1 Introduction

Meta-heuristic algorithms have been very popular in recent years and are frequently used to solve optimization problems. There are many bio-inspired algorithms in the literature, such as PSO (particle swarm optimization) (Higashitani et al. 2006; Kennedy 2011), ABC (artificial bee colony) (Karaboga and Basturk 2007; Kıran and Fındık 2015; Teodorovic 2009), ACO (ant colony optimization) (Azar et al. 2016; Neyoy et al. 2013), GA (genetic algorithm) and GSA (gravitational search algorithm). These optimization algorithms have been applied to many problems, for example optimization of neural networks and fuzzy logic. For example in Johanyák and Papp (2012), Neyoy et al. (2013), Neyoy et al. (2013) and Precup et al. (2014), fuzzy logic is used to adapt some parameters of bio-inspired algorithms, for greater performance and stability. There is also algorithm hybridization to solve multiple optimization problems such as routing, function approximation and route optimization. In this paper, a new meta-heuristic optimization algorithm is proposed. The proposed optimization algorithm is based on the self-defense mechanisms of the plants. The main goal of this proposal is to explore and exploit new meta-heuristic processes that help us solve different problems and compete against traditional algorithms that have already been studied and exploited. The main idea is to create an alternative that can be able to solve complex problems reducing time and computational cost. In the literature, some authors have demonstrated that plants are living organisms that comply with biological physiological processes such as respiration and reproduction, carrying a complex life cycle using different reproduction methods such as pollination and graft . This reproduction processes are used to generate populations of new individuals that reach maturity or may repeat the same cycle, and so on, to avoid the extinction of their species and their predators (Tollsten and Muller 1996; Vivanco et al. 2005). In Caraveo et al. (2015a) and Duffy et al. (2003), the authors have published previous works using the basic ideas of this optimization algorithm applied to the optimization of benchmark mathematical functions for different numbers of dimensions and using different reproduction methods, published results showing that the performance of the algorithm is efficient even being a new algorithm and is in the development stage and improvements (Caraveo et al. 2015b).

The main contribution in this work is the creation of a new optimization algorithm based on self-defense mechanisms of the plants, and in addition, different methods of biological reproduction are also developed as part of this algorithm. In this case, the predator–prey model proposed by Lotka and Volterra is used as the basis for this new proposed algorithm. The main difference of this algorithm with respect to the prey–predator model is that the proposed algorithm has an evolutionary process, where plants develop coping strategies to survive from predators and also have different methods for biological reproduction to conserve this species. In addition, each reproduction method considers different characteristics of the plant to reproduce.

2 Related work

In the literature, there are some published works where the authors use the predatory–prey model, to model problems, but the main difference of our proposal against the existing works is that we propose an optimization algorithm, which is iterative and applying evolution processes to improve the adaptation to the habitat that it belongs. Neyoy et al. (2013) applied the traditional predator prey model to approximate the solution of nonlinear functions; also in Yoshida et al. (2003), the predatory–prey method is used as a prediction model, which would be used in ecology if the evolution of the species were in shorter time cycles. Duan et al. (2013) performed a hybridization of the algorithms of BSO and predator–prey, to control a DC brushless motor. Brain storm optimization (BSO) is a newly developed swarm intelligence optimization algorithm inspired by a human being’s behavior of brainstorming. In Heil and Ton (2008), a case study is presented, about the method of reproduction by grafting in plants. Caraveo et al. (2015b) and Rhoades (1985) propose a new optimization algorithm bio-inspired in the self-defense mechanisms of plants applied to benchmark mathematical functions. The previous above-mentioned work is the one that can be considered most similar to the work proposed in this paper.

2.1 Self-defense of the plants

Defense mechanisms (or coping strategies) are automatic natural processes that protect individuals against external or internal threats in general. In nature, plants are exposed to many invading predators, such as insects, fungi, bacteria and virus (Bennett and Wallsgrove 1994; Berryman 1992; Cruz and González 2008; Pieterse and Dicke 2007). Plants do not have mobility; therefore, their survival depends entirely on their immune system and other strategies or evolutionary adaptation strategies developed to prevent death or extinction of the plants (Laumanns et al. 1998; Paré and Tumlinson 1999; Pieterse and Dicke 2007; Rhoades 1985; Ryan and Jagendorf 1995). This suggests that the defense mechanisms of the plants are very effective to lock or counteract an infection and keep away predators. Additionally, it has been shown that plants are able to react to different stimuli (Wolfe 2000), such as light intensity, quantity and quality of water or the presence of some toxic substances around. Plants have a linear behavior pattern, which acts directly to any external stimulus. When the plant suffers from aggression, it triggers a series of chemical reactions that release substances into the air, which attract the predator’s natural enemies that are attacking the plant (Law and Regnier 1971; Ordeñana 2002; Paré and Tumlinson 1999; Ryan and Jagendorf 1995; Wang and Metzlaff 2005; Wolfe 2000). In Fig. 1, a general diagram of the plant defense process when it detects the presence of an invading organism is presented.

