1. Introduction
Bio-inspired computing refers to a class of optimization algorithms which apply the intelligence of the nature and one of their main applications is the solving of the complex engineering optimization problems [1]. A novel algorithm inspired from the hierarchical organization of the horse herds obtained a Horse Optimization Algorithm (HOA). The modified version of HOA, namely Discrete Binary Horse Optimization Algorithm (DBHOA) [2], was applied in features selection for high dimensional datasets with a case study on smart grid stability classification. The primary objective of this research article is to introduce an algorithm which approaches both the exploration and the exploitation of the search space, is simple to implement.
Some bio-inspired algorithms are better in the exploration of the search space while others are better in the exploitation of the search space. The optimal and one in which the mechanism applied in the changing of the positions of the objects is modified considering the value of the parameter seeking range of the selected dimension [3]. The optimal combination of features maximizing the performance of the classification while minimizing the number of the selected features. However, that approach considers the K-Nearest Neighbor (K-NN) classifier in the definition of the fitness function while in this article the Random Forest (RF) classifier is considered because even if K-NN works very well with multi class datasets, the dataset considered in this article has only two classes and RF is extremely flexible, characterized by high accuracy and deals very well with over fitting. Moreover, The HOA presents the adaptation of the newly introduced algorithm in features selection for high dimensional datasets.

2. General Biology of Horses
In this section the diagrammatic representation below mentioning the main characteristics of the horses which are considered in the development of Horse optimization Algorithm (HOA)

3. Inspiration of HOA

The main inspiration of Horse Optimization Algorithm is the hierarchical organization of the horse herds. Horses have evolved to live in herds. As with many animals that live in large groups, establishment of a stable hierarchical system or “pecking order” is important to reduce aggression and increase group cohesion [4]. This is often, but not always, a linear system. In non-linear hierarchies horse A may be dominant over horse B, who is dominant over horse C, yet horse C may be dominant over horse A. Dominance can depend on a variety of factors, including an individual’s need for a particular resource at a given time. It can therefore be variable throughout the lifetime of the herd or individual animal. Some horses may be dominant over all resources and others may be submissive for all resources. It is important to note, that this is not part of natural horse behavior. It is forced by humans forcing horses to live together in limited space with limited resources [5]. So called “dominant horses” are often horses with dysfunctional social abilities horses. When horses are in a herd, their behavior is hierarchical; the higher-ranked animals in the herd eat and drink first. Low-status animals, that eat last, may not get enough food, and if there is little available feed, higher-ranking horses may keep lower-ranking ones from eating at all [6].
5. Numerical Expression of HOA
A horse herd has a dominant stallion or mare and the hierarchical order of the horses in a herd specifies the priority access to resources [7]. The hierarchy of the horses in a herd is computed in the initial phase of the algorithm considering the fitness values of the horses from that herd. Let as assume herd of k horses and P is a function


6. Advantages of HOA
The advantages of HOA must be adapted to discrete optimization problems prior to its application in features selection for high dimensional data [10].

7. Flowchart of HOA
The below figure represent the flowchart of HOA;

8. Pseudo Code of HOA
The pseudo-code of HOA is presented in figure representation as below;

9. Application of HOA
The application of HOA in a representative engineering problem, namely the classification of the smart grid stability [11]. Even though the analysis of the stability of the smart grids was approached in literature before from different perspectives such as the proposal of a novel delay-adaptive control strategy which enhances the transient stability of the system and the development of a quantitative framework applied in the assessment of the voltage stability in the case of smart power networks, there are relatively few studies which consider the classification of the smart grid stability [12]. However, the prediction of the smart grid stability was approached in where the authors propose a new real-time model order reduction technique for predicting the stability of the smart grid [13]. That method is capable of predicting the limit of the stability, the transient stability and unstable machines [14]. That method was tested on three test systems and the results show that it is practical for large scale power systems [15]. A drawback of that method is that it should be adapted in power networks that are characterized by high penetration of Renewable Energy Sources (RES) and therefore there are still major issues which require further investigation [16].

10. HOA Based Methodology for Smart Grid Stability Classification
The machine learning methodology applied in the classification of the stability of the smart grid is represented in the figure below [17]. The methodology consists of three main steps such as the extraction of the features using the Feature Extraction on basis of Scalable Hypothesis tests (FRESH) algorithm [18], the selection of the features using the discrete binary version of HOA, namely Discrete Binary Horse Optimization Algorithm (DBHOA) [19] and the classification of the stability of the smart grid using an approach based on Random Forest (RF) [20].

