You are on page 1of 14

This article has been accepted for inclusion in a future issue of this journal.

Content is final as presented, with the exception of pagination.

IEEE TRANSACTIONS ON CYBERNETICS 1

Constrained Multiobjective Optimization Algorithm


Based on Immune System Model
Shuqu Qian, Yongqiang Ye, Senior Member, IEEE, Bin Jiang, Senior Member, IEEE, and Jianhong Wang

AbstractAn immune optimization algorithm, based on the Various bio-inspired optimization algorithms, such as evo-
model of biological immune system, is proposed to solve mul- lutionary algorithm (EA) [4], [5], immune algorithm (IA) [6],
tiobjective optimization problems with multimodal nonlinear differential evolution algorithm (DE) [7], [8], artificial bee
constraints. First, the initial population is divided into feasible
nondominated population and infeasible/dominated population. colony algorithm [9], particle swarm algorithm (PSO) [10],
The feasible nondominated individuals focus on exploring the and other hybrid heuristic algorithms [11], [12], have been
nondominated front through clone and hypermutation based on a very successful in solving a wide variety of unconstrained
proposed affinity design approach, while the infeasible/dominated multiobjective optimization problems (UMOPs) during the
individuals are exploited and improved via the simulated binary last twenty years. However, when these algorithms are used
crossover and polynomial mutation operations. And then, to
accelerate the convergence of the proposed algorithm, a transfor- to solve CMOPs, a suitable constraint handling technol-
mation technique is applied to the combined population of the ogy (CHT) is required to incorporate into the affinity/fitness
above two offspring populations. Finally, a crowded-comparison functions for dealing with equality or inequality constraints.
strategy is used to create the next generation population. In A large number of CHTs have been developed to solve
numerical experiments, a series of benchmark constrained mul- constrained single-objective optimization problems (CSOPs)
tiobjective optimization problems are considered to evaluate the
performance of the proposed algorithm and it is also compared in recent years [13][16]. But very few works have stud-
to several state-of-art algorithms in terms of the inverted genera- ied the design of algorithms for solving CMOPs [17].
tional distance and hypervolume indicators. The results indicate Some researchers have applied existing CHTs that are
that the new method achieves competitive performance and even used for CSOPs to EAs for solving CMOPs. For instance,
statistically significant better results than previous algorithms do Ray et al. [18] proposed the use of nondominated sorting for
on most of the benchmark suite.
feasible and infeasible solutions. Singh et al. [19] presented
Index TermsImmune algorithm (IA), multiobjective opti- the use of nondominated checking combined with a special
mization, nonlinear constraint, transformation mechanism. operator to favor constraints satisfaction in simulated anneal-
ing algorithm. Qu and Suganthan [20] reported the usage of
I. I NTRODUCTION
an ensemble of three CHTs to solve a set of well-known
ANY real-world constrained optimization problems,
M such as portfolio problems [1], knapsack problems [2],
power system dispatch [3], and so forth, involve the simulta-
CMOPs. However, unlike CSOPs, algorithms for CMOPs not
only need to deal with various limits on decision variables but
also need an appropriate evaluation approach for objective vec-
neous optimization of several intrinsically conflicting objec- tors. Therefore, one of the major issues for solving CMOPs is
tives. Mathematically, these types of problems are defined as how to utilize the infeasible individuals and exploit the useful
constrained multiobjective optimization problems (CMOPs). information they provide during the search process.
Traditional mathematical approaches have some difficulties In recent years, multiobjective EAs (MOEAs) and CHTs
when directly applied to solve CMOPs, and can only obtain a have received a lot of attention. Some approaches extend
single Pareto-optimal solution in a single run. Moreover, it will the ability of the well-known MOEA/D [21] to deal with
be more difficult to solve CMOPs with nonlinear constraints. CMOPs. Asafuddoula et al. [22] developed an adaptive CHT
Manuscript received November 7, 2014; revised March 8, 2015 and with a dynamical violation threshold. The CHT is embed-
May 24, 2015; accepted July 22, 2015. This work was supported in part ded within the framework of MOEA/D to form a novel
by the National Natural Science Foundation of China under Grant 61304146 constrained MOEA (cMOEAD). Simulation results are com-
and Grant 61473145, in part by the Jiangsu Key Laboratory of Internet
of Things and Control Technologies (Nanjing University of Aeronautics pared with those obtained by nondominated sorting genetic
and Astronautics), and in part by the Provincial Science and Technology algorithm-II (NSGAII) on ten CMOPs and a real-world toy
Foundation of Guizhou of China under Grant 20152002. This paper was submarine design problem. Jan and Khanum [23] modified
recommended by Associate Editor S. Mostaghim. (Corresponding author:
Yongqiang Ye.) MOEA/D with DE to form CMOEA/D-DE, then two variants
S. Qian is with the College of Automatic Engineering, Nanjing University of (CMOEA/D-DE-SR, CMOEA/D-DE-CDP) of CMOEA/D-DE
Aeronautics and Astronautics, Nanjing 210016, China, and also with Anshun are proposed based on stochastic ranking (SR) [24] and the
University, Anshun 561000, China (e-mail: shuquqian@163.com).
Y. Ye, B. Jiang, and J. Wang are with the College of Automatic Engineering, constraint-domination principle (CDP) [25], respectively. In
Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China CMOEA/D-DE-SR, the modified SR is adopted as the update
(e-mail: melvinye@nuaa.edu.cn; binjiang@nuaa.edu.cn). scheme of CMOEA/D-DE, while CDP is adopted to evalu-
Color versions of one or more of the figures in this paper are available
online at http://ieeexplore.ieee.org. ate the offspring in CMOEA/D-DE-CDP. The two algorithms
Digital Object Identifier 10.1109/TCYB.2015.2461651 are tested on constrained test problem (CTP) and constrained
2168-2267 c 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

