{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T05:48:18Z","timestamp":1767851298147,"version":"3.49.0"},"reference-count":83,"publisher":"Wiley","license":[{"start":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T00:00:00Z","timestamp":1677110400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2023,2,23]]},"abstract":"<jats:p>Swarm intelligence algorithms are metaheuristics inspired by the collective behavior of species such as birds, fish, bees, and ants. They are used in many optimization problems due to their simplicity, flexibility, and scalability. These algorithms get the desired convergence during the search by balancing the exploration and exploitation processes. These metaheuristics have applications in various domains such as global optimization, bioinformatics, power engineering, networking, machine learning, image processing, and environmental applications. This paper presents a systematic literature review (SLR) on applications of four swarm intelligence algorithms i.e., grey wolf optimization (GWO), whale optimization algorithms (WOA), Harris hawks optimizer (HHO), and moth-flame optimizer (MFO) in the field of software engineering. It presents an in-depth study of these metaheuristics\u2019 adoption in the field of software engineering. This SLR is mainly comprised of three phases such as planning, conducting, and reporting. This study covers all related studies published from 2014 up to 2022. The study shows that applications of the selected metaheuristics have been utilized in various fields of software engineering especially software testing, software defect prediction, and software reliability. The study also points out some of the areas where applications of these swarm intelligence algorithms can be utilized. This study may act as a guideline for researchers in improving the current state-of-the-art on generally adopting these metaheuristics in software engineering.<\/jats:p>","DOI":"10.1155\/2023\/4577581","type":"journal-article","created":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T23:05:07Z","timestamp":1677193507000},"page":"1-22","source":"Crossref","is-referenced-by-count":12,"title":["A Systematic Literature Review on Robust Swarm Intelligence Algorithms in Search-Based Software Engineering"],"prefix":"10.1155","volume":"2023","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7070-4407","authenticated-orcid":true,"given":"Alam","family":"Zeb","sequence":"first","affiliation":[{"name":"Faculty of Information Technology, Department of Computer Science & IT, University of Malakand, Lower Dir 18800, KPK, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5025-3223","authenticated-orcid":true,"given":"Fakhrud","family":"Din","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Department of Computer Science & IT, University of Malakand, Lower Dir 18800, KPK, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7554-290X","authenticated-orcid":true,"given":"Muhammad","family":"Fayaz","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Central Asia, Naryn, Kyrgyzstan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4216-1246","authenticated-orcid":true,"given":"Gulzar","family":"Mehmood","sequence":"additional","affiliation":[{"name":"Department of Computer Science, IQRA National University, Swat Campus 19220, Peshawar, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4626-0513","authenticated-orcid":true,"given":"Kamal Z.","family":"Zamli","sequence":"additional","affiliation":[{"name":"Faculty of Science and Technology, Universitas Airlangga, C Campus JI. Dr. H. Soekamo, Mulyorejo, Surabaya 60115, Indonesia"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93073-2"},{"key":"2","volume-title":"Algorithms for Optimization","author":"J. K. Mykel","year":"2019"},{"key":"3","volume-title":"Metaheuristics: from design to implementation","author":"T. El-Ghazali","year":"2009"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379787"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(01)00189-6"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-017-3272-5"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2019.03.004"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-05720-5"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04570-6"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-015-1923-y"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.03.055"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s12293-016-0212-3"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113377"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114864"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s42235-021-0050-y"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2022.124090"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhydene.2021.08.174"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.conbuildmat.2022.127454"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.116971"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.108345"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106684"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2013.12.007"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.10.039"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2016.01.008"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.028"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.07.006"},{"key":"27","volume-title":"Guidelines for Performing Systematic Literature Reviews in Software Engineering","author":"B. Kitchenham","year":"2007"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06442-4"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02476-z"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.22266\/ijies2019.0430.03"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-05555-7"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-021-00384-z"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-020-02018-2"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/Confluence51648.2021.9377194"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.5120\/IJCA2017914201"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.25728\/assa.2018.18.2.576"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS49469.2020.239557"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.3390\/math9151722"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1080\/02522667.2020.1733192"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2964321"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-020-00809-6"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1177\/17483026211034442"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.4018\/IJDST.2020010105"},{"key":"44","first-page":"4356","article-title":"An enhanced Whale Optimisation Algorithm for test case suite selection: ambha_WOA","volume":"1","author":"B. Jyoti","year":"2022","journal-title":"Specialusis Ugdymas"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3052149"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/DCABES.2018.00076"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.14704\/web\/v19i1\/web19252"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.22266\/ijies2017.0430.11"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.22214\/IJRASET.2018.5339"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-53480-0_22"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1109\/Confluence47617.2020.9058244"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.20"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-169804"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1401-7"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3032851"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1145\/3461598.3461600"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.4018\/ijamc.292508"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.5121\/IJAIA.2021.12103"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/1028175"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2941"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111026"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070465"},{"key":"63","article-title":"Proposed binding between genetic algorithm and grey wolf optimizer to estimate the parameters of software reliability growth models","author":"J. S. Alneamy","year":"2019","journal-title":"International Journal of Recent Research and Review"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0035-0_75"},{"key":"65","doi-asserted-by":"publisher","DOI":"10.5539\/mas.v12n2p54"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1109\/IACS.2018.8355446"},{"key":"67","doi-asserted-by":"publisher","DOI":"10.1504\/IJCAT.2020.104688"},{"key":"68","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3072380"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.1109\/IEC49899.2020.9122918"},{"key":"70","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v19i6.16758"},{"key":"71","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/928\/3\/032084"},{"key":"72","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-1718-5.ch001"},{"key":"73","doi-asserted-by":"publisher","DOI":"10.1109\/ICET54505.2021.9689832"},{"key":"74","article-title":"Risk prioritization for software development using grey wolf optimization","volume":"7","author":"B. Prakash","year":"2019","journal-title":"International Journal of Recent Technology and Engineering (IJRTE)"},{"key":"75","first-page":"1592","article-title":"Optimizing non-orthogonal space distance using ACO in software cost estimation","volume":"9","author":"S. Ranichandra","year":"2020","journal-title":"Mukt Shabd J"},{"key":"76","doi-asserted-by":"publisher","DOI":"10.1504\/ijbic.2020.108593"},{"key":"77","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3015864"},{"key":"78","doi-asserted-by":"publisher","DOI":"10.1145\/3205651.3205796"},{"key":"79","doi-asserted-by":"publisher","DOI":"10.23940\/ijpe.18.10.p18.24232431"},{"key":"80","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-2989-x"},{"key":"81","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3195006"},{"key":"82","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2018.1451222"},{"key":"83","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-017-1003-3"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2023\/4577581.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2023\/4577581.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2023\/4577581.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T23:05:14Z","timestamp":1677193514000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/complexity\/2023\/4577581\/"}},"subtitle":[],"editor":[{"given":"Haitham Abdulmohsin","family":"Afan","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023,2,23]]},"references-count":83,"alternative-id":["4577581","4577581"],"URL":"https:\/\/doi.org\/10.1155\/2023\/4577581","relation":{},"ISSN":["1099-0526","1076-2787"],"issn-type":[{"value":"1099-0526","type":"electronic"},{"value":"1076-2787","type":"print"}],"subject":[],"published":{"date-parts":[[2023,2,23]]}}}