Next Article in Journal
How Free Swimming Fosters the Locomotion of a Purely Oscillating Fish-like Body
Next Article in Special Issue
Maximization of Power Density of Direct Methanol Fuel Cell for Greener Energy Generation Using Beetle Antennae Search Algorithm and Fuzzy Modeling
Previous Article in Journal
Ring Attractors as the Basis of a Biomimetic Navigation System
Previous Article in Special Issue
Research on Logistics Distribution Center Location Based on Hybrid Beetle Antennae Search and Rain Algorithm
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Binarization of Metaheuristics: Is the Transfer Function Really Important?

by
José Lemus-Romani
1,*,
Broderick Crawford
2,*,
Felipe Cisternas-Caneo
2,
Ricardo Soto
2 and
Marcelo Becerra-Rozas
2
1
Escuela de Construcción Civil, Pontificia Universidad Católica de Chile, Avenida Vicuña Mackenna 4860, Macul, Santiago 7820436, Chile
2
Escuela de Ingeniería Informática, Pontificia Universidad Católica de Valparaíso, Avenida Brasil 2241, Valparaíso 2362807, Chile
*
Authors to whom correspondence should be addressed.
Biomimetics 2023, 8(5), 400; https://doi.org/10.3390/biomimetics8050400
Submission received: 9 August 2023 / Revised: 24 August 2023 / Accepted: 25 August 2023 / Published: 1 September 2023
(This article belongs to the Special Issue Beetle Antennae Search (BAS) Algorithm's Variants and Application)

Abstract

:
In this work, an approach is proposed to solve binary combinatorial problems using continuous metaheuristics. It focuses on the importance of binarization in the optimization process, as it can have a significant impact on the performance of the algorithm. Different binarization schemes are presented and a set of actions, which combine different transfer functions and binarization rules, under a selector based on reinforcement learning is proposed. The experimental results show that the binarization rules have a greater impact than transfer functions on the performance of the algorithms and that some sets of actions are statistically better than others. In particular, it was found that sets that incorporate the elite or elite roulette binarization rule are the best. Furthermore, exploration and exploitation were analyzed through percentage graphs and a statistical test was performed to determine the best set of actions. Overall, this work provides a practical approach for the selection of binarization schemes in binary combinatorial problems and offers guidance for future research in this field.

1. Introduction

In recent years, the optimization of systems has become a fundamental task in various areas of industry and technology. The search for optimal solutions to complex and multidimensional problems is a constant challenge in fields such as engineering, economics, physics, and computer science. In this sense, the application of metaheuristic optimization algorithms has become a valuable tool for finding efficient and effective solutions to these problems. Furthermore, the use of continuous metaheuristics to solve binary problems has become increasingly relevant due to their ability to find optimal solutions in a short period of time [1]. These techniques are capable of efficiently exploring and exploiting the search space, making them ideal for optimization problems in fields such as engineering, data science, and industry. However, it is important to note that the proper selection of parameters and search strategies is essential for obtaining optimal results.
The proposal of this work is to study different sets of actions (combinations of transfer functions and binarization rules) in order to evaluate the impact on the resolution of binary combinatorial problems, where different sets were evaluated in the binarization scheme selection (BSS) proposed in [2], where Q-learning, a machine learning technique, acts as an intelligent selector of binarization schemes.
The no free lunch (NFL) theorem [3] states that there is no single algorithm capable of reaching the optimal solution to all optimization problems. With this, researchers have the motivation to innovate and/or create new algorithms and validate them on different optimization problems with different domains. Tests were carried out with three good metaheuristics (MHs): grey wolf optimization [4], the whale optimization algorithm [5], and the sine cosine algorithm (SCA) [6].
The grey wolf optimizer has been used for example in feature selection [7], clustering applications [8], design and tuning controllers [9], power dispatch problems [10], economic dispatch problems [11], robotics and path planning [12], scheduling [13], and training neural networks [14].
The whale optimization algorithm has been used for example in optimal power flow problems [15], economic dispatch problems [16], electric vehicle charging station locating problems [17], image segmentation [18], feature selection [19], drug toxicity prediction [20], and CO 2 emissions prediction and forecasting [21].
The sine cosine algorithm has been used for example in trajectory controller problems [22], feature selection [23], power management [24], network integration [25], engineering problems [26], and image processing [27].
The main contributions of this work are as follows:
  • Evaluate different sets of transfer functions and binarization rules.
  • Explore the importance of binarization rules compared to transfer functions.
  • Compare the results in three different and complex metaheuristics.
  • Conduct a comprehensive comparison of the results obtained by solving the set covering problem.
The structure of the content in the paper is as follows: In Section 2, a review of the related works on the use of continuous metaheuristics and reinforcement learning in combinatorial binary problems will be presented. In Section 2.1, we will present how continuous metaheuristics solve binary combinatorial optimization problems. In Section 2.4, hybridization between continuous metaheuristics and Q-learning will be presented, where Q-learning acts as an intelligence selector of binarization schemes. In Section 3, the different sets of actions (pairs of transfer functions and binarization rules) to be compared will be presented. In Section 4, the results obtained and the analysis performed will be presented, ending with the final conclusions in Section 5.