2 IEEE TRANSACTIONS ON CYBERNETICS

function (CF) instances. Experimental results show that In this paper, we propose a novel constrained multiobjective
CMOEA/D-DE-CDP works better than CMOEA/D-DE-SR. immune genetic optimization algorithm (denoted by CMIGA)
But the algorithm is tested only using two variables in CTP based on an AIS model to solve CMOPs. We systematically
problems. Therefore, there remains a need to validate the supe- consider the design of affinity, convergence performance, and
riority of the proposed algorithm when it is applied to high- population diversity. The initial population is divided into two
dimensional CMOPs. In addition, Martinez and Coello [26] distinct subpopulations: 1) feasible nondominated population
developed a cMOEADs-based MOEA/D-DE with a novel - and 2) infeasible/dominated population. Clone and hypermu-
constraint selection mechanism. This approach was validated tation operators are applied to the first population and then
using several CMOPs. Moreover, Liu et al. [27] proposed a generate an offspring population. Simulated binary crossover
dynamic multiobjective evolutionary algorithm with domain and polynomial mutation are performed on some excellent anti-
decomposition (DMOEADD) based on the idea of decompo- bodies from the second population to generate another offspring
sition. In DMOEADD, the feasible domain in decision space is population. A transformation operator, used for escaping from
divided into several subdomains. Each subdomain exchanges an inferior local optimum, is applied to the two offspring pop-
information through genetic operators. Thirteen UMOPs and ulations. Finally, a crowded-comparison strategy is applied to
ten CMOPs, which were proposed in congress on evolu- create the next generation population. In numerical experiments,
tionary computation (CEC) 2009, are tested by DMOEADD. we present the proposed algorithms performance in solving
Simulation results indicate that DMOEADD could success- 18 CMOPs. Simulation results have verified the effectiveness
fully solve most problems. and promise of the proposed algorithm.
More recently, modified constrained multiobjective evolu- The remainder of this paper is organized as follows. We
tionary algorithm (MCMOEA) [28], based on a modified first briefly review the main CHTs in Section II. And then,
objective function method which was initially introduced by we give a brief description of the CMOP formulation as well
Woldesenbet et al. [29] and a feasible-guiding strategy, is pro- as the definition of several related concepts in Section III.
posed to handle CMOPs. In MCMOEA, objective functions In Section IV, the biological functions of IS are described
and constraint violation values are combined together by a and an algorithm model with a transformation operator is pro-
feasibility ratio to modify objective functions, which enables posed. Then in Section V, we develop a novel constrained
infeasible individuals with better objective function values and multiobjective optimization algorithm based on the IS model
low constraint violation values to take part in the evolution and introduce the main operators of the proposed algorithm.
process. Furthermore, a DE/infeasible-to-feasible strategy is Section VI discusses the experimental setup, including bench-
developed to guide infeasible individuals to move toward the mark CMOPs and performance measures. Finally, Section VII
feasible region in terms of a determinate feasible direction. presents the simulation results and discussion, and the last
Although simulation results indicate that MCMOEA can find section draws the conclusion.
a well-spread Pareto-optimal front (POF), the proposed CHT
is only suited for those individuals in the neighborhood where
they share similar feasible directions. This technique may be II. C ONSTRAINT H ANDLING A PPROACHES
ineffective for discontinuous search spaces. In this section, some relevant contributions to the solution
However, many other topics within this area remain almost of CMOPs, which are CHTs representative of the state-of-art
unexplored on CMOAs, such as diversity mechanisms specially in the area, are briefly discussed. A detailed discussion can be
designed for constrained search spaces. As is well known, artifi- found in [35].
cial immune systems (AIS) are parallel and distributed systems The most simple CHT is to use penalty function (PF)
inspired by the biological immune system (IS) [30]. Any high approaches. When PF only depends on the degree of viola-
affinity clone developed by somatic hypermutation is expected tion of the inequality, the PF is called a static penalty. In
to be preferentially expanded, while a few low affinity cells contrast, if PF depends on the current generation count, the
are allowed to enter the repertoire, maintaining the population PF is called a dynamic penalty. When PF methods are used to
diversity. Moreover, AIS is capable of maintaining a memory deal with CMOPs, the constraint violation for each constraint
of past information and adaptively learning about new encoun- is evaluated as well, and the sum of violations is added to
ters. These properties have motivated researchers to develop each objective function with multiplication of a penalty factor.
powerful optimization algorithms that have solved complex Although their implementation is quite simple, PF approach
engineering problems [31], [32]. In particular, Xiao and Zu [33] still requires a careful fine-tuning of their penalty factors in
proposed a new constrained multiobjective IA (MOAIS+SR) order to determine the severity of the penalties to be applied,
by integrating SR with an unconstrained MOAIS [34]. Two and these values are highly problem-dependent. To improve
scenarios of SR are proposed to replace the nondominated the flexibility of the PF approach, Woldesenbet et al. [29]
sorting procedure and to determine the winner of two indi- proposed a method based on adaptive PFs and distance mea-
viduals. MOAIS+SR is validated on CTP instances with five sures of an individual for CMOPs. The objective functions are
decision variables. Experimental results show that MOAIS+SR used in the nondominated sorting so that the algorithm evolves
achieves the best overall performance among the algorithms feasible optimal solutions not only from the feasible space but
(the other two are MOAIS+CD and NSGAII+CD). However, also from the infeasible space. The number of feasible indi-
the development of IA has received relatively little attention viduals in the population is used to guide the search process to
for solving CMOPs. find more feasible or optimal solutions. Other PF approaches
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

QIAN et al.: CONSTRAINED MULTIOBJECTIVE OPTIMIZATION ALGORITHM BASED ON IS MODEL 3

are presented in [36][38]. However, the main shortcoming of where x  Rn is decision vector that includes n variables.
the adaptive PF method lies in their design, because adaptive p is the number of inequality constraints, while q is the num-
penalty factors are adapted based on the current behavior of the ber of equality constraints. li and ui denote lower and upper
algorithm, and it is unknown whether the adaptive changes will bounds on xi , respectively.  comprises the set of all solutions
be really useful in later cycles of the optimization process [35]. which satisfy all constraints and is called the feasible region.
The most popular CHT is originally proposed by fi (x)(i = 1, 2, . . . , m) is the ith objective function. gj (x) refers
Deb et al. [25]. They simply modify the definition of dom- to a constraint function. The objectives and constraints can
ination of UMOPs between two solutions, and propose the be linear or nonlinear. Generally, the equality constraints are
following CHT, which is defined as the CDP. usually transformed into inequality constraints.
A solution x is said to dominate another solution y in Definition 1 (Pareto Dominance): For two decision vectors
CMOPs, if any of the following conditions is true. x, y , x dominates y (x y) if and only if fi (x) fi (y) for
1) Solution x is feasible and solution y is not. all i {1, 2, . . . , m}, and fj (x) < fj (y) for at least one index
2) Solutions x and y are both infeasible, but solution x has j {1, 2, . . . , m}
a smaller overall constraint violation. Definition 2 (Pareto Optimality): A decision vector x 
3) Solutions x and y are feasible and solution x dominates is said to be Pareto-optimal if there does not exist another vec-
solution y. tor x  such that x x . The entirety of all Pareto-optimal
In [25], three algorithms, NSGAII with CDP, Jimenezs solutions is called the Pareto-optimal set; the corresponding
algorithm, and Ray et al.s algorithm [18], are compared objective vectors form the POF.
on test problems CTP1CTP7 with five decision variables. Definition 3 (Nondominated Sets and Fronts): Let X .
Simulation results show that NSGAII with CDP outperformed The function p(X) gives the set of nondominated decision
the other two MOEAs. Recently, several cMOEADs, based on vectors in X
CDP, have been also proposed. In [39], CDP is directly applied
to a proposed jumping gene multiobjective genetic algorithm, p(X) = {x X|x is nondominated regarding X}. (2)
and in [40], a PI-NSGA-II-VF algorithm with modified CDP is
proposed to solve two to five objective optimization problems. The set p(X) is the nondominated set regarding X, the corre-
Zhang and Qian [31] developed a constrained MOAIS+SR sponding set of objective vectors F(p(X)) is the nondominated
with CDP for CMOPs in dynamic environments. However, front regarding X. Furthermore, if X = , then the set p()
CDP favors feasible solutions over infeasible ones. Therefore, is PS and the set F(p()) is POF.
the main drawback of this constraint handling method is that
it may lose some potential information about the infeasible
region. IV. I MMUNE S YSTEM P RINCIPLE
In addition, SR CHT is originally proposed by In this section, we concentrate on some aspects of the
Runarsson and Yao [24]. To achieve a balance between IS, which are relevant to this paper. IS is a complex of
objectives and PFs stochastically, SR is designed to deal with cells, molecules, and organs that represent an identification
the inherent shortcomings of the PF method. In SR, instead mechanism capable of perceiving and combating dysfunction
of the definition of penalty factors, an user-defined parameter from our own cells and the action of exogenous infectious
called pf controls the criterion used for the comparison of microorganisms [43]. The interaction among the IS and sev-
infeasible solutions. Runarsson and Yao [24] improved a SR eral other systems and organs allows the regulation of the
strategy by adding a differential mutation similar to that used body, guaranteeing the stable functioning of the body [44].
in DE. Zhang et al. [41] suggested a novel search biases The innate IS and the adaptive IS are two inter-related sys-
selection strategy with SR, and applied it to evolutionary tems, which can identify a foreign molecule [i.e., antigen (Ag)]
strategy algorithms. In [42], a hybrid algorithm integrating from a bacterium or other invaders.
PSO with SR is presented for solving standard constrained In the innate IS, specialized Ag presenting cells (APCs),
numerical optimization and engineering problems. These such as macrophages, roam the body, ingest, and digest the
methods perform better with large populations and more Ags that they find and then fragment these Ags into gene
generations, but they may be impractical in solving real-world segments which are later attached to major histocompatibility
problems. As mentioned in Section I, CMOEA/D-DE-SR [23] complex (MHC) molecules and manifested on the surface of
and MOAIS+SR [33] both use a SR strategy. MHC as peptide-MHC combinations [45]. However, T-cells in
IS have receptor molecules that enable each of them to recog-
III. P ROBLEM D ESCRIPTION nize a different peptide-MHC combination. T-cells, activated
Without loss of generality, CMOP can be formulated as by that recognition, divide and secrete lymphocytes or chem-
follows: ical signals. Then, these signals mobilize other components
min F(x) = ( f1 (x), f2 (x), . . . , fm (x)) of the IS, and meanwhile, promote the start of the adaptive
s.t gj (x) 0 j = 1, 2, . . . , p immune response.
The adaptive IS uses somatically generated Ag receptors
gj (x) = 0 j = p + 1, p + 2, . . . , p + q
that are clonally distributed on the two types of lympho-
x = (x1 , x2 , . . . , xn ) cytes: 1) B-cells and 2) T-cells. The B-cells, which also have
li xi ui i = 1, 2, . . . , n (1) receptor molecules of a single specificity on their surface,
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

