{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T08:42:12Z","timestamp":1778575332996,"version":"3.51.4"},"reference-count":161,"publisher":"MIT Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Evolutionary Computation"],"published-print":{"date-parts":[[2017,3]]},"abstract":"<jats:p>This paper reviews recent studies on the Particle Swarm Optimization (PSO) algorithm. The review has been focused on high impact recent articles that have analyzed and\/or modified PSO algorithms. This paper also presents some potential areas for future study.<\/jats:p>","DOI":"10.1162\/evco_r_00180","type":"journal-article","created":{"date-parts":[[2016,3,8]],"date-time":"2016-03-08T19:02:40Z","timestamp":1457463760000},"page":"1-54","source":"Crossref","is-referenced-by-count":702,"title":["Particle Swarm Optimization for Single Objective Continuous Space Problems: A Review"],"prefix":"10.1162","volume":"25","author":[{"given":"Mohammad Reza","family":"Bonyadi","sequence":"first","affiliation":[{"name":"Department of Computer Science, The University of Adelaide, Adelaide, SA 5005, Australia. Also with the Centre for Advanced Imaging (CAI), the University of Queensland, Brisbane, QLD 4067, Australia, and Complexica Pty Ltd, Adelaide, SA 5021, Australia. ,"}]},{"given":"Zbigniew","family":"Michalewicz","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The University of Adelaide, Adelaide, SA 5005, Australia. Also with Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland, Polish-Japanese Institute of Information Technology, Warsaw, Poland, and Complexica Pty Ltd, Adelaide, SA 5021, Australia."}]}],"member":"281","reference":[{"key":"B1","doi-asserted-by":"publisher","DOI":"10.1021\/jm0104668"},{"key":"B2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2007.09.063"},{"key":"B3","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.47"},{"key":"B4","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0040811"},{"key":"B5","doi-asserted-by":"publisher","DOI":"10.1109\/ICEC.1994.350039"},{"key":"B6","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0109-z"},{"key":"B7","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2008.04.016"},{"key":"B8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02011-7_3"},{"key":"B9","doi-asserted-by":"publisher","DOI":"10.1007\/BF00935752"},{"key":"B10","doi-asserted-by":"publisher","DOI":"10.1007\/s11047-007-9049-5"},{"key":"B11","doi-asserted-by":"publisher","DOI":"10.1007\/s11047-007-9050-z"},{"key":"B12","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015059928466"},{"key":"B13","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-004-8270-3"},{"key":"B14","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2011.2136347"},{"key":"B15","doi-asserted-by":"publisher","DOI":"10.1145\/2463372.2463378"},{"key":"B16","first-page":"18:22","author":"Bonyadi M. R.","year":"2014","journal-title":"Swarm and Evolutionary Computation"},{"key":"B17","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2012.6256113"},{"key":"B18","doi-asserted-by":"publisher","DOI":"10.1007\/s11721-014-0095-1"},{"key":"B19","first-page":"205","volume-title":"Evolutionary constrained optimization","author":"Bonyadi M. R.","year":"2014"},{"key":"B20","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2014.6900343"},{"key":"B21","first-page":"9","volume-title":"Genetic and Evolutionary Computation Conference (GECCO)","author":"Bonyadi M. R.","year":"2014"},{"key":"B22","doi-asserted-by":"publisher","DOI":"10.1007\/s10732-014-9245-2"},{"key":"B23","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2015.2460753"},{"key":"B24","author":"Bonyadi M.","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"B25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13563-2_37"},{"key":"B26","doi-asserted-by":"publisher","DOI":"10.1109\/SIS.2007.368035"},{"key":"B27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17537-4_69"},{"key":"B28","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-009-9493-0"},{"key":"B29","first-page":"1","volume-title":"Workshop on Particle Swarm Optimization","author":"Carlisle A.","year":"2001"},{"key":"B30","first-page":"460","volume-title":"International Conference on Machine Learning and Cybernetics","author":"Chang-Huang