventionjournals
 
Evaluation the efficiency of cuckoo
Evaluation the efficiency of cuckooEvaluation the efficiency of cuckoo
Evaluation the efficiency of cuckooijcsa
 
Cloning
Cloning Cloning
Cloning Afael
 
Presentation
PresentationPresentation
Presentationvk3454
 
Improved onlooker bee phase in artificial bee colony algorithm
Improved onlooker bee phase in artificial bee colony algorithmImproved onlooker bee phase in artificial bee colony algorithm
Improved onlooker bee phase in artificial bee colony algorithmDr Sandeep Kumar Poonia
 
Convergent Evolution Presentation
Convergent Evolution PresentationConvergent Evolution Presentation
Convergent Evolution PresentationKevin Varty
 
Cluster based wireless sensor network routings ieee
Cluster based wireless sensor network routings ieeeCluster based wireless sensor network routings ieee
Cluster based wireless sensor network routings ieeeTAIWAN
 
Cloning experiments in amphibians, mammals and human
Cloning experiments  in amphibians, mammals and humanCloning experiments  in amphibians, mammals and human
Cloning experiments in amphibians, mammals and humanSHEETHUMOLKS
 

Similar to Cuckoo search (20)

cuckoosearchalgorithm-141028173457-conversion-gate02 (1).pptx
cuckoosearchalgorithm-141028173457-conversion-gate02 (1).pptxcuckoosearchalgorithm-141028173457-conversion-gate02 (1).pptx
cuckoosearchalgorithm-141028173457-conversion-gate02 (1).pptx
 
Final report aaa 2
Final report aaa 2Final report aaa 2
Final report aaa 2
 
Beamer presentation template___feather_theme
Beamer presentation template___feather_themeBeamer presentation template___feather_theme
Beamer presentation template___feather_theme
 
Engineering Optimisation by Cuckoo Search
Engineering Optimisation by Cuckoo SearchEngineering Optimisation by Cuckoo Search
Engineering Optimisation by Cuckoo Search
 
Innovative computational intelligence ai techniques - Ahmed Yousry
Innovative computational intelligence ai techniques - Ahmed YousryInnovative computational intelligence ai techniques - Ahmed Yousry
Innovative computational intelligence ai techniques - Ahmed Yousry
 
The Cuckoo Search Algorithm: A review.
The Cuckoo Search Algorithm: A review.The Cuckoo Search Algorithm: A review.
The Cuckoo Search Algorithm: A review.
 
Swarm intelligence and particle swarm optimization
Swarm intelligence and particle swarm optimizationSwarm intelligence and particle swarm optimization
Swarm intelligence and particle swarm optimization
 
Swarm intelligence and particle swarm optimization
Swarm intelligence and particle swarm optimizationSwarm intelligence and particle swarm optimization
Swarm intelligence and particle swarm optimization
 
Comparative analysis of abc and ics
Comparative analysis of abc and icsComparative analysis of abc and ics
Comparative analysis of abc and ics
 
Out performance of cuckoo search
Out performance of cuckoo searchOut performance of cuckoo search
Out performance of cuckoo search
 
Chicken Swarm as a Multi Step Algorithm for Global Optimization
Chicken Swarm as a Multi Step Algorithm for Global OptimizationChicken Swarm as a Multi Step Algorithm for Global Optimization
Chicken Swarm as a Multi Step Algorithm for Global Optimization
 
Evaluation the efficiency of cuckoo
Evaluation the efficiency of cuckooEvaluation the efficiency of cuckoo
Evaluation the efficiency of cuckoo
 
Cloning
Cloning Cloning
Cloning
 
SWARM INTELLIGENCE
SWARM INTELLIGENCESWARM INTELLIGENCE
SWARM INTELLIGENCE
 
Presentation
PresentationPresentation
Presentation
 
Semen sexing
Semen sexingSemen sexing
Semen sexing
 
Improved onlooker bee phase in artificial bee colony algorithm
Improved onlooker bee phase in artificial bee colony algorithmImproved onlooker bee phase in artificial bee colony algorithm
Improved onlooker bee phase in artificial bee colony algorithm
 