4 IEEE TRANSACTIONS ON CYBERNETICS

(a) (b)

Fig. 1. (a) IS model. (b) Algorithm model: the APC-module, T-module, B-module, and M-module correspond to gene segment pool, infeasible/dominated
population, feasible nondominated population, and memory pool, respectively.

respond to those signals. Unlike the receptors of T-cells, how- an algorithm model [Fig. 1(b)], and then develop the CMIGA,
ever, those of B-cells can recognize parts of Ags freely in which will be described in Section V-A.
solution, without MHC molecules. Each B-cell produces a In the APC-module, foreign Ags are ingested and digested
specific antibody (Ab), which can recognize and bind to an to gene segments by specialized APCs. These gene segments
Ag. Affinity measures the ability of an Ab to bind an Ag, the form a gene segment library. Corresponding to CMIGA, a gene
higher the affinity is, the more easily the Ag is neutralized. segment pool which includes nseg gene segments of length lseg
In order to neutralize diverse Ags, the activated B-cells divide is created. In the T-module, these gene segments are attached
and differentiate into a large number of identical B-cells. This to MHC protein to be MHC molecules. The MHC molecule
process is called affinity maturation. Maturated B-cells turn that presents on the surface of APCs is recognized by T-cells.
into plasma cells that secrete Ab proteins to fight off the Ags, Then the T-cells that identify MHC molecules are activated
which are soluble forms of their receptors. Some T-cells and and divide lymphokines, or secrete chemical signals. The pro-
B-cells become memory cells that persist in the circulation and cess is a simulated evolution operation in CMIGA. In the
boost the IS readiness to eliminate the same Ag if it presents B-module, however, B-cells that respond to the chemical sig-
itself in the future. nal are activated. These activated B-cells are then cloned and
Through the recognition and distinction of specific molec- mutated. After that, some higher affinity variants are selected
ular patterns, the Abs play a central role in the IS. The basic to enter the pool of memory cells (M-module). The process is
unit of an Ab, or immunoglobulin, is composed of two iden- a simulated immune operation. Finally, the recombined Abs
tical light chains and two identical heavy chains [43]. It is are implemented by a transformation operation. The transfor-
found that an immunoglobulin polypeptide chain is encoded mation mechanism, which not only improves the infeasible
in multiple gene segments scattered along a chromosome of individuals moving toward the feasible region but also benefits
the germ-line genome. These gene segments must be brought the searching within the boundary between feasible and infea-
together to form a complete immunoglobulin gene active sible regions, offers the ability to escape from local optima on
in B lymphocytes. On one hand, recombination is a rearrange- an affinity landscape, and facilitates intercommunion between
ment process that forms the gene fragments from the segments the two populations.
libraries in an orderly manner to generate a new functional
Ab molecule, implemented by a biologically inspired mech-
V. A LGORITHM F ORMULATION AND
anism called transformation [46]. Biological transformation
M ODULE I LLUSTRATION
consists of the transfer of small pieces of extra cellular DNA
between organisms. These strains of DNA, or gene segments, A. Algorithm Description
are extracted from the environment and added to recipient In this section, we propose a computational implementa-
cells. On the other hand, mutations are introduced somati- tion of CMIGA. As associated with the problem model (1)
cally into an immunoglobulin gene with a high probability in Section III, Ag is viewed as CMOP. B-cell is regarded as
(somatic hypermutation). Both recombination and mutation real-encoded feasible nondominated candidate solution. T-cell
greatly increase the diversity of the genetic information carried is assimilated to infeasible/dominated solution.
in the germ-line genome. The pseudo-code of CMIGA is given in Algorithm 1,
The above immune principles motivate us to construct a where t represents the iteration counter, notation (X t , n) indi-
novel IS model [Fig. 1(a)]. Such a framework consists of four cates the tth generation population X t with size n. T() is
vital modules: 1) APC-module; 2) T-module; 3) B-module; and defined as immune or genetic operator, and the subindex
4) M-module. We draw an analogy between the IS model and within bracket indicates the operation (e.g., T(D) refers to
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

QIAN et al.: CONSTRAINED MULTIOBJECTIVE OPTIMIZATION ALGORITHM BASED ON IS MODEL 5

Algorithm 1 Pseudo-Code of CMIGA


Input: N, Tmax , nseg , nfea , nc .
Output: P - Nondominated set.
1: Initialization: Set initial generation t = 1. Generate initial population X t = (x1 , x2 , . . . , xN ) and gene segment pool Y t = (y1 , y2 , . . . , ynseg ). Create
memory pool M t = .
2: Evaluation: For each antibody xi X t , calculate objective vector F(xi ) = ( f1 (xi ), f2 (xi ), . . . , fm (xi )) as well as constraint violation value V(xi ) =

p+q
max{gj (xi ), 0} (i = 1, 2, . . . , N).
j=1
3: while t Tmax do 
4: Population division: (At , nfea ) (Bt , N nfea ) = T(D) (X t , N). Antibody population X t is divided into feasible nondominated population At , and the
rest of antibodies construct population Bt .
5: Affinity assignment: For each antibody xi At , determine the scalar affinity value Aff (xi ) according to Eq.(3).
6: Clone reproduction: (Ct , N) = T(C) (Rt , nc ). Perform clone reproduction operation in terms of subsection V-B2.
7: Hypermutation: (Dt , N) = T(M) (Ct , N). Each clone of population Ct is submitted to mutate (see subsection V-B3), generating a population Dt of
matured clones, and calculate objective vector of mutated antibodies.
8: Update memory pool: (M t , nc ) = T(Um ) (At , nfea ).
9: Tournament selection: (Et , N2 ) = T(S) (X t Rt , N nc ). Apply binary tournament selection strategy to choose N2 antibodies from population (X t Rt )
forming a new population Et .
10: Evolution: (F t , N2 ) = T(E) (Et , N2 ). SBX crossover and polynomial mutation are performed on Et , and obtain population F t .
Transformation: (H t , 3N (T) t 3N t t  F t by invoking Algorithm 3, and calculate objective
11: 2 ) = T (U , 2 ). Implement transformation operation on U =D
vector and violation value of each antibody.
Crowded-Comparison selection: (Qt , N) = T(Cs ) (St , 3N t t  M t is formed, and carry out Crowded-Comparison
12: 2 + nc ). A combined population S = H
selection operation on St to obtain next generation population Qt (see subsection V-B7).
13: Update gene segment pool: (Y t , nseg ) = T(Us ) (Y t , nseg ). Update gene segment pool by invoking Algorithm 2.
14: X t+1 Qt , Y t+1 Y t , and t t + 1, go to line 3.
15: end while
16: All nondominated solutions in At form final nondominated set P.

division operation). An introduction to CMIGA can be seen determining the affinity of each Ab implies the computation
as follows. of the following.
1) Lines 1 and 2: First, N antibodies are generated randomly 1) Rate-Dominated: The rate-dominated of Ab x is
in decision space to form initial population X 1 , and nseg defined as
gene segments of length lseg are also created randomly to |{y|y x, y X}|
constitute initial gene segment pool Y 1 . Then objective c(x) =
|X|
and constraint violation values are calculated for each Ab.
Note that in line 2 gj (xi ) = |gj (xi )|, if j > p. Otherwise, where | | denotes the cardinality of a set.
gj (xi ) = gj (xi ). Where is a tolerance value for equality 2) Density: The density of Ab is expressed as follows:
constraints (usually 0.0001 to 0.001).
2) Lines 6 and 7: The clone reproduction operator is min d(x, y)
yX
applied to Rt , giving rise to a temporary population Ct . (x) = .
max d(y, z)
A maturated Ab population Dt is generated via hyper- y,zX
mutation operator on Ct .
3) Lines 9 and 10: The population (X t Rt ) is used for Here d(x, y) refers to the Euclidean distance between
selection, crossover, and mutation to create a new pop- antibodies x and y.
ulation F t . It is important to note that we use a binary The affinity of Ab depends on c(x) and (x)
tournament selection operator but the selection criterion 1
is based on CDP (see Section II). The number of Abs Aff(x) = + (1 )(x). (3)
1.0 + c(x)
selected is N/2. 
4) Line 11: The combined population Dt F t is processed One is added to ensure that denominator value is greater
by the transformation operator as Algorithm 3, and a than one and that 1/(1.0 + c(x)) < 1. [0, 1] is a constant.
new offspring population H t is generated.  We set = 0.8 so as to prefer rate-dominated to density in
5) Line 12: Finally, a new combined population (H t M t ) simulation experiments.
is used for crowded-comparison selection to create the According to the design of Ab affinity, the other operators
next population Qt of size N. Since current population  are designed as follows.
members and memory cells are all included in H t M t , 2) Clone Reproduction (T(C) ): We first select nc higher
elitismis ensured. In addition, the number of antibodies affinity antibodies from At composing a template popula-
in H t M t is no more than 2N due to |M t | = nc N/2 tion Rt . The nc selected antibodies will be cloned indepen-
as shown in Section V-B4. dently and proportionally to their affinities, generating a clone
population Ct . Here
B. Operator Design 
1) Affinity Assignment: Let X be the current Ab population, nfen if nfen < N2
nc = N . (4)
and the affinity of Ab x X is defined as Aff(x). In this paper, 2 otherwise
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

