“…Each researcher executes the chosen technique based on specific analysis and considerations. Some of the algorithms used include Greedy and Additional Greedy for search-based TCP [37], [40], Firefly Algorithm [38], [78], Neural Network Classifier [44], Ant Colony Optimization [55], [70], FAST Algorithm [79], Support Vector Machine/SVM [80], Genetic [42], [59], [76], [81], Fuzzy Expert [77], Dynamic Programming [45], Recommender System [58], Clustering Technique [73], [82], [83], Particle Swarm Optimization [61], Natural Language Processing (NLP) [74], and Bat-inspired Algorithm [48].…”