Convergent Evolution Presentation
Convergent Evolution PresentationConvergent Evolution Presentation
Convergent Evolution Presentation
 
Cluster based wireless sensor network routings ieee
Cluster based wireless sensor network routings ieeeCluster based wireless sensor network routings ieee
Cluster based wireless sensor network routings ieee
 
Cloning experiments in amphibians, mammals and human
Cloning experiments  in amphibians, mammals and humanCloning experiments  in amphibians, mammals and human
Cloning experiments in amphibians, mammals and human
 

More from G Prachi

The trusted computing architecture
The trusted computing architectureThe trusted computing architecture
The trusted computing architectureG Prachi
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
Mobile platform security models
Mobile platform security modelsMobile platform security models
Mobile platform security modelsG Prachi
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Network defenses
Network defensesNetwork defenses
Network defensesG Prachi
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilitiesG Prachi
 
Web application security part 02
Web application security part 02Web application security part 02
Web application security part 02G Prachi
 
Web application security part 01
Web application security part 01Web application security part 01
Web application security part 01G Prachi
 
Basic web security model
Basic web security modelBasic web security model
Basic web security modelG Prachi
 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system securityG Prachi
 
Dealing with legacy code
Dealing with legacy codeDealing with legacy code
Dealing with legacy codeG Prachi
 
Exploitation techniques and fuzzing
Exploitation techniques and fuzzingExploitation techniques and fuzzing
Exploitation techniques and fuzzingG Prachi
 
Control hijacking
Control hijackingControl hijacking
Control hijackingG Prachi
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Administering security
Administering securityAdministering security
Administering securityG Prachi
 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networksG Prachi
 
Protection in general purpose operating system
Protection in general purpose operating systemProtection in general purpose operating system
Protection in general purpose operating systemG Prachi
 
Program security
Program securityProgram security
Program securityG Prachi
 
Elementary cryptography
Elementary cryptographyElementary cryptography
Elementary cryptographyG Prachi
 
Information security introduction
Information security introductionInformation security introduction
Information security introductionG Prachi
 

More from G Prachi (20)

The trusted computing architecture
The trusted computing architectureThe trusted computing architecture
The trusted computing architecture
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Mobile platform security models
Mobile platform security modelsMobile platform security models
Mobile platform security models
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilities
 
Web application security part 02
Web application security part 02Web application security part 02
Web application security part 02
 
Web application security part 01
Web application security part 01Web application security part 01
Web application security part 01
 
Basic web security model
Basic web security modelBasic web security model
Basic web security model
 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system security
 
Dealing with legacy code
Dealing with legacy codeDealing with legacy code
Dealing with legacy code
 
Exploitation techniques and fuzzing
Exploitation techniques and fuzzingExploitation techniques and fuzzing
Exploitation techniques and fuzzing
 
Control hijacking
Control hijackingControl hijacking
Control hijacking
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Administering security
Administering securityAdministering security
Administering security
 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networks
 
Protection in general purpose operating system
Protection in general purpose operating systemProtection in general purpose operating system
Protection in general purpose operating system
 
Program security
Program securityProgram security
Program security
 
Elementary cryptography
Elementary cryptographyElementary cryptography
Elementary cryptography
 
Information security introduction
Information security introductionInformation security introduction
Information security introduction
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Cuckoo search