6 IEEE TRANSACTIONS ON CYBERNETICS

Algorithm 2 Update Gene Segment Pool Algorithm 3 Transformation


Input: At = (x1 , x2 , . . . , xnfea ) - feasible nondominated population Input: 
Output: Y t - updated gene segment pool V t = (Dt F t ) = (v1 , v2 , . . . , v 3N ) - combined population
2
1: i 1 Y t = (y1 , y2 , . . . , ynseg ) - gene segment pool
2: while i nseg do ptra - transformation rate
3: Select randomly an antibody xr At , and create a gene segment yr Output: H t - updated gene segment pool
of length lseg in xr . 1: Set i = 1, H t =
4: yi yr and i i + 1. 2: while i 3N
5: end while 2 do
3: Select randomly a gene segment yr Y t and a random number rand
[0, 1].
4: if rand < ptra then
5: Apply transformation mechanism (Fig.3) on vi and yr to generate
The maximum size of the clone population Ct is set to N. That
vi .
 i )) of Ab xi R is calculated as
is, the clone number (c(x t
6: else
7: vi = vi
Aff(xi )
c(xi ) = N nc   . (5) 8: end if 
H t = H t vi and i i + 1
j=1 Aff xj
9:
10: end while
It is worthwhile to note that nc is no more than N/2 according
to (4).
3) Hypermutation (T(M) ): Antibody x = (x1 x2 xn )
undergoes hypermutation with the mutation probability pm ,

and the mutated Ab x = (x1 x2 xn ) is created as follows:


xj N 0, 1 if < 0.5
xj = t (6)
xj + N 0, 1
otherwise
t

where is uniformly distributed random number generated


in [0,1]. N(0, 1/t) refers to a random number with a uniform Fig. 2. Transformation mechanism.
distribution between 0 and 1/t. t is generation counter.
4) Update Memory Pool (T(UM ) ): In each generation, the
nc highest affinity antibodies in At are copied into M t . The
maximum number of memory cells in M t is no more than
N/2 according to (4).
5) Update Gene Segment Pool (T(Us ) ): All gene segments
are to be updated. First, we randomly select an Ab xr At ,
then randomly create a new gene segment yr of length lseg Fig. 3. Crowding-distance computation.
from the selected xr . The old gene segment in Y t is replaced
by the new gene segment yr . This procedure will not stop until then the one with lower rank is chosen. However, if both solu-
all old gene segments are accommodated. The procedure can tions belong to the same front, then we select the solution that
be seen from Algorithm 2. is located in a less crowded region. The crowding-distance
It should be emphasized that the update of the gene segment of solution x in its front is the inverse of the sum of the
pool differs from the one presented in enhanced transformation Euclidean distance between it and the nearest neighbors along
genetic algorithm (ETGA) [46]. In order to make better use each objective. Fig. 3 shows the crowding-distance computa-
of the past information, unlike ETGA where the gene pool is tion approach of all solutions on a nondominated front in 2-D
updated by using the genetic information of the individuals of objective space. For instance, the crowding-distance of x is the
the previous population, CMIGA uses the memory cells in M t inverse of the sum of d(x, y) and d(x, z). Here, d(x, y) is the
to update the gene segment pool. Euclidean distance between solution x and solution y. As can
(T)
 t (T ): For each Ab vi (i = 1, 2, . . . ,
6) Transformation be seen from Fig. 3, the point z is the least crowded solution
(3N)/2) in D t F , it will be transformed with a trans- except the boundary solutions a and d.
formation probability ptra . The procedure is described in
Algorithm 3.
The transformation mechanism is shown in Fig. 2. We ran- C. Computational Complexity
domly select a gene segment yr from the gene segment pool In this section, the complexity of CMIGA is presented in an
Y t , and a random point of transformation is produced in the iteration processing. Moreover, we only consider population
Ab vi V t . The gene segment, which is incorporated in the size N in time complexity. According to the framework of
genome of the Ab, replaces the genes after the transforma- CMIGA, it has the following main processing steps.
tion point. Notice that the chromosome is seen as a circle. 1) Clone Reproduction (Line 6): Sorting and selecting nc
Proceeding in this way, the chromosome size is kept constant. higher affinity antibodies require O(N log N) and O(N)
7) Crowded-Comparison Selection (T(Cs ) ): Two solutions computations, respectively. In addition, the time com-
(i.e., x and
 y) are randomly select from the combined popula- plexity for cloning is O(N). Therefore, the overall time
tion H t M t . And if they have different nondomination ranks, complexity of line 6 is a1 = 2O(N) + O(N log N).
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

QIAN et al.: CONSTRAINED MULTIOBJECTIVE OPTIMIZATION ALGORITHM BASED ON IS MODEL 7

TABLE I
2) Hypermutation (Line 7): Mutating the N clones demands PARAMETER S ETTINGS OF THE P ROPOSED A LGORITHM
a computational time of a2 = O(N).
3) Evolution (Step 10): The time complexity of crossover
and mutation is a3 = 2O(N/2).
4) Transformation (Line 11): The time complexity of trans-
formation operation is a4 = O((3N)/2).
5) Crowded-Comparison Selection (Line 12): The nondo-
minated sorting requires O(((3N)/2 + nc )2 ). Afterward,
crowding selection requires O(((3N)/2 + nc ) TABLE II
S ETTING OF THE HV R EFERENCE P OINT FOR
log((3N)/2 + nc )) computations. In the worst A LL THE T EST I NSTANCES
case, the computational time required in this step
is a5 = O((2N)2 ) + O(2N log(2N)), when nc = N/2.
The overall complexity of CMIGA is

a1 + a2 + a3 + a4 + a5 = 2O(N) + O(N log N)


   
N 3N
+ O(N) + 2O +O
2 2
3) The Parameters of the Operators: For the six algorithms
+ O (2N) + O(2N log(2N)).
2
being compared, we have identical parameter settings as
(7) suggested in [22], [23], [25], [28], [33], and [47]. For
CMIGA, The parameter settings are listed in Table I.
According to the operational rules of the symbol O(),
the worst time complexity of CMIGA can be simplified B. Performance Measures
as O(N 2 ).
Many performance measures have been suggested
in [53][55]. In our experiments, the performance of the
VI. E XPERIMENTAL S ETUP algorithms is accessed by using the inverted generational
In order to validate the optimization performance of CMIGA distance (IGD) and Hypervolume (HV). A detailed discussion
in solving CMOPs, we compare CMIGA with six represen- can be found in [53] and [56]. IGD measures the average
tative constrained multiobjective algorithms (cMOEAD [22], distance from the points in the true POF to their closest
DMOEADD [47], MOAIS+SR [33], NSGAII with CDP [25], solution in the obtained nondominated set, which could
MCMOEA [28], and CMOEA/D-DE-CDP [23]) on 18 widely measure both the convergence and the diversity of solutions.
used benchmark CMOPs with different difficulties. The A low IGD value indicates that the obtained set is close to the
CMOPs include Osyczka function (OSY) [48], Srinivas func- true POF as well as having a good distribution. HV measures
tion (SRN) [49], Tanaka function (TNK) [50], eight CTP the volume of the objective space enclosed by the obtained
problems [51], and seven CF problems which were proposed solution set and a reference point. A large HV value indicates
in the CEC 2009 test suite [52]. Among these problems, a good dominance relation. In addition, a Mann-Whitney
SRN, TNK, and OSY include multiple constraints with a few rank-sum test [57] is implemented to evaluate whether the
decision variables, while CTP and CF instances have one difference in performance between two independent samples
or two nonlinear constraints with ten decision variables as is significant among different nondominated sets obtained by
suggested [51], [52]. Besides, for CTP problems, a complex each algorithm.
multimodal Rastrigins function is selected as the g(x) function For a fair comparison, 100 nondominated solutions selected
from final population are used to calculate the IGD and HV
n
 values as in [58] for each algorithm. In order to calculate IGD
g(x) = 1 + 10(n 1) + xi2 10cos(4 xi ) . (8) values, 300 uniformly distributed points are produced on the
i=2 true POF for each instance. Note that when the Pareto-optimal
solutions are composed of some disjoint points or regions (i.e.,
A. Algorithm Parameter Settings CTP2, CTP3, CF1, et al.), the 300 points will be selected on
the line of the Pareto points or regions. When computing HV
The parameter settings of all algorithms are as follows:
values, we select a point slightly larger than the worst value
1) Stopping Criterion: The maximal number of generations
of each objective on the true POF of each instance as the ref-
Tmax = 500 for all algorithms.
erence point, as is shown in Table II. Moreover, the solutions
2) Population Size: N = 200 for cMOEAD, DMOEADD,
that do not dominate the reference point are discarded in the
and CMOEA/D-DE-CDP, while N = 100 for CMIGA,
calculation of HV.
MCMOEA, and NSGAII. For MOAIS+SR, we set the
size of the Ab population Na = 40, and the other param-
eters are the same as in [33]. Note that these settings VII. E XPERIMENTAL R ESULTS AND A NALYSIS
lead to equal numbers of function evaluations for the In this section, we present the experimental results obtained
seven algorithms. by seven algorithms on 18 test instances. Each algorithm
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