Fig. 1
figure 1

General scheme of the predator attack on plants

In Fig. 1, a general diagram of the self-defense process of the plant is presented for when it detects the attack by a predator, for example insects, bacteria and fungi (Duffy et al. 2003; García-Garrido and Ocampo 2002). In this case, a plant releases a series of chemical reactions and the products are released into the air; this attracts different types of insects, such as pollinating insects to achieve the reproduction before death and preserve their species against extinction. These can also be insects like seed dispensers, or the natural enemy of the predator that is attacking the plant. In nature, the plants have different methods of biological reproduction, for example pollination, graft and cloning, these are some of the most common methods of reproduction, and the methods are described in more detail below:

Graft A method of vegetative reproduction of plants, where a portion of tissue extracted from a plant is inserted into another, in order that both grow as a single organism and share their features (Heil and Ton 2008). The graft method of reproduction is possible only between species of plants belonging to the same species, so that their tissues can be compatible and ensure the survival of the species, and this method is illustrated in Fig. 2.

Fig. 2
figure 2

Biological reproduction method graft

In Fig. 2, we find a graphical representation of the graft method of vegetative reproduction, where a fragment is taken from one plant and inserted into another plant and that automatically starts a process of merging between the two tissues to grow as a single plant and inheriting their different characteristics.

Cloning In a biological sense, cloning is realized by obtaining genetically identical individuals. Also in nature, there are clones; from the descendants of those organisms that reproduce asexually, plants can be propagated from a fragment of the plant. This method of biological reproduction allows the best plants or individuals to reproduce and preserve their characteristics, which are then inherited to other generations. Figure 3 illustrates the cloning process.

Fig. 3
figure 3

Biological reproduction cloning method

In Fig. 3, an illustration of the reproductive cloning method is presented, and this method allows providing the next generation the best genes and characteristics of plants that can be preserved throughout time.

Pollination Pollination is a biological reproduction method used by plants to send grains of pollen from one plant (flower) to another plant (flower). In order for this process to be performed, it depends on several factors, and in this case the most common are:

Pollination by insects (biotic) This process of reproduction is totally dependent on birds and insect pollinators; in fact, pollination is more common using bees; when a bee visits a plant to collect honey, it also collects pollen and this pollen is transported to the following plants the bee visits on its way in search for food. This process is also performed by other insects such as butterflies, bats, ants and other animals (Yang 2012, 2009; Yoshida et al. 2003). In Fig. 4, we can find an illustration of the process of pollination by insects, where an insect randomly decides to visit neighboring plant.

Fig. 4
figure 4

Reproduction method by pollination

Pollination by air (abiotic) In this case, the pollen produced by plants is transported to other locations using air currents, and in this case the air is totally responsible for carrying the pollen from one flower to another flower (Yang 2012).

3 The predator prey model

The Lotka–Volterra equations, also known as the predator–prey equations, are a pair of first-order, nonlinear, differential equations frequently used to describe the dynamics of biological systems in which two species interact, one as the predator and the other as the prey. The populations change through time according to the following pair of equations (Berryman 1992; Caraveo et al. 2015b; Xiao and Chen 2001):

$$\begin{aligned} \frac{\hbox {d}x}{\hbox {d}t}= & {} \alpha x-\beta xy \end{aligned}$$
(1)
$$\begin{aligned} \frac{\hbox {d}y}{\hbox {d}t}= & {} -\delta xy+\lambda y \end{aligned}$$
(2)

Equation (1) represents the population growth of plants in the absence of predators. Equation (2) represents the decrease in predator population in the absence of plants at time t.

where

  • x :  is the number of prey (for example, plants)

  • y is the number of some type of predator (for example, insects)

  • \(\frac{\hbox {d}x}{\hbox {d}t}\) and \(\frac{\hbox {d}y}{\hbox {d}t}\)represent the growth rates of the two populations over time

  • t :  represents time

    • \(\alpha \): Represents the birth rate of plants in the absence of predators

    • \(\beta \): Represents the death rate of predators in the absence of plants.

