You are on page 1of 11

mo

.c
ss
re
dp
or
.w
ar
um
The Whale Optimization Algorithm
hk
Dr. Rajesh Kumar, PhD, PDF (NUS, Singapore)
es
SMIEEE (USA), FIET (UK), FIETE, FIE (I), LMCSI, LMISTE
aj

Professor , Department of Electrical Engineering


rr

Malaviya National Institute of Technology, Jaipur, India,


d

http://drrajeshkumar.wordpress.com
//
s:
tp
ht
About Whale

mo
.c
ss
• They are considered as the biggest mammals in the world.

re
• An adult whale can grow up to 30 m long and 180 t weight.

dp
• Whales are mostly considered as predators.

or
.w
• They never sleep because they have to breathe from the surface

ar
of oceans. In fact, half of the brain only sleeps.

um
• The interesting thing about the whales is that they are
hk
considered as highly intelligent animals with emotion.
es
• According to Hof and Van Der Gucht, whales have common
aj

cells in certain areas of their brains similar to those of human


drr

called spindle cells.


//

• These cells are responsible for judgment, emotions, and social


s:
tp

behaviors in humans.
ht
ht
tp
s:
//
drr
aj
es
hk
um
ar
.w
or
Humpback Whale

dp
re
ss
.c
o m
Humpback Whales

mo
.c
ss
• The most interesting thing about the humpback whales is their

re
special hunting method.

dp
or
• This foraging behavior is called bubble-net feeding method.

.w
• Humpback whales prefer to hunt school of krill or small fishes

ar
um
close to the surface.
• hk
It has been observed that this foraging is done by creating
es
distinctive bubbles along a circle or ‘9’-shaped.
aj
rr

• They captured 300 tag-derived bubble-net feeding events of 9


d

individual humpback whales.


//
s:

• They found two maneuvers associated with bubble and named


tp

them ‘upward-spirals’ and ‘double- loops’.


ht
ht
tp
s:
//
drr
aj
es
hk
um
ar
.w
Encircling Prey

or
dp
re
ss
.c
o m
ht
tp
s:
//
drr
aj
es
hk
um
ar
.w
Encircling Prey

or
dp
re
ss
.c
o m
ht
tp
s:
//
drr
aj
es
hk
um
ar
.w
or
dp
re
ss
.c
o m
Bubble Net Attacking Method
Bubble Net Attacking Method

mo
.c
ss
re
• Shrinking Method

dp
or
Vary “a” and hence “A”

.w
ar
um
• Spiral Updating Method
hk
es
aj
drr
//
s:
tp
ht
ht
tp
s:
//
drr
aj
es
hk
um
ar
.w
Search for Prey

or
dp
re
ss
.c
o m
ht
tp
s:
//
drr
aj
es
hk
um
ar
Pseudo Code

.w
or
dp
re
ss
.c
o m
ht
tp
s:
//
drr
aj
es
hk
um
ar
.w
or
dp
re
ss
.c
o m

You might also like