8 IEEE TRANSACTIONS ON CYBERNETICS

TABLE III
C OMPARISON OF M EAN AND SD OF IGD BASED ON 30 I NDEPENDENT RUNS FOR 18 T EST I NSTANCES .
T HE R ESULTS IN B OLDFACE I NDICATE THE B EST P ERFORMANCE

is implemented in the VC++ platform. The codes second order inequality constraints. The true POF is a con-
of NSGAII with CDP and DMOEADD are avail- catenation of five regions [51]. From Table III, it is easy to
able at http://www.iitk.ac.in/kangal/deb.shtml and http:// see that CMIGA has the best (i.e., lowest) mean of IGD,
dces.essex.ac.uk/staff/qzhang/moeacompetition09.htm. For followed by cMOEAD. The ranking order of other algo-
each problem, all algorithms were executed independently rithms is NSGAII, DMOEADD, MOAIS+SR, MCMOEA,
30 times. The results [mean and standard deviation (SD)] in and CMOEA/D-DE-CDP. Moreover, the small SD obtained
Tables III and IV are the averages of IGD and HV over those by CMIGA indicates that the optimization performance of
30 runs. The numbers of decision variables and constraints CMIGA is consistent over 30 runs. SRN has one linear
of test instances are indicated in the parentheses next to the inequality constraint and one nonlinear second order inequality
instances. The numbers inside the parentheses next to the constraint. Observing Table III, we can also see that cMOEAD
mean refer to the rank of the algorithms in that test instance. has the best IGD performance, followed by CMIGA. TNK
For each algorithm, the overall rankings based on the ranking has one second order nonlinear inequality constraint and one
of each problem are listed at the bottom of Tables III and IV. highly nonlinear trigonometric inequality constraint. The POF
Figs. 5 and 7 depict the mean of IGD and HV obtained by lies on a nonlinear constraint surface. The ranking order of
each algorithm in 30 runs for each instance. The horizontal each algorithm is similar to that for SRN except MCMOEA
axis represents test instances, while the vertical axis refers to and CMOEA/D-DE-CDP. Furthermore, since TNK is a two-
the averages of IGD or HV. To show the divergence of the variable problem with the objective functions f1 = x1 and
nondominated solutions obtained by all algorithms, the final f2 = x2 , it is easily solved by these algorithms except
nondominated fronts are plotted in Fig. 4 on some harder MOAIS+SR and MCMOEA. The overall comparison of all
problems (i.e., CTP4, and CTP6.) in 30 runs. Due to the algorithms is shown in Fig. 5(a) for the three problems. As can
space limitations, the nondominated fronts of CF3, CTP7, be observed, from Fig. 5(a), CMIGA achieves a better mean of
and CTP8 are presented in the supplemental file (available at IGD for OSY. However, for SRN and TNK, cMOEAD obtains
http://ieeexplore.ieee.org). a better performance, and CMIGA only obtains the second
The OSY, SRN, and TNK problems are low-dimensional best results. The possible reason for the failure of CMIGA
test instances, but they include multiple constraints. For OSY, is that the number of decision variables of SRN and TNK
it has four linear inequality constraints and two nonlinear is less than the length of gene segment (see Table I), which
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

QIAN et al.: CONSTRAINED MULTIOBJECTIVE OPTIMIZATION ALGORITHM BASED ON IS MODEL 9

TABLE IV
C OMPARISON OF M EAN AND SD OF HV BASED ON 30 I NDEPENDENT RUNS FOR 18 T EST I NSTANCES .
T HE R ESULTS IN B OLDFACE I NDICATE THE B EST P ERFORMANCE

causes the transformation operator to fail to exploit infeasible diverse solutions are superior to other algorithms. In addition,
regions. as to CTP6, which is also a hard problem, since the constraint
The above problems have a few decision variables. splits the search space into feasible and infeasible bands of
Moreover, most objective functions and constraints are not varying widths. Fig. 4 also presents the nondominated fronts
adequately nonlinear. However, for the following CTP test obtained by all algorithms in 30 runs. These figures clearly
problems, the entire POFs are composed of some parts of show that CMIGA and cMOEAD consistently approximated
the unconstrained Pareto-optimal regions and some parts of well the true POFs. However, other algorithms get trapped in
the constraint boundaries. They will cause difficulty in the the local feasible region in some runs. The reason is the pres-
vicinity of the Pareto-optimal region and the entire search ence of hard constraints which makes the other algorithms
space. Observing the experimental results in Table III, one unable to overcome a number of infeasible holes before com-
can see that CMIGA and cMOEAD achieve the best IGD ing to the island containing POF, while CMIGA and cMOEA
performance for different CTP problems. Moreover, a care- employ parallel and local search ability which maintains an
ful analysis on the results obtained by cMOEAD and CMIGA adequate diversity among solutions. Furthermore, the trans-
reveals that cMOEAD and CMIGA may be considered as com- formation mechanism in CMIGA accelerates the speed of
parable because of the small differences for all CTP instances infeasible individuals moving toward the feasible region and
in the mean of IGD. On the other hand, the SDs obtained by offers the ability to escape from local optima. Fig. 5(b) shows
CMIGA are superior to those obtained by cMOEAD in most the overall comparison of all algorithms for CTP instances.
problems. In particular, for CTP4, the singular feasible Pareto- As can be seen from Fig. 5(b), the means of IGD obtained
optimal solution is far away from the feasible region. An by CMIGA are similar to those obtained by cMOEAD in
algorithm has to travel through a long narrow feasible tunnel most CTP problems except CTP1, and NSGAII has the worst
in search of the solution at the end of the tunnel. From Fig. 4, performance.
it is obvious that CTP4 causes difficulty in converging to the As for the CF test problems, it can be observed from
true Pareto-optimal solutions for all algorithms in 30 runs. Table III that CMIGA obtains the best mean of IGD for
The nondominated solutions found by each algorithm cannot CF2, CF4, CF5, and CF7. However, for CF1, CF3, and CF6,
go close to the true Pareto-optimal solutions, but CMIGAs, DMOEADD obtains the best results, and CMIGA only gets
cMOEADs, and DMOEADDs ability to converge and find the second best performance. But the differences between
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

10 IEEE TRANSACTIONS ON CYBERNETICS

Fig. 4. Plots of all the 30 final nondominated fronts obtained by each algorithm on CTP4 and CTP6. In each subplot, the horizontal and vertical axes
correspond to the first and second objective functions, respectively. F and IF represent the feasible and infeasible regions, respectively.

(a) (b) (c)

Fig. 5. Comparison of the mean of IGD obtained by each algorithm in various test instances. In each subplot, the horizontal and vertical axes correspond
to test instances and the means of IGD, respectively. Test functions (a) OSY, SRN, and TNK, (b) CTP1CTP8, and (c) CF1CF7.