Reference
[1]G. Wang, S. Deb and L. Coelho, “Earthworm optimization algorithm: a bio-inspired metaheuristic algorithm for global optimization problems”, International Journal of Bio-Inspired Computation, vol. 1, no. 1, p. 1, 2015. Available: 10.1504/ij bic.2015.10004283.
[2]A. Brabazon, W. Cui and M. O’Neill, “The raven roosting optimisation algorithm”, Soft Computing, vol. 20, no. 2, pp. 525-545, 2015. Available: 10.1007/s00500-014-1520-5 [Accessed 8 October 2020].
[3]A. Shefaei and B. Mohammadi-Ivatloo, “Wild Goats Algorithm: An Evolutionary Algorithm to Solve the Real-World Optimization Problems”, IEEE Transactions on Industrial Informatics, vol. 14, no. 7, pp. 2951-2961, 2018. Available: 10.1109/tii.2017.2779239 [Accessed 8 October 2020].
[4]M. Jain, S. Maurya, A. Rani and V. Singh, “Owl search algorithm: A novel nature-inspired heuristic paradigm for global optimization”, Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1573-1582, 2018. Available: 10.3233/jifs-169452 [Accessed 8 October 2020].
[5]A. Hafez, H. Zawbaa, E. Emary, H. Mahmoud and A. Hassanien, “An innovative approach for feature selection based on chicken swarm optimization”, 2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR), 2015. Available: 10.1109/socpar.2015.7492775 [Accessed 8 October 2020].
[6],, no. 8, pp. 3210-3221, 2016. Available: 10.1007/s11227-016-1631-0 [Accessed 8 October 2020].
[7]K. Lin and Y. Hsieh, “Classification of Medical Datasets Using SVMs with Hybrid Evolutionary Algorithms Based on Endocrine-Based Particle Swarm Optimization and Artificial Bee Colony Algorithms”, Journal of Medical Systems, vol. 39, no. 10, 2015. Available: 10.1007/s10916-015-0306-3.
[8]Z. Wang and J. Wang, “A delay-adaptive control scheme for enhancing smart grid stability and resilience”, International Journal of Electrical Power & Energy Systems, vol. 110, pp. 477-486, 2019. Available: 10.1016/j.ijepes.2019.03.030 [Accessed 8 October 2020].
[9]M. Aldeen, S. Saha and T. Alpcan, “Voltage Stability Margins and Risk Assessment in Smart Power Grids”, IFAC Proceedings Volumes, vol. 47, no. 3, pp. 8188-8195, 2014. Available: 10.3182/20140824-6-za-1003.02102.
[10]A. Shamisa, B. Majidi and J. Patra, “Sliding-Window-Based Real-Time Model Order Reduction for Stability Prediction in Smart Grid”, IEEE Transactions on Power Systems, vol. 34, no. 1, pp. 326-337, 2019. Available: 10.1109/tpwrs.2018.2868850 [Accessed 8 October 2020].
[11]”Advances in Swarm Intelligence”, Lecture Notes in Computer Science, 2014. Available: 10.1007/978-3-319-11857-4 [Accessed 8 October 2020].
[12]”PRICAI 2006: Trends in Artificial Intelligence”, Lecture Notes in Computer Science, 2006. Available: 10.1007/978-3-540-36668-3 [Accessed 8 October 2020].
[13]M. Christ, N. Braun, J. Neuffer and A. Kempa-Liehr, “Time Series FeatuRe Extraction on basis of Scalable Hypothesis tests (tsfresh – A Python package)”, Neurocomputing, vol. 307, pp. 72-77, 2018. Available: 10.1016/j.neucom.2018.03.067 [Accessed 8 October 2020].
[14]N. Macià and E. Bernadó-Mansilla, “Towards UCI+: A mindful repository design”, Information Sciences, vol. 261, pp. 237-262, 2014. Available: 10.1016/j.ins.2013.08.059.
[15]”SPRINGS: Prediction of Protein-Protein Interaction Sites Using Artificial Neural Networks”, Journal of Proteomics & Computational Biology, vol. 1, no. 1, pp. 01-07, 2014. Available: 10.13188/2572-8679.1000001.
[16]”Announcement (Science Direct Article in Press)”, Assessing Writing, vol. 9, no. 1, p. III-IV, 2004. Available: 10.1016/s1075-2935(04)00016-9.
[17]G. Kimura, “A structure editor for abstract document objects”, IEEE Transactions on Software Engineering, vol. -12, no. 3, pp. 417-435, 1986. Available: 10.1109/tse.1986.6312883.
[18]M. Mohd Saudi, A. Abused, B. Taib and Z. Abdullah, “Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization”, Lecture Notes in Electrical Engineering, pp. 739-746, 2014. Available: 10.1007/978-3-319-07674-4_69 [Accessed 12 October 2020].
[19]. Schultz, E.E. and Shumway, Russell. (2001). Incident Response: A Strategic Guide toHandling System and Network Security Breaches, 1st edn., United States of America: NewRiders Publishing.
[20]. Henchiri, O. and Japkowicz, N. (2006). A Feature Selection and Evaluation Schemefor Computer Virus Detection. Proceedings of the Sixth International Conference on Data Mining, 2006. ICDM ’06. Hong Kong: IEEE Xplore, pp. 891.