{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T12:31:50Z","timestamp":1777984310012,"version":"3.51.4"},"reference-count":79,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T00:00:00Z","timestamp":1579651200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computational Intelligence and Neuroscience"],"published-print":{"date-parts":[[2020,1,22]]},"abstract":"<jats:p>This paper presents an in-depth survey and performance evaluation of cat swarm optimization (CSO) algorithm. CSO is a robust and powerful metaheuristic swarm-based optimization approach that has received very positive feedback since its emergence. It has been tackling many optimization problems, and many variants of it have been introduced. However, the literature lacks a detailed survey or a performance evaluation in this regard. Therefore, this paper is an attempt to review all these works, including its developments and applications, and group them accordingly. In addition, CSO is tested on 23 classical benchmark functions and 10 modern benchmark functions (CEC 2019). The results are then compared against three novel and powerful optimization algorithms, namely, dragonfly algorithm (DA), butterfly optimization algorithm (BOA), and fitness dependent optimizer (FDO). These algorithms are then ranked according to Friedman test, and the results show that CSO ranks first on the whole. Finally, statistical approaches are employed to further confirm the outperformance of CSO algorithm.<\/jats:p>","DOI":"10.1155\/2020\/4854895","type":"journal-article","created":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T18:31:13Z","timestamp":1579717873000},"page":"1-20","source":"Crossref","is-referenced-by-count":108,"title":["Cat Swarm Optimization Algorithm: A Survey and Performance Evaluation"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5640-0172","authenticated-orcid":true,"given":"Aram M.","family":"Ahmed","sequence":"first","affiliation":[{"name":"International Academic Office, Kurdistan Institution for Strategic Studies and Scientific Research, Sulaymaniyah 46001, Iraq"},{"name":"Computer Science and Engineering, University of Kurdistan Hewler, Erbil 44001, Iraq"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8661-258X","authenticated-orcid":true,"given":"Tarik A.","family":"Rashid","sequence":"additional","affiliation":[{"name":"Information Technology, Sulaimani Polytechnic University, Sulaymaniyah 46001, Iraq"}]},{"given":"Soran Ab. M.","family":"Saeed","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, University of Kurdistan Hewler, Erbil 44001, Iraq"}]}],"member":"311","reference":[{"key":"1","year":"2010"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1126\/science.220.4598.671"},{"key":"3","first-page":"760","volume-title":"Particle swarm optimization","year":"2010"},{"issue":"1","key":"4","first-page":"163","volume":"3","year":"2007","journal-title":"International Journal of Innovative Computing, Information and Control"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-015-1920-1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3102-4"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2907012"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.08.157"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.11.117"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.5815\/ijitcs.2013.11.04"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.14257\/ijhit.2014.7.6.30"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.14257\/ijhit.2015.8.1.25"},{"issue":"4","key":"18","first-page":"1000","volume":"13","year":"2017","journal-title":"Journal of Information Processing Systems"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/1583847"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/189080"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-017-1096-8"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2016.10.038"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-017-0469-7"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/365869"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2016.02.002"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.02.012"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1631-0"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2018.1462405"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/729680"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2952304"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.5815\/ijisa.2013.01.07"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1142\/s1469026813500077"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.14569\/ijarai.2015.040505"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1080\/18756891.2015.1099905"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/6304915"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.5120\/20374-2589"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.11591\/ijeei.v2i3.111"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2015.11.011"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.11591\/ijpeds.v6.i4.pp888-896"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2017.12.059"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1016\/j.enconman.2015.11.041"},{"issue":"6","key":"57","first-page":"33","volume":"8","year":"2014","journal-title":"International Journal of Digital Content Technology and Its Applications"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.14257\/ijmue.2015.10.6.07"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.2174\/1874444301507010226"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.24178\/irjece.2017.3.3.01"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6003-8"},{"key":"65","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.10.051"},{"key":"67","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.04.054"},{"issue":"4","key":"70","first-page":"9","volume":"5","year":"2013","journal-title":"International Journal of Information and Communication"},{"key":"72","first-page":"235","volume-title":"A comparative study of three population-based metaheuristics for solving the JSSP","year":"2017"},{"issue":"2","key":"73","volume":"72","year":"2015","journal-title":"Journal of Theoretical & Applied Information Technology"},{"key":"74","doi-asserted-by":"publisher","DOI":"10.1007\/s40092-018-0297-z"},{"key":"78","doi-asserted-by":"publisher","DOI":"10.14738\/tmlai.54.3211"},{"key":"81","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/578541"},{"issue":"3","key":"82","first-page":"104","volume":"10","year":"2016","journal-title":"International Journal of Mathematical, Computational, Physical, Electrical and Computer Engineering"},{"key":"83","first-page":"511","volume-title":"Cat swarm optimization with different binarization methods for solving set covering problems","year":"2016"},{"key":"84","doi-asserted-by":"publisher","DOI":"10.1016\/j.pisc.2016.06.068"},{"key":"85","doi-asserted-by":"publisher","DOI":"10.1038\/srep24252"},{"key":"86","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/4787856"},{"key":"87","doi-asserted-by":"publisher","DOI":"10.1061\/(asce)ir.1943-4774.0001256"},{"key":"88","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/893\/1\/012037"},{"key":"89","doi-asserted-by":"publisher","DOI":"10.1007\/s11269-016-1262-5"},{"key":"90","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2017.02.056"},{"key":"91","doi-asserted-by":"publisher","DOI":"10.1016\/j.enganabound.2018.03.004"},{"issue":"5","key":"92","volume":"5","year":"2017","journal-title":"Asian Journal of Applied Sciences"},{"key":"93","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2012.07.001"},{"key":"94","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.11.007"},{"key":"95","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.01.010"},{"key":"97","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1551-7"},{"key":"98","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2832246"},{"issue":"2","key":"99","first-page":"52","volume":"1","year":"2016","journal-title":"Journal of Network Intelligence"},{"key":"101","doi-asserted-by":"publisher","DOI":"10.1109\/tap.2015.2444439"},{"key":"102","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.1500371"},{"key":"103","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2016.11.016"},{"key":"104","doi-asserted-by":"publisher","DOI":"10.1016\/j.petrol.2017.08.024"},{"key":"105","doi-asserted-by":"publisher","DOI":"10.1115\/1.4040754"},{"issue":"12","key":"106","first-page":"17","volume":"15","year":"2016","journal-title":"Modares Mechanical Engineering"},{"key":"107","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2016.01.008"},{"key":"108","year":"2018"},{"key":"109","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcde.2019.04.004"},{"key":"110","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0213237"},{"key":"111","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2019.124919"},{"key":"112","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8718571"},{"key":"113","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/9293617"}],"container-title":["Computational Intelligence and Neuroscience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/cin\/2020\/4854895.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/cin\/2020\/4854895.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/cin\/2020\/4854895.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T18:31:19Z","timestamp":1579717879000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/cin\/2020\/4854895\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,22]]},"references-count":79,"alternative-id":["4854895","4854895"],"URL":"https:\/\/doi.org\/10.1155\/2020\/4854895","relation":{"has-preprint":[{"id-type":"doi","id":"10.36227\/techrxiv.11656458.v1","asserted-by":"object"}]},"ISSN":["1687-5265","1687-5273"],"issn-type":[{"value":"1687-5265","type":"print"},{"value":"1687-5273","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,22]]}}}