DMOEADD and CMIGA, in terms of the mean of IGD, are of CF3 is concave and discontinuous, it could be more dif-
extremely small for CF1, CF3, and CF6. Thus, it can be con- ficult than the other CF problems, all algorithms fail to find
cluded that the performance of both algorithms is similar in the whole POF in each run on CF3. It can be observed from
terms of the measures of IGD. However, all algorithms per- Table III that CMIGA has the best (i.e., lowest) SDs for the
form comparatively poorly on problem CF3. Since the POF CF problems except CF3 and CF6.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

QIAN et al.: CONSTRAINED MULTIOBJECTIVE OPTIMIZATION ALGORITHM BASED ON IS MODEL 11

Fig. 6. Box plots of IGD value on all instances from seven algorithms in 30 independent runs. In each subplot, A1, A2, A3, A4, A5, A6, and A7 represent
cMOEAD, DMOEADD, MOAIS+SR, NSGAII, MCMOEA, CMOEA/D-DE-CDP, and CMIGA, respectively.

The overall ranking in Table III shows that, as a whole, values obtained by CMIGA is significantly different (namely,
CMIGA has the best rank, followed by DMOEADD. Although p-value < 0.05) from those obtained by the corresponding
cMOEAD performs much better than DMOEADD on the algorithm in 30 runs, while indicates that the distribution
OSY, SRN, TNK, and CTP problems, it only ranks third. This of IGD values obtained by CMIGA is similar to those obtained
is because cMOEAD has a lower rank on the CF problems. by the corresponding algorithm. As can be seen from Table III,
Besides, CMOEA/D-DE-CDP presents worse performance. CMIGA has a significant advantage compared to the distribu-
Note that CMOEA/D-DE-CDP has shown a better perfor- tion in other algorithms on most problems (except cMOEAD
mance on the CTP problems in [23]. This may be due to the on TNK; DMOEADD on CTP1, CTP3, CTP4, CTP7, and
2-D decision variables in those experiments. However, when CF6; MOAIS+SR on CTP1; NSGAII on OSY, CTP1, CTP2,
the decision variables are increased to ten in our experiments, and CTP7).
it causes difficulty to CMOEAD-DE-CDP in solving these Table IV shows the HV statistics based on 30 independent
problems. runs on 18 test instances. The results in boldface indicate the
Fig. 6 presents the box plots of IGD for all instances best results. These statistics are based on feasible nondomi-
from cMOEAD (indicated by A1), DMOEADD (A2), nated solutions that dominate the reference point in Table II
MOAIS+SR (A3), NSGAII (A4), MCMOEA (A5), CMOEA/ (i.e., the solutions that are worse than the reference point in at
D-DE-CDP (A6), and CMIGA (A7) in 30 runs. In it, 18 least one objective will contribute zero to HV) for each prob-
cases are shown in order to highlight different observa- lem. It can be seen from Table IV that CMIGA obtains the best
tions, and we can observe that CMIGA has a superiority for (i.e., largest) performance on OSY, while cMOEAD achieves
the IGD statistic, followed by cMOEAD and DMOEADD. the best results on SRN and TNK. For the CTP problems,
For instance, CMIGA shows lower IGD statistical results CMIGA gives the best mean HV on CTP2, CTP3, and CTP4,
on most of these problems. In particular, for OSY, CTP6, while cMOEAD slightly outperforms CMIGA on other CTP
CTP7, and CTP8, other algorithms indicate worse statistical problems (e.g., the differences in the mean of HV are 0.015,
characteristics in Fig. 6(a1) and 6(a9)(a11) in a sense. 0.01, 0.012, and 0.162 on CTP5, CTP6, CTP7, and CTP8,
In some of the instances shown in Fig. 6, it is hard to respectively). As a result, for the CTP instances, the perfor-
determine whether CMIGA is significantly better than the mance obtained by CMIGA and cMOEAD may be considered
other algorithms since they show similar IGD statistical char- as comparable in terms of the statistics of HV. However, for
acteristics. Therefore, the MannWhitney rank-sum test is the CF instances, CMIGA and DMOEADD provide a better
used to examine the distribution of the IGD values in 30 HV performance, while cMOEAD shows worse results. Fig. 7
runs [29], [57]. The corresponding statistical results of the depicts the average of HV obtained by each algorithm on each
comparing algorithms by the p-values with respect to the null problem. Observing Fig. 7(a) and (b), one can see that CMIGA
hypothesis (i.e., no difference) are given in Table III. The nota- and cMOEAD have similar performance on SRN, TNK, and
tion used in Table III shows that the distribution of IGD CTP instances, while CMIGA and DMOEADD show similar
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

12 IEEE TRANSACTIONS ON CYBERNETICS

(a) (b) (c)

Fig. 7. Comparison of the mean of HV obtained by each algorithm in various test instances. In each subplot, the horizontal and vertical axes correspond to
test instances and the averages of HV, respectively. Test functions (a) OSY, SRN, and TNK, (b) CTP1CTP8, and (c) CF1CF7.

Fig. 8. Box plots of HV value on all instances from seven algorithms in 30 independent runs. In each subplot, A1, A2, A3, A4, A5, A6, and A7 represent
cMOEAD, DMOEADD, MOAIS+SR, NSGAII, MCMOEA, CMOEA/D-DE-CDP, and CMIGA, respectively.

performance on the CF instances. Fig. 8 presents the box extended POF and very close to the true POF on most
plots of HV obtained by each algorithm on each problem over of the test instances. The overall ranking order is CMIGA,
30 runs. These figures illustrate that CMIGA and cMOEAD cMOEAD, DMOEADD, MOAIS+SR, MCMOEA, NSGAII,
achieve similar statistical characteristics (A7 and A1 in the and CMOEA/D-DE-CDP in terms of the IGD indicator.
figures) on the CTP test instances, while other algorithms Moreover, the ranking of the HV indicator is consistent with
display worse results. However, CMIGA and DMOEADD that of the IGD indicator. The success of CMIGA can be
can obtain comparable characteristics for the CF problems, attributed to the exploitation of the infeasible region and the
while other algorithms show inferior results. The overall rank- production of Ab diversity in different subpopulations. In addi-
ing order is CMIGA, cMOEAD, DMOEADD, MOAIS+SR, tion, the transformation mechanism offers the ability to escape
MCMOEA, NSGAII, and CMOEA/D-DE-CDP in Table IV, from local optima in constraint boundaries.
which is consistent with the results in Table III. Moreover, the
MannWhitney rank-sum test, in terms of the distribution of
HV values in 30 runs, shows that CMIGA has a significant VIII. C ONCLUSION
advantage compared to the distribution obtained with other Constrained multiobjective optimization is an extremely
algorithms on most problems. challenging research topic in the field of optimization, due to
In summary, based on the statistical results of the IGD multimodality and nonlinearity. This paper presents a multiob-
and HV indicators, CMIGA is capable of obtaining a well jective immune optimization algorithm for solving constrained
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