    • \(\delta \): Measures the susceptibility of plants.

    • \(\lambda \): Measures the ability of predation.

Table 1 Description and performed operations by the proposed meta-heuristic

4 Proposed method

In this paper, we propose a new optimization method, which is bio-inspired on the self-defense process of plants in nature. This new algorithm is created with the aim of solving complex optimization problems with a minimal computer use and reducing runtime of the algorithm. For the development of the proposed algorithm, the predator prey model proposed by Lotka–Volterra was used as the main theoretical basis. As explained in Sect. 2, plants are able to react to different stimuli, such as air, sun, water, darkness and threats by different predators, such as providing shelter for other animals to protect them from different predators that feed on them (Berryman 1992; Caraveo et al. 2015a). In Fig. 4, we find in more details on the procedure that the algorithm performs internally in the proposed approach.

The description of the stages and operations of the algorithm is presented in Table 1

In Fig. 5, a general diagram of the algorithm and operations is presented; also the biological representation of the reproduction used in this proposal is presented.

In Fig. 6, an illustration is presented, where we can observe the traditional predator prey model and the approach proposed by the authors in this work, and as we can notice, we are focusing on the population of prey. In this case, plants are subject of an evolution process, to develop their confrontation techniques, and for this process it is necessary to apply some biological operators as shown in Fig. 6.

4.1 Biological reproduction method and proposed approach

This section describes in more detail the internal representation of the reproduction methods, in the proposed algorithm.

Reproduction method by the graft process in this case, a stem of a plant is used in another plant to generate an alteration of its structure.

In the previous session, the method of reproduction by graft was described, this method is one of the most used, and it allows us to preserve the best characteristics of an individual and inherit to the future generations of new plants. In Fig. 7, a general diagram of the process performed in nature and the internal process of the algorithm (our proposal) is presented. The plant with higher fitness value of the population is obtained, and then, a second plant is taken from the population, in this case one of the plants with a low fitness value. Both plants are combined to improve the characteristics of the plant with lower fitness value, with a probability \(p\left( x \right) \in \left[ {0,1} \right] \), and a local or global graft is determined. A global graft consists in inserting some of the best characteristics of the plant in all the subpopulation, and a local graft consists in inserting characteristics of the best plant only in another plant; it is also called a local search and global search, all this with the purpose of maintaining a better balance between exploitation and exploration in the proposed algorithm. In the following paragraph, the method of biological reproduction by pollination is described.

Reproduction method by the Pollination process The transport of pollen is performed by air or by animals. The plants produce millions of grains of pollen that are transported to other plants in the air. In the case of animals, the plants attract insects and birds using flower colors, producing nectar, or producing volatile pollen that is transported by air, and in Fig. 8 a representation of the natural process and the proposal is presented.

Fig. 5
figure 5

Flowchart of the proposed approach

Fig. 6
figure 6

General illustration of the proposal

Fig. 7
figure 7

Graft reproduction method

Fig. 8
figure 8

Pollination reproduction method

In Fig. 8, a general diagram is presented of the process performed in nature and the process of the proposed method, the plant with greater fitness value, is selected to pollinate other plants as shown; then, a second plant is taken from the population.

In this case, the plant with higher fitness value is used to pollinate neighboring plants, with a probability \(p(x)\in [{0,1}]\); then, it is determined whether the pollinating insect visits plants that have lower or higher distance from its current value; for this reproduction method, we are using as a basis the Levy flights (Waser et al. 1996; Yang 2010) as shown in Fig. 9.

Lévy flights, named in honor of French mathematician Paul Pierre Lévy, are a type of random walk where the length of the jumps is distributed according to a probability of distribution (Yang 2009, 2012). In this case for each pollinator insect, a Levy flight is assigned and the length of the pollinating insect flight is determined with a certain probability, this in order to maintain a better balance between exploitation and exploration in the proposed algorithm. Next the reproduction by cloning method is described (Fig. 10).

Reproduction by the cloning method process The cloning method is a method used to preserve the total characteristics of an individual; in this case, this method is used to preserve the plant with greater fitness value of the population and inherit all the characteristics in the new offspring. In Fig. 10, a general diagram of the original approach and proposed approach is presented.