C.","year":"2009"},{"key":"B31","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2011.2171946"},{"key":"B33","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2004.08.012"},{"key":"B34","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2009.2030331"},{"key":"B35","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2008.03.001"},{"key":"B36","doi-asserted-by":"publisher","DOI":"10.1007\/s11721-013-0090-y"},{"key":"B37","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2014.6900439"},{"key":"B38","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1007\/978-3-319-09952-1_12","volume-title":"Swarm intelligence","author":"Cleghorn C. W.","year":"2014"},{"key":"B39","doi-asserted-by":"publisher","DOI":"10.1007\/s11721-015-0109-7"},{"key":"B40","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.1999.785513"},{"key":"B41","doi-asserted-by":"publisher","DOI":"10.1002\/9780470612163"},{"key":"B43","doi-asserted-by":"publisher","DOI":"10.1109\/4235.985692"},{"key":"B44","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2003.1299391"},{"key":"B45","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-3615(99)00046-9"},{"key":"B46","doi-asserted-by":"publisher","DOI":"10.1007\/s11721-009-0026-8"},{"issue":"1","key":"B47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3233\/AIC-2009-0440","volume":"22","author":"Dasgupta S.","year":"2009","journal-title":"AI Communications"},{"issue":"1","key":"B48","first-page":"1","volume":"1","author":"Deng J.-L","year":"1989","journal-title":"The Journal of Grey System"},{"key":"B49","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2011.02.002"},{"key":"B50","doi-asserted-by":"publisher","DOI":"10.1007\/BF00934526"},{"key":"B51","doi-asserted-by":"publisher","DOI":"10.1109\/MHS.1995.494215"},{"key":"B52","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2001.934376"},{"key":"B53","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2000.870279"},{"key":"B54","doi-asserted-by":"publisher","DOI":"10.1109\/4235.771166"},{"key":"B55","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(99)00089-4"},{"key":"B56","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2012.6256110"},{"key":"B57","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2013.6557896"},{"key":"B58","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2009.5160390"},{"key":"B59","volume-title":"Fundamentals of computational swarm intelligence","author":"Engelbrecht A","year":"2005"},{"key":"B60","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2012.6256112"},{"key":"B61","doi-asserted-by":"publisher","DOI":"10.1109\/BRICS-CCI-CBIC.2013.31"},{"key":"B62","first-page":"249:286","author":"Garc\u00eda-Gonzalo E.","year":"2014","journal-title":"Applied Mathematics and Computation"},{"key":"B63","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-010-0356-x"},{"key":"B64","doi-asserted-by":"publisher","DOI":"10.1145\/2463372.2463381"},{"key":"B65","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45356-3_35"},{"key":"B67","doi-asserted-by":"publisher","DOI":"10.1109\/ICEC.1996.542381"},{"key":"B69","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2011.03.001"},{"key":"B70","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.800886"},{"key":"B71","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2006.03.003"},{"key":"B72","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2012.2189404"},{"key":"B73","doi-asserted-by":"publisher","DOI":"10.1109\/SIS.2007.368046"},{"key":"B74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87700-4_88"},{"key":"B75","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2008.2006628"},{"key":"B76","first-page":"213:68","author":"Hu M.","year":"2012","journal-title":"Information Sciences"},{"key":"B77","first-page":"203","volume-title":"World Multiconference on Systemics, Cybernetics and Informatics","author":"Hu X.","year":"2002"},{"key":"B78","first-page":"90","volume-title":"IEEE Congress on Evolutionary Computation","author":"Hu