2. Related Work

In this section, we will discuss related work on four topics. The first topic is on continuous MHs for solving combinatorial problems, discussed in Section 2.1. To perform work in binary domains, the second topic is two-step techniques, covered in Section 2.2. Additionally, in Section 2.3, we will explain the MH used in this study. Finally, in Section 2.4, we describe the binarization schemes selector (BSS) hybridization technique.

2.1. Continuous Metaheuristics to Solve Combinatorial Problems

The binarization techniques used in continuous MHs involve transferring continuous domain values to binary domains, with the aim of maintaining the quality of moves and generating high-quality binary solutions. While some MHs operate on binary domains without a binary scheme, studies have demonstrated that continuous MHs supported by a binary scheme perform exceptionally well on multiple NP-hard combinatorial problems [1]. Examples of such MHs include the binary bat algorithm [28,29], particle swarm optimization [30], binary sine cosine algorithm [2,31,32,33], binary salp swarm algorithm [34,35], binary grey wolf optimizer [32,36,37], binary dragonfly algorithm [38,39], the binary whale optimization algorithm [2,32,40], and the binary magnetic optimization algorithm [41].
In the scientific literature, two main groups of binary schemes used to solve combinatorial problems can be identified. The first group refers to operators that do not cause alterations in the operations related to different elements of the MH. Within this group, two-step techniques stand out as the most widely used in recent years, as they are considered to be the most efficient in terms of convergence and their ability to find optimal solutions. These techniques are based on modifying the solution in the first step and discretizing it into a 0 or a 1 in the second step [42]. In addition, the angle modulation technique is also used in this group as it has been shown to be effective in solving combinatorial problems [43].
On the other hand, the second group of binary schemes includes methods that alter the normal operation of an MH. For example, the quantum binary approach, which is based on the application of quantum mechanisms to solve combinatorial problems [44]. In addition, also included in this group are set-based approaches, which focus on the selection of solution sets to improve the efficiency of the MH. Finally, clustering-based techniques, such as the k-means approach [45,46], are also considered in this second group, as they modify the normal operation of the MH to improve its ability to find optimal solutions.

2.2. Two-Step Techniques

In the scientific community, two-step binarization schemes are very relevant [1]. They have been widely used to solve a variety of combinatorial problems [47]. As the name suggests, this binarization scheme consists of two stages. The first stage involves the application of a transfer function [30], which transfers the values generated by the continuous MH to a continuous interval between 0 and 1. The second stage consists of the application of a binarization rule, which discretizes the numbers within that interval into binary values. This technique has been shown to be effective in solving combinatorial problems, since it allows the quality moves of the continuous MH to be preserved, while generating high-quality binary solutions.

2.2.1. Transfer Function

In 1997, Kennedy et al. [48] introduced transfer functions in the field of optimization. Their main advantage is that they provide a probability between 0 and 1 with low computational cost. There are several types of transfer functions, including those in the form of an S [30,49] and a V [50], as well as in the forms of O, Z, X, Q, and U, among others. These functions are used to transfer values generated by the continuous MH to a continuous interval between 0 and 1, allowing the quality movements of the continuous MH to be preserved while high-quality binary solutions are generated. The families of transfer functions we have used in this work can be seen in Table 1 and Table 2 and Figure 1 and Figure 2. The notation d w j observed in Table 1 and Table 2 corresponds to the continuous value of the j-th dimension of the w-th individual resulting from the perturbation performed by the continuous metaheuristic.
It is important to note that no transfer function is superior to the others in all cases in which they have been used, since according to the “no free lunch” theorem there is no universal optimization algorithm that is better than the others in all situations. Therefore, due to this theorem we have room for experimentation and analysis of new optimization algorithms.
On the other hand, different researchers [38,55,56,57] incorporated a parameter to these transfer functions, thus developing time-varying transfer functions. This parameter varies iteration by iteration, thus generating a new transfer function. For example, in [38], the parameter the authors incorporate is defined as follows:
τ = 1 t T · τ m a x + t T · τ m i n
This parameter τ is added to the transfer functions of the S-shaped and V-shaped family. Table 3 shows the new time-varying transfer functions equation proposed by the authors and Figure 3 shows the results of running 100 iterations of each time-varying transfer function.