Fig. 9
figure 9

Levy flight illustration

Fig. 10
figure 10

Reproduction method by Cloning

In Fig. 10, we can find a general scheme of the natural process and internal process of the proposed algorithm. In this case, during the iterations of the algorithm the fitness value of each plant is measured, and the plant with a low fitness value is cloned with the characteristics of the plant with greater fitness value, with a probability \(p\left( x \right) \in \left[ {0,1} \right] ;\) it is determined whether to apply a local or global cloning.

5 Case study

The performance of the proposed algorithm is tested on the benchmark mathematical functions listed below (Johanyák and Papp 2012; Neyoy et al. 2013; Yang 2010). The name and the mathematical definition of the functions used in this work are shown below:

5.1 Powell function

The function is usually evaluated on the hypercube \(\hbox {x}_{i}\in [-4, 5]\), for all \(i = 1, \ldots , d\).

$$\begin{aligned} f(x)= & {} \sum _{i=1}^{d/4} \left[ (x_{4i-3} +10x_{4i-2} )^{2} +5(x_{4i-1} -x_{4i} )^{2}\right. \nonumber \\&\left. +\,(x_{4i-2} -2x_{4i-1} )^{4}+10(x_{4i-3} -x_{4i} )^2\right] \end{aligned}$$
(3)

5.2 Ackley function

The function is usually evaluated on the hypercube \(\hbox {x}_{\mathrm{i}}\in [-32.768, 32.768]\), for all \(i = 1, \ldots , d\), although it may also be restricted to a smaller domain.

$$\begin{aligned}&f(x)=-a\cdot \exp \nonumber \\&\quad \bigg (-b\cdot \sqrt{\frac{1}{n}\sum \nolimits _{i=1}^n {x_i^2 )-\exp (\frac{1}{n}\sum _{i=1}^n {\cos (cx_i ))+a+\exp (1)} }}\nonumber \\ \end{aligned}$$
(4)

5.3 Griewank function

The function is usually evaluated on the hypercube \(\hbox {x}_{\mathrm{i}}\in [-600, 600]\), for all \(i = 1, \ldots , d\).

$$\begin{aligned} f(x)=\sum _{i=1}^d {\frac{x_i^2 }{4000}-\prod _{i=1}^d {\cos } \left( {\frac{x_i }{\sqrt{i}}} \right) +1} \end{aligned}$$
(5)

5.4 Rastrigin function

The function is usually evaluated on the hypercube \(\hbox {x}_{\mathrm{i}}\in [-5.12, 5.12]\), for all \(i = 1, \ldots , d\).

$$\begin{aligned} f(x)=10d+\sum _{i=1}^d {[x_i^2 -10\cos (2\pi x_i )]} \end{aligned}$$
(6)

5.5 Sphere function

The function is usually evaluated on the hypercube \(\hbox {x}_{\mathrm{i}}\in [-5.12, 5.12]\), for all \(i = 1, \ldots , d\).

$$\begin{aligned} f(x)=\sum _{i=1}^n {x_i^2 } \end{aligned}$$
(7)

5.6 Levy function

The function is usually evaluated on the hypercube \(\hbox {x}_{\mathrm{i}}\in [-10, 10]\), for all \(i = 1, \ldots , d\).

$$\begin{aligned} f(x)= & {} \sin ^{2}(\pi \omega _1 )+\sum _{i=1}^{d-1} (\omega _1 -1)^{2}[1+\sin ^{2}(\pi \omega _i +1)]\nonumber \\&+(\omega _d -1)^{2}[1+\sin ^{2}(2\pi \omega _d )] \end{aligned}$$
(8)

5.7 Sum squares function

The function is usually evaluated on the hypercube \(\hbox {x}_{\mathrm{i}}\in [-10, 10]\), for all \(i = 1, \ldots , d\), although this may be restricted to the hypercube \(\hbox {x}_{\mathrm{i}}\in [-5.12, 5.12]\), for all \(i = 1, \ldots , d\).

$$\begin{aligned} f(x)=\sum _{i=1}^n {ix_i^2 } \end{aligned}$$
(9)

5.8 Rotated hyper-ellipsoid function

The function is usually evaluated on the hypercube \(\hbox {x}_{\mathrm{i}}\in [-65.536, 65.536]\), for all \(i = 1, \ldots , d\).