QIAN et al.: CONSTRAINED MULTIOBJECTIVE OPTIMIZATION ALGORITHM BASED ON IS MODEL 13

multiobjective optimization with multimodal nonlinear con- [12] K. Sindhya, K. Miettinen, and K. Deb, A hybrid framework for evo-
straints. First, by making an analogy between the two pro- lutionary multi-objective optimization, IEEE Trans. Evol. Comput.,
vol. 17, no. 4, pp. 495511, Aug. 2013.
cesses of the IS response and the constrained multiobjective [13] R. Mallipeddi and P. N. Suganthan, Ensemble of constraint handling
problem, B-cells are treated as candidate solutions of opti- techniques, IEEE Trans. Evol. Comput., vol. 14, no. 4, pp. 561579,
mization problems. And then these solutions are distinguished Aug. 2010.
[14] K. Deb and R. Datta, A bi-objective constrained optimization algorithm
as feasible nondominated and infeasible/dominated popula- using a hybrid evolutionary and penalty function approach, Eng. Optim.,
tions. Feasible solutions are improved through recombination vol. 45, no. 5, pp. 503527, May 2013.
and hypermutation, while infeasible/dominated solutions are [15] Y. Wang and Z. Cai, A dynamic hybrid framework for constrained
evolutionary optimization, IEEE Trans. Syst., Man, Cybern. B, Cybern.,
evolved by simulating binary crossover and polynomial muta- vol. 42, no. 1, pp. 203217, Feb. 2012.
tion. Finally, the population from the combination of feasible [16] W. Zhang, G. G. Yen, and Z. He, Constrained optimization via artificial
solutions and infeasible ones is enhanced through a new immune system, IEEE Trans. Cybern., vol. 44, no. 2, pp. 185198,
Feb. 2014.
transformation mechanism using a gene segment pool. The [17] X. Li and G. Du, BSTBGA: A hybrid genetic algorithm for constrained
computational experiments are composed of 18 test instances multi-objective optimization problems, Comput. Oper. Res., vol. 40,
and the results obtained show that the proposed approach is no. 1, pp. 282302, Jan. 2013.
competitive with other methods, and is also able to converge [18] T. Ray, H. K. Singh, A. Isaacs, and W. Smith, Infeasibility driven
evolutionary algorithm for constrained optimization, in Constraint-
to the feasible POF in most cases. Handling in Evolutionary Optimization. Berlin, Germany: Springer,
It is also important to emphasize that there is very little 2009, pp. 145165.
specific work regarding the use of AIS for nonlinear CMOPs, [19] H. K. Singh, T. Ray, and W. Smith, C-PSA: Constrained Pareto sim-
ulated annealing for constrained multi-objective optimization, Inf. Sci.,
and in this context, this approach provides a viable alterna- vol. 180, no. 13, pp. 24992513, Jul. 2010.
tive. Obviously, a lot of work remains to be done in order [20] B. Qu and P. Suganthan, Constrained multi-objective optimization algo-
to improve the quality of the Pareto-optimal solutions, such rithm with an ensemble of constraint handling methods, Eng. Optim.,
vol. 43, no. 4, pp. 403416, Apr. 2011.
as, diversity mechanisms specially designed for constrained [21] Q. Zhang and H. Li, MOEA/D: A multiobjective evolutionary algorithm
search regions and performance measures of constrained mul- based on decomposition, IEEE Trans. Evol. Comput., vol. 11, no. 6,
tiobjective problems. For further work, the proposed technique pp. 712731, Dec. 2007.
[22] M. Asafuddoula, T. Ray, R. Sarker, and K. Alam, An adaptive constraint
will be improved and applied to other CMOPs and engineering handling approach embedded MOEA/D, in Proc. IEEE Congr. Evol.
design fields. Comput. (CEC), Brisbane, QLD, Australia, 2012, pp. 18.
[23] M. A. Jan and R. A. Khanum, A study of two penalty-parameterless
constraint handling techniques in the framework of MOEA/D, Appl.
R EFERENCES Soft Comput., vol. 13, no. 1, pp. 128148, Jan. 2013.
[24] T. P. Runarsson and X. Yao, Search biases in constrained evolutionary
[1] A. Ponsich, A. L. Jaimes, and C. A. C. Coello, A survey on multiobjec- optimization, IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 35,
tive evolutionary algorithms for the solution of the portfolio optimization no. 2, pp. 233243, May 2005.
problem and other finance and economics applications, IEEE Trans. [25] K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan, A fast and elitist
Evol. Comput., vol. 17, no. 3, pp. 321344, Jun. 2013. multiobjective genetic algorithm: NSGA-II, IEEE Trans. Evol. Comput.,
[2] H. Ishibuchi, Y. Tanigaki, H. Masuda, and Y. Nojima, Distance-based vol. 6, no. 2, pp. 182197, Apr. 2002.
analysis of crossover operators for many-objective knapsack prob- [26] S. Z. Martinez and C. A. C. Coello, A multi-objective evolutionary
lems, in Parallel Problem Solving From NaturePPSN XIII. Cham, algorithm based on decomposition for constrained multi-objective opti-
Switzerland: Springer, 2014, pp. 600610. mization, in Proc. IEEE Congr. Evol. Comput. (CEC), Beijing, China,
[3] J. L. C. Meza, M. B. Yildirim, and A. S. Masud, A multiobjective 2014, pp. 429436.
evolutionary programming algorithm and its applications to power gen- [27] M. Liu, X. Zou, Y. Chen, and Z. Wu, Performance assessment of
eration expansion planning, IEEE Trans. Syst., Man, Cybern. A, Syst., DMOEA-DD with CEC 2009 MOEA competition test instances, in
Humans, vol. 39, no. 5, pp. 10861096, Sep. 2009. Proc. IEEE Congr. Evol. Comput., vol. 1. Trondheim, Norway, 2009,
[4] K. Deb, Multi-objective optimization, in Search Methodologies. pp. 29132918.
New York, NY, USA: Springer, 2014, pp. 403449. [28] L. Jiao, J. Luo, R. Shang, and F. Liu, A modified objective
[5] M. Li, S. Yang, K. Li, and X. Liu, Evolutionary algorithms with function method with feasible-guiding strategy to solve constrained
segment-based search for multiobjective optimization problems, IEEE multi-objective optimization problems, Appl. Soft Comput., vol. 14,
Trans. Cybern., vol. 44, no. 8, pp. 12951313, Aug. 2014. pp. 363380, Jan. 2014.
[6] M. Khaleghi, M. M. Farsangi, H. Nezamabadi-Pour, and K. Y. Lee, [29] Y. G. Woldesenbet, G. G. Yen, and B. G. Tessema, Constraint han-
Pareto-optimal design of damping controllers using modified artificial dling in multiobjective evolutionary optimization, IEEE Trans. Evol.
immune algorithm, IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., Comput., vol. 13, no. 3, pp. 514525, Jun. 2009.
vol. 41, no. 2, pp. 240250, Mar. 2011. [30] L. N. De Castro and J. Timmis, Artificial Immune Systems: A New
[7] J. Wang, J. Liao, Y. Zhou, and Y. Cai, Differential evolution enhanced Computational Intelligence Approach. London, U.K.: Springer, 2002.
with multiobjective sorting-based mutation operators, IEEE Trans. [31] Z. Zhang and S. Qian, Artificial immune system in dynamic envi-
Cybern., vol. 44, no. 12, pp. 27922805, Dec. 2014. ronments solving time-varying non-linear constrained multi-objective
[8] S. Bandyopadhyay and A. Mukherjee, An algorithm for many-objective problems, Soft Comput., vol. 15, no. 7, pp. 13331349, Jul. 2011.
optimization with reduced objective computations: A study in differen- [32] V. S. Aragn, S. C. Esquivel, and C. A. C. Coello, Artificial immune
tial evolution, IEEE Trans. Evol. Comput., vol. 19, no. 3, pp. 400413, system for solving dynamic constrained optimization problems, in
Jun. 2015. Metaheuristics for Dynamic Optimization. Berlin, Germany: Springer,
[9] J.-Q. Li, Q.-K. Pan, and M. F. Tasgetiren, A discrete artificial bee 2013, pp. 225263.
colony algorithm for the multi-objective flexible job-shop scheduling [33] H. Xiao and J. W. Zu, A new constrained multiobjective optimiza-
problem with maintenance activities, Appl. Math. Model., vol. 38, no. 3, tion algorithm based on artificial immune systems, in Proc. Int. Conf.
pp. 11111132, Feb. 2014. Mechatronics Autom. (ICMA), Harbin, China, 2007, pp. 31223127.
[10] R. Cheng and Y. Jin, A social learning particle swarm optimization [34] H. Xiao and J. W. Zu, Application of artificial immune systems to
algorithm for scalable optimization, Inf. Sci., vol. 291, no. 2, pp. 4360, multiobjective optimization, in Proc. CSME Forum, Calgary, AB,
Jan. 2015. Canada, 2006, pp. 31223127.
[11] L. Tang and X. Wang, A hybrid multiobjective evolutionary algorithm [35] E. Mezura-Montes and C. A. Coello Coello, Constraint-handling in
for multiobjective optimization problems, IEEE Trans. Evol. Comput., nature-inspired numerical optimization: Past, present and future, Swarm
vol. 17, no. 1, pp. 2045, Feb. 2013. Evol. Comput., vol. 1, no. 4, pp. 173194, Dec. 2011.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