X.","year":"2004"},{"key":"B79","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.10.018"},{"key":"B80","doi-asserted-by":"publisher","DOI":"10.1016\/j.orl.2007.10.003"},{"key":"B81","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2005.850530"},{"key":"B82","doi-asserted-by":"publisher","DOI":"10.5772\/5104"},{"key":"B83","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2006.10.005"},{"key":"B84","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2007.07.002"},{"key":"B85","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-012-9913-4"},{"key":"B86","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970920"},{"key":"B87","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.1999.785509"},{"key":"B88","doi-asserted-by":"publisher","DOI":"10.1109\/SIS.2003.1202251"},{"key":"B89","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1995.488968"},{"key":"B90","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2002.1004493"},{"key":"B91","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2002.1004460"},{"key":"B92","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6322-1_1"},{"key":"B93","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.04.030"},{"key":"B94","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2010.5585973"},{"key":"B95","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2005.857610"},{"key":"B96","doi-asserted-by":"publisher","DOI":"10.1162\/EVCO_a_00129"},{"key":"B97","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2009.03.007"},{"key":"B98","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2009.4983112"},{"issue":"2","key":"B100","first-page":"246","volume":"26","author":"Matyas J","year":"1965","journal-title":"Automation and Remote Control"},{"key":"B102","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2004.826074"},{"key":"B103","doi-asserted-by":"crossref","first-page":"135","DOI":"10.7551\/mitpress\/2887.003.0018","volume-title":"Annual Conference on Evolutionary Programming","author":"Michalewicz Z","year":"1995"},{"issue":"12","key":"B104","first-page":"223","volume":"39","author":"Michalewicz Z.","year":"1996","journal-title":"Communications of the ACM"},{"key":"B105","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1996.4.1.1"},{"key":"B106","doi-asserted-by":"publisher","DOI":"10.1137\/S00361445024180"},{"key":"B107","doi-asserted-by":"publisher","DOI":"10.1145\/1388969.1389004"},{"key":"B108","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2009.2021465"},{"key":"B109","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2010.2055848"},{"key":"B110","volume-title":"Design and analysis of experiments","author":"Montgomery D. C","year":"1984"},{"key":"B111","first-page":"2685","volume-title":"IEEE Congress on Evolutionary Computation","author":"Muller C.","year":"2009"},{"key":"B112","first-page":"209:16","author":"Nasir M.","year":"2012","journal-title":"Information Sciences"},{"key":"B113","volume-title":"The structure and dynamics of networks","author":"Newman M.","year":"2006"},{"key":"B114","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2011.2180533"},{"key":"B115","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2011.01.037"},{"key":"B116","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2013.2281543"},{"key":"B117","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.1999.785510"},{"key":"B118","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2003.1299579"},{"issue":"1","key":"B119","doi-asserted-by":"crossref","first-page":"147","DOI":"10.3233\/FUN-2007-761-210","volume":"76","author":"Paquet U.","year":"2007","journal-title":"Fundamenta Informaticae"},{"key":"B120","first-page":"76:214","author":"Parsopoulos K.","year":"2002","journal-title":"Intelligent Technologies\u2014Theory and Application: New Trends in Intelligent Technologies"},{"key":"B121","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016568309421"},{"key":"B122","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2004.826076"},{"issue":"3","key":"B123","first-page":"1","volume":"2008","author":"Poli R","year":"2008","journal-title":"Journal of Artificial Evolution and Application"},{"key":"B124","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2008.2011744"},{"key":"B125","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2007.4424713"},{"key":"B126","doi-asserted-by":"publisher","DOI":"10.1007\/s11721-007-0002-0"},{"key":"B128","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2004.1331060"},{"key":"B129","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2004.826071"},{"key":"B130","doi-asserted-by":"publisher","DOI":"10.1109\/4235.687885"},{"issue":"1","key":"B131","doi-asserted-by":"crossref","first-page":"67","DOI":"10.3233\/FI-1998-35123405","volume":"35","author":"Rudolph G","year":"1998","journal-title":"Fundamenta Informaticae"},{"key":"B132","first-page":"847","volume-title":"Handbook