$$\begin{aligned} f(x)=\sum _{i=1}^d {\sum _{j=1}^1 {x_j^2 } } \end{aligned}$$
(10)

5.9 Dixon–Price function

The function is usually evaluated on the hypercube \(\hbox {x}_{\mathrm{i}}\in [-10, 10]\), for all \(i = 1, \ldots , d\).

$$\begin{aligned} f(x)=(x_1 -1)^{2}+\sum _{i=2}^d {i(2x_i^2 -x_{i-1} )^{2}} \end{aligned}$$
(11)

5.10 Zakharov function

The function is usually evaluated on the hypercube \(\hbox {x}_{\mathrm{i}}\in [-5, 10]\), for all \(i = 1, \ldots , d\).

$$\begin{aligned} f(x)=\sum _{i=1}^d {x_i^2 +\left( {\sum _{i=1}^d {0.5ix_i } } \right) ^{2}+\left( {\sum _{i=1}^d {0.5ix_i } } \right) } ^{4} \end{aligned}$$
(12)

6 Simulations

The optimization algorithm is bio-inspired on the self-defense mechanisms of plants, which was initially tested in optimizing benchmark mathematical functions, for the case study described on the previous section. It was tested for a set of 10 mathematical functions, for 30, 50 and 100 dimensions, where the objective value is approximating to zero. The initial sizes of both populations (plants, predators) are defined by the user, the parameters (\({\varvec{\upalpha }}\), \({\varvec{\upbeta }}\), \({\varvec{\uplambda }}\), \({\varvec{\updelta }}\)) are also defined by the user, and for the model of Lotka and Volterra the following parameter values are recommended \(\alpha = 0.4, \beta = 0.37, \lambda = 0.3, \delta = 0.05\). For this problem, the values for the variables are manually moved in the following ranges \(\alpha \), \(\beta \), \(\lambda \) and \(\delta \) and they are in [0, 1], with the purpose of observing the behavior of the algorithm, and determine what values and what ranges are optimal for the proposed algorithm, and the obtained results are shown in Table 2.

Table 2 Experimental results for 30, 50 and 100 dimensions

In Table 2, we can find the results after applying the algorithm to the mathematical functions proposed in this work. In this paper, we decided to show the most significant data for the 30 experiments performed using different methods of reproduction and different numbers of dimensions. The most significant data are: functions, reproduction method, dimensions, best, worst, \({\sigma }\), average. We can notice that the proposed approach demonstrates good performance in some of the proposed functions in this case study, such as Dixon, Rosenbrock and Levy. In these functions, the algorithm performance was low for some numbers of dimensions, but it is observed that when the number of dimensions is high, the algorithm has difficulty to approximate the value of the function to zero. In some experiments, the algorithm achieved very good results but not in others, and this behavior of the algorithm causes a standard deviation value and average very high results. The proposed algorithm is under improvements and adaptations in order to compete against existing algorithms in the literature, with the experiment ranges we find optimal values for the algorithm for this problem. The ranges of the dimensions are as follows: \({{\alpha }}={{[0.3{-}0.7]}}\), \({{\beta }}={{[0.1{-}0.4]}}\), \({{\lambda }}={{[0.2{-}0.3]}}\), \({{\delta }}={{[0.01{-}0.05]}}\), and for these ranges of values found for the dimensions, the algorithm offers us greater stability and balance in the exploration of solutions for this case study.

6.1 Statistical comparison

In summary, in this work we needed to perform the statistical comparison between the performances of the different methods of biological reproduction used in the proposed algorithm. In this statistical comparison, we consider only two methods in the comparison which are the more efficient according to the criteria of the experts. The statistical test used for the comparison is the Z test, whose parameters are defined in Table 3. We applied the statistical test for the case study shown in this paper, giving the following results shown in Table 4. In applying the statistical Z test, with a confidence level of 95%, the alternative hypothesis states that the average of the method of reproduction by pollination is lower than the average of the method of reproduction by graft, and of course the null hypothesis tells us that the average of the method of reproduction by pollination is greater than or equal to the average of the method of reproduction by graft, with a rejection region for all values that fall below level of − 1.645. With a Z value of − 20.696, we can conclude that the pollination reproductions method is more efficient than the method of reproduction by graft. For the function of the sphere and in Table 4, the statistical results for all the functions used in this work are shown.