14 IEEE TRANSACTIONS ON CYBERNETICS

[36] C.-H. Lin, A rough penalty genetic algorithm for constrained optimiza- Shuqu Qian received the B.S. degree in mathemat-
tion, Inf. Sci., vol. 241, pp. 119137, Aug. 2013. ics and applied mathematics from FuYan Normal
[37] X. Xu, Z. Meng, J. Sun, L. Huang, and R. Shen, A second-order smooth College, Anhui, China, in 2000, and the M.S.
penalty function algorithm for constrained optimization problems, degree in operational research and cybernetics
Comput. Optim. Appl., vol. 55, no. 1, pp. 155172, May 2013. from the School of Guizhou University, Guizhou,
[38] V. V. De Melo and G. Iacca, A modified covariance matrix adap- China, in 2007. He is currently pursuing the Ph.D.
tation evolution strategy with adaptive penalty function and restart degree in control theory and control engineer-
for constrained optimization, Expert Syst. Appl., vol. 41, no. 16, ing with the College of Automatic Engineering,
pp. 70777094, Nov. 2014. Nanjing University of Aeronautics and Astronautics,
[39] T.-M. Chan, K.-F. Man, S. Kwong, and K. Tang, A jumping gene Nanjing, China.
paradigm for evolutionary multiobjective optimization, IEEE Trans. His current research interests includes immune
Evol. Comput., vol. 12, no. 2, pp. 143159, Apr. 2008. algorithm, evolutionary algorithm, dynamic optimization and its application
[40] K. Deb, A. Sinha, P. J. Korhonen, and J. Wallenius, An interactive to power electronics, and mathematical modeling.
evolutionary multiobjective optimization method based on progressively
approximated value functions, IEEE Trans. Evol. Comput., vol. 14,
no. 5, pp. 723739, Oct. 2010. Yongqiang Ye (SM12) received the B.E. and M.S.
[41] M. Zhang, H. Geng, W. Luo, L. Huang, and X. Wang, A novel search degrees from Zhejiang University, Hangzhou, China,
biases selection strategy for constrained evolutionary optimization, in in 1994 and 1997, respectively, and the Ph.D. degree
Proc. IEEE Congr. Evol. Comput. (CEC), Vancouver, BC, Canada, 2006, from Nanyang Technological University, Singapore,
pp. 18451850. in 2004, all in electrical engineering.
[42] L. Ali, S. L. Sabat, and S. K. Udgata, Particle swarm optimisation with He was a Faculty Member with the School of
stochastic ranking for constrained numerical and engineering bench- Information, Zhejiang University of Finance and
mark problems, Int. J. Bio-Inspir. Comput., vol. 4, no. 3, pp. 155166, Economics, Hangzhou, for over four years. He
2012. had also been a Post-Doctoral Fellow with the
[43] L. N. De Castro and F. J. Von Zuben, Artificial immune systems: Department of Electrical Engineering, Lakehead
Part IBasic theory and applications, School Comput. Electr. Eng., University, Thunder Bay, ON, Canada, Department
State Univ. Campinas, So Paulo, Brazil, Tech. Rep. DCA-RT 01/99, of Systems and Computer Engineering, Carleton University, Ottawa,
1999. ON, Canada, and the Department of Mechanical Engineering, Dalhousie
[44] C. A. Janeway, Jr., How the immune system recognizes invaders, Sci. University, Halifax, NS, Canada, respectively. He was a Professor with
Amer., vol. 269, no. 3, pp. 7279, 1993. the College of Automation Engineering, Nanjing University of Aeronautics
[45] G. J. Nossal et al., Life, death and the immune system, Sci. Amer., and Astronautics, Nanjing, China, since 2009. His current research interests
vol. 269, no. 3, pp. 5262, 1993. include pattern recognition, learning and repetitive control, and power elec-
[46] A. Simes and E. Costa, An immune system-based genetic algorithm tronics control. He has authored or coauthored over 30 journal papers.
to deal with dynamic environments: Diversity and memory, in Artificial Mr. Ye served as an Associate Editor for IEEE/ASME AIM 2010,
Neural Nets and Genetic Algorithms. Vienna, Austria: Springer, 2003, CIS-RAM 2011, CCDC 2014, and CCDC 2015.
pp. 168174.
[47] X. Zou, Y. Chen, M. Liu, and L. Kang, A new evolutionary algorithm
for solving many-objective optimization problems, IEEE Trans. Syst., Bin Jiang (SM06) was born in Jiangxi, China, in
Man, Cybern. B, Cybern., vol. 38, no. 5, pp. 14021412, Oct. 2008. 1966. He received the Ph.D. degree in automatic
[48] A. Osyczka and S. Kundu, A new method to solve generalized multicri- control from Northeastern University, Shenyang,
teria optimization problems using the simple genetic algorithm, Struct. China, in 1995.
optim., vol. 10, no. 2, pp. 9499, Oct. 1995. He was a Post-Doctoral Fellow, a Research
[49] N. Srinivas and K. Deb, Muiltiobjective optimization using nondom- Fellow, an Invited Professor, and a Visiting
inated sorting in genetic algorithms, Evol. Comput., vol. 2, no. 3, Professor in Singapore, France, USA, and Canada,
pp. 221248, 1994. respectively. He is currently the Chair Professor
[50] M. Tanaka, H. Watanabe, Y. Furukawa, and T. Tanino, GA-based deci- of Cheung Kong Scholar Program with the
sion support system for multicriteria optimization, in Proc. IEEE Int. Ministry of Education and the Dean of College
Conf. Syst. Man Cybern. Intell. Syst. 21st Cent., vol. 2. Vancouver, BC, of Automation Engineering with the Nanjing
Canada, 1995, pp. 15561561. University of Aeronautics and Astronautics, Nanjing, China. His current
[51] K. Deb, A. Pratap, and T. Meyarivan, Constrained test problems research interests include fault diagnosis, and fault tolerant control and their
for multi-objective evolutionary optimization, in Evolutionary Multi- applications.
Criterion Optimization. Berlin, Germany: Springer, 2001, pp. 284298. Mr. Jiang is the Chair of Control Systems Chapter in the IEEE
[52] Q. Zhang et al., Multiobjective optimization test instances for the CEC Nanjing Section. He currently serves as an Associate Editor or Editorial
2009 special session and competition, School Comput. Sci. Electron. Board Member for several journals such as the IEEE T RANSACTIONS ON
Eng., Univ. Essex, Colchester, U.K., Nanyang Technol. Univ., Singapore, C ONTROL S YSTEMS T ECHNOLOGY, the IEEE T RANSACTIONS ON F UZZY
Tech. Rep. CES-487, 2008, pp. 130. S YSTEMS, the International Journal of Control, Automation and Systems,
[53] E. Zitzler, L. Thiele, M. Laumanns, C. M. Fonseca, and Nonlinear Analysis: Hybrid Systems, the International Journal of Applied
V. G. Da Fonseca, Performance assessment of multiobjective Mathematics and Computer Science, Mathematical Problem in Engineering,
optimizers: An analysis and review, IEEE Trans. Evol. Comput., vol. 7, Acta Automatica Sinica, the Journal of Astronautics. He is a member of
no. 2, pp. 117132, Apr. 2003. the International Federation of Accountants Technical Committee on Fault
[54] K. Nag, T. Pal, and N. R. Pal, ASMiGA: An archive-based steady-state Detection, Supervision, and Safety of Technical Processes.
micro genetic algorithm, IEEE Trans. Cybern, vol. 45, no. 1, pp. 4052,
Jan. 2015.
[55] Q. Zhang, A. Zhou, and Y. Jin, RM-MEDA: A regularity model-based Jianhong Wang received the B.S. degree in math-
multiobjective estimation of distribution algorithm, IEEE Trans. Evol. ematics and applied mathematics from the Jiangsu
Comput., vol. 12, no. 1, pp. 4163, Feb. 2008. Normal University, Xuzhou, China, in 2000, and the
[56] E. Zitzler, Evolutionary Algorithms for Multiobjective Optimization: M.S. degree in operational research and cybernet-
Methods and Applications, vol. 63. Aachen, Germany: Shaker, 1999. ics from the Shanghai Jiaotong University, Shanghai,
[57] C. M. Fonseca, J. D. Knowles, L. Thiele, and E. Zitzler, A tutorial China, in 2007.
on the performance assessment of stochastic multiobjective optimizers, Since 2000, he had been a Faculty Member with
in Proc. 3rd Int. Conf. Evol. Multi-Criterion Optim. (EMO), vol. 216. the School of Science, Nantong University, Nantong,
Guanajuato, Mexico, 2005, p. 240. China. He is currently with the College of Automatic
[58] Q. Zhang, W. Liu, and H. Li, The performance of a new version of Engineering, Nanjing University of Aeronautics and
MOEA/D on CEC09 unconstrained MOP test instances, in Proc. IEEE Astronautics, Nanjing, China. His current research
Congr. Evol. Comput., vol. 1. Trondheim, Norway, 2009, pp. 203208. interests include digital filter design and digital signal processing.

You might also like