  • 1. CUCKOO SEARCH ALGORITHM Submited By- Prachi Gulihar 31603216 Riya Bilaiya 31603223
  • 2. Table of contents 1.Cuckoo search algorithm (History and main idea) 3. Characteristics of Cuckoo search 7. References 2. Behavior of Cuckoo breeding 6. Application of the Cuckoo search Algorithm 4. Lѐvy Flights 5. Cuckoo search Algorithm
  • 3. History and main idea •A method of global optimization based on the behavior of cuckoos was proposed by Yang & Deb (2009). •The original “cuckoo search (CS) algorithm” is based on the idea of the following :-  How cuckoos lay their eggs in the host nests. How, if not detected and destroyed, the eggs are hatched to chicks by the hosts. How a search algorithm based on such a scheme can be used to find the global optimum of a function.
  • 4. Behavior of Cuckoo breeding •The CS was inspired by the obligate brood parasitism of some cuckoo species by laying their eggs in the nests of host birds. •Some cuckoos have evolved in such a way that female parasitic cuckoos can imitate the colors and patterns of the eggs of a few chosen host species. •This reduces the probability of the eggs being abandoned and, therefore, increases their reproductivity .
  • 5. •If host birds discover the eggs are not their own, they will either throw them away or simply abandon their nests and build new ones. •Parasitic cuckoos often choose a nest where the host bird just laid its own eggs. •In general, the cuckoo eggs hatch slightly earlier than their host eggs.
  • 6. •Once the first cuckoo chick is hatched, his first instinct action is to evict the host eggs by blindly propelling the eggs out of the nest. •This action results in increasing the cuckoo chick’s share of food provided by its host bird . •Moreover, studies show that a cuckoo chick can imitate the call of host chicks to gain access to more feeding opportunity.
  • 7. Characteristics of Cuckoo search •Each egg in a nest represents a solution, and a cuckoo egg represents a new solution. •The aim is to employ the new and potentially better solutions (cuckoos) to replace not-so-good solutions in the nests. • In the simplest form, each nest has one egg. •The algorithm can be extended to more complicated cases in which each nest has multiple eggs representing a set of solutions
  • 8. The CS is based on three idealized rules: • Each cuckoo lays one egg at a time, and dumps it in a randomly chosen nest • The best nests with high quality of eggs (solutions) will carry over to the next generations • The number of available host nests is fixed, and a host can discover an alien egg with probability p ϵ [0,1] . • In this case, the host bird can either throw the egg away or abandon the nest to build a completely new nest in a new
  • 9. Lѐvy Flights •In nature, animals search for food in a random or quasi-random manner. •Generally, the foraging path of an animal is effectively a random walk because the next move is based on both the current location/state and the transition probability to the next location. •The chosen direction implicitly depends on a probability, which can be modeled mathematically.
  • 10. •A Lévy flight is a random walk in which the step-lengths are distributed according to a heavy-tailed probability distribution. •After a large number of steps, the distance from the origin of the random walk tends to a stable distribution.
  • 12. The following steps describe the main concepts of Cuckoo search algorithm Step1. Generate initial population of n host nests. ( 𝑎𝑖,𝑟𝑖) : a candidate for optimal parameters Steps of Cuckoo search
  • 13. Step2. Lay the egg (𝑎𝑘′,𝑏𝑘′) in the k nest. • K nest is randomly selected. • Cuckoo’s egg is very similar to host egg. Where 𝑎𝑘′=𝑎𝑘+𝑅𝑎𝑛𝑑𝑜𝑚𝑤𝑎𝑙𝑘(Lѐvy flight)𝑎𝑘 𝑟𝑘′=𝑟𝑘+𝑅𝑎𝑛𝑑𝑜𝑚𝑤𝑎𝑙𝑘(Lѐvy flight)𝑟𝑘
  • 14. Step3. Compare the fitness of cuckoo’s egg with the fitness of the host egg. Root Mean Square Error (RMSE)
  • 15. Step4. If the fitness of cuckoo’s egg is better than host egg, replace the egg in nest k by cuckoo’s egg.
  • 16. Step5. If host bird notice it, the nest is abandoned and new one is built. (p <0.25) (to avoid local optimization) Iterate steps 2 to 5 until termination criterion satisfied
  • 17. Application of the CS Algorithm •Engineering optimization problems •NP hard combinatorial optimization problems •Data fusion in wireless sensor networks •Nanoelectronic technology based operation-amplifier •Train neural network •Manufacturing scheduling •Nurse scheduling problem
  • 18. References Xin-She Yang, Nature-Inspired Optimization Algorithms, Elsevier, (2014). Xin-She Yang, Cuckoo Search and Firefly Algorithm: Theory and Applications, Springer, (2013).