Table 3 Parameters for the statistical Z test
Table 4 Results of the z statistical test
Table 5 Results of different meta-heuristics

Analyzing the results shown in statistical test, we can notice that the method of reproduction by pollination is more efficient compared with the others for this problem. However, the other proposed methods on some number of iterations found many values near to the minimum values of the function and therefore are efficient, but not the best for this problem. In the previous statistical test, we can find that for the three proposed reproduction methods in this work, the best so far is reproduction by pollination using Levy flights.

In the previous statistical test, we can find that for the three proposed reproduction methods in this work, the best so far is reproduction by pollination using Levy flights. We also consider important to compare the results obtained with our proposal against other studies published in the literature, such as Yang et al. (2014) FPA (flower pollination algorithm), and the results published by the algorithm authors are shown in Table 5.

Table 5 shows the means of the results obtained using the different meta-heuristics of optimization, and we can note that the means of our proposal have managed to compete and be successful in some mathematical functions; it is important to mention that the authors (Yang et al. 2014) do not show enough information of the results to make a statistical comparison. However, we can conclude that the results obtained using the self-defense algorithm of the plants with reproduction by pollination have achieved acceptable results for this case study.

The performance of the proposed optimization meta-heuristic was also tested with the benchmark functions of CEC 2015 (Laumanns et al. 1998). Based on previous publications, the authors recommend using the method of pollination as a reproduction operator, because it has a higher performance. In this test, 30 experiments were performed for the following mathematical functions of Table 6. The evaluation is for 10, 30 variables; for more information of the functions, please review (Laumanns et al. 1998). The main objective of this work is the proposal of a new optimization algorithm that can be used to solve multiple optimization problems.

Table 6 Mathematical functions

In Tables 7 and 8, we can observe the results of 30 experiments for each function, using 10 and 30 dimensions; we consider important to the reader the following information: the worse, best, average and standard deviation values.

Table 7 Results for 10 dimensions
Table 8 Results for 30 dimensions

We can observe that in the experiments it was very difficult to approximate the value of the function to zero. The mathematical functions used are very complex, some are hybrid, multimodal and composite, and this increases the complexity, and therefore, the algorithms have to be more efficient to be able to solve those functions.

To conclude this case study, it is necessary to make a statistical comparison against other published results; the test used is z-test. In Table 9, we can observe the parameters used in this test, and the results obtained with the algorithm of the mechanisms of the plants (MSPA) are compared with iterative hybridization of DE with local search for the CEC’2015 Special Section Large Scale Global Optimization (IHDELS) (Molina and Herrera 2015).

In applying the statistical Z-test, with a confidence level of 95%, the alternative hypothesis says that the average of the proposed method is lower than the average of IHDELS (Molina and Herrera 2015), and of course the null hypothesis tells us that the average of the proposed method is greater than or equal to the average of IHDELS (Molina and Herrera 2015), with a rejection region for all values fall below of − 1.645. In Table 10, we can observe the results of the statistical comparison

Table 9 Parameters for statistical comparison
Table 10 Results of applying the statistical Z test for 30 D

In the table, the statistical results of the proposed method are presented, where the success is observed in some functions presented in comparison with respect to the algorithm of differential evolution (DE) (Molina and Herrera 2015).

7 Conclusions

In this paper, we propose a new optimization meta-heuristic that is bio-inspired on the self-defense mechanisms of plants. This algorithm was created recently, and we have successfully achieved the integration of the predator prey model to the optimization algorithm, and consequently, we adapted some of the commonly methods most used in natural biological reproduction; in this case, the authors are considered to use graft, clone, and pollination using the Levy flights method. The three reproduction methods show acceptable results, and therefore, our proposal exceeds the expectations of the creators of the optimization algorithm. The main objective was to create a stable and efficient algorithm that is able to solve different optimization problems, in order to compete against different existing optimization methods in the literature. We should mention that we found optimal ranges of values for \({\varvec{\alpha }}\), \({\varvec{\beta }}\), \({\varvec{\lambda }}\), \({\varvec{\delta }}\) parameters, for this problem, and also for the mathematical functions of the CEC-2015, the proposal shows an acceptable performance. In this paper, the main contribution was the creation of a new optimization algorithm bio-inspired on the self-defense mechanisms of the plants in nature, with the integration of the predator–prey model and the development of different methods of biological reproduction as internal operators of the proposed algorithm.