of natural computing","author":"Rudolph G.","year":"2013"},{"key":"B133","first-page":"39:263","author":"Salomon R.","year":"1995","journal-title":"BioSystems"},{"key":"B134","doi-asserted-by":"publisher","DOI":"10.1145\/2463372.2463563"},{"key":"B135","first-page":"245","author":"Schoenauer M.","year":"1996","journal-title":"Parallel Problem Solving from Nature"},{"key":"B136","first-page":"322","volume-title":"Conference on Genetic Algorithms","author":"Schoenauer M.","year":"1997"},{"key":"B137","doi-asserted-by":"publisher","DOI":"10.1201\/9781420036268"},{"key":"B138","doi-asserted-by":"publisher","DOI":"10.1109\/ICEC.1998.699146"},{"key":"B139","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0040810"},{"key":"B140","first-page":"101","volume-title":"IEEE Congress on Evolutionary Computation","author":"Shi Y.","year":"2001"},{"key":"B141","doi-asserted-by":"publisher","DOI":"10.1080\/10556788.2011.647818"},{"key":"B142","doi-asserted-by":"publisher","DOI":"10.1287\/moor.6.1.19"},{"key":"B143","first-page":"2236","volume-title":"International Conference on Machine Learning and Cybernetics","author":"Song M.-P.","year":"2004"},{"key":"B144","doi-asserted-by":"publisher","DOI":"10.4018\/jsir.2010040103"},{"key":"B145","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008202821328"},{"key":"B146","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.11.033"},{"key":"B147","unstructured":"Takahama, T., and Sakai, S. (2005). Constrained optimization by constrained particle swarm optimizer with -level control. In A. Abraham, Y. Dote, T. Furuhashi, M. K\u00f6ppen, A. Ohuchi, and Y. Ohsawa (Eds.),Soft computing as transdisciplinary science and technology, volume 29 ofAdvances in soft computing, pp.\u00a01019\u20131029. Berlin: Springer."},{"key":"B148","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2011.07.012"},{"key":"B149","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898719574"},{"key":"B150","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(02)00447-7"},{"key":"B152","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2002.1176018"},{"key":"B153","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2004.826069"},{"key":"B154","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2005.02.003"},{"issue":"4","key":"B155","doi-asserted-by":"crossref","first-page":"341","DOI":"10.3233\/FI-2010-370","volume":"105","author":"Van den Bergh F.","year":"2010","journal-title":"Fundamenta Informaticae"},{"key":"B156","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2005.1554698"},{"key":"B157","doi-asserted-by":"publisher","DOI":"10.1006\/jmaa.1996.0041"},{"key":"B158","first-page":"223:119","author":"Wang H.","year":"2013","journal-title":"Information Sciences"},{"key":"B159","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.07.013"},{"key":"B161","doi-asserted-by":"publisher","DOI":"10.1002\/nme.1914"},{"key":"B162","doi-asserted-by":"publisher","DOI":"10.1145\/1527125.1527128"},{"key":"B163","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.06.010"},{"key":"B164","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0014812"},{"key":"B165","doi-asserted-by":"publisher","DOI":"10.1109\/5.784219"},{"key":"B166","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2009.2015956"},{"key":"B167","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2010.2052054"},{"key":"B168","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.02.026"},{"key":"B169","first-page":"221","volume-title":"IEEE Congress on Evolutionary Computation","author":"Zheng Y.","year":"2003"},{"key":"B170","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2015.2441746"}],"container-title":["Evolutionary Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mitpressjournals.org\/doi\/pdf\/10.1162\/EVCO_r_00180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T17:52:51Z","timestamp":1748800371000},"score":1,"resource":{"primary":{"URL":"https:\/\/direct.mit.edu\/evco\/article\/25\/1\/1-54\/1040"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":161,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["10.1162\/EVCO_r_00180"],"URL":"https:\/\/doi.org\/10.1162\/evco_r_00180","relation":{},"ISSN":["1063-6560","1530-9304"],"issn-type":[{"value":"1063-6560","type":"print"},{"value":"1530-9304","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3]]}}}