2.2.2. Binarization Rule

The process of binarization involves converting continuous values into binary values, that is, values of 0 or 1. In this context, binarization rules are applied to the probability obtained from the transfer function to obtain a binary value. There are various different techniques described in the scientific literature [58] that can be utilized for this binarization process. Some of these techniques are illustrated in Table 4, and can vary depending on the context and specific project needs. It is crucial to consider appropriate use of the binarization technique to obtain accurate and reliable results.
The notation X w j observed in Table 4 corresponds to the j-th dimension binary value of the w-th current individual and X B e s t j corresponds to the j-th dimension binary value of the best solution.

2.3. Metaheuristics

Metaheuristics are general-purpose algorithms that provide good solutions in a reasonable time. The search process consists of balancing the diversification and intensification phases by means of operators specific to each algorithm [59]. Exploration aims to find tentative regions with good solutions and exploitation intensifies the search for the best regions to try to find better solutions.
Human behavior, genetic evolution, social behavior of animals, and physical phenomena are some of the main sources of inspiration for the authors, and every year new metaheuristics are developed based on the no free lunch theorem [3]. This theorem tells us that there is no supreme algorithm that solves all optimization problems.
In general, metaheuristics are designed and used to solve continuous optimization problems. In the following sections, we will present a brief summary of the three metaheuristics that have been used in this study with the aim of providing a background as to how the metaheuristic works; for more information see the seminal manuscripts.

2.3.1. Sine Cosine Algorithm

The sine cosine algorithm (SCA) was proposed by Mirjalili [6]. This metaheuristic has two main equations combined into one (Equation (2)) and four main parameters for the position update of the solutions ( r 1 , r 2 , r 3 , and r 4 ). The combined equations used are as follows:
X i t + 1 = X i t + r 1 · s i n ( r 2 ) · | r 3 · X B e s t t X i t | if   r 4 < 0.5 X i t + r 1 · c o s ( r 2 ) · | r 3 · X B e s t t X i t | if   r 4 0.5 ,
where X i t is the position of the current solution in the i-th dimension at the t-th iteration, X B e s t t shows the best individual’s position at the t-th iteration, and r 1 , r 2 , r 3 , and r 4 are random parameters. SCA uses the latter parameters to avoid entrapment in suboptimal solutions and to balance the exploration and exploitation processes.
  • r 1 is a linearly decreasing parameter and is calculated as follows: r 1 = a t a T m a x , where a is a constant, t is the current iteration, and T m a x represents the maximum iterations allowed.
    This parameter conditions the movement of the solution either towards the best solution ( r 1 < 1 ) or away from the best solution ( r 1 > 1 ). The above equation allows for the balance between exploration and exploitation.
  • r 2 has values in the range [ 0 , 2 π ] and determines how big the movement of a solution is towards or away from the destination.
  • r 3 has values in the range [ 0 , 2 ] and is used to assign a weight to the destination, reinforcing or inhibiting the impact of the destination point on the updating process of the other solutions.
  • r 4 , with values in the range [ 0 , 1 ] , is a switch between the sine and cosine functions.

2.3.2. Grey Wolf Optimizer

The grey wolf optimizer (GWO) was proposed by Mirjalili [4], this metaheuristic is inspired by both the hunting behavior and social hierarchy of the grey wolf. Within the pack there are four types of social hierarchy:
  • Alpha ( α ): these are wolves that are at the top of the hierarchy and lead the pack.
  • Beta ( β ): wolves that support the alpha wolves’ decisions.
  • Delta ( δ ): they are strong but lack leadership skills.
  • Omega: they have no power, they are dedicated to follow, help, and protect the younger members of the pack.
Applying the previously described hierarchy, at each step we will denote the best three solutions as alpha, beta, and delta, and the other solutions as omega. Basically, this means that the optimization process follows the flow of the position of the three best wolves in the hierarchy. In addition, the prey will be the optimal solution of the solution.
Most of the logic follows the equations:
X ( t + 1 ) = X p ( t ) A · D
D =   C · X p ( t ) X ( t )
where t denotes the current iteration, A and C are coefficient vectors, X p is the position vector of the prey, and X is the position of the wolf. Finally, the symbol “·” represents a multiplication operator. Vectors A and C are equal to:
A = 2 a · r 1 a
C = 2 r 2
where components of a are linearly decreased from 2 to 0 through iterations and r 1 , r 2 are random vectors with values from [ 0 , 1 ] , calculated for each wolf at each iteration. Vector A controls the trade-off between exploration and exploitation, while C always adds some degree of randomness. This is necessary because our agents can become stuck in local optima and most of the metaheuristics have a way of avoiding this.
Since we do not know the real position of the optimal solution, X p depends on the three best solutions and the formulas for updating each of the agents (wolves) are:
D α =   C 1 · X α X
D β =   C 2 · X β X
D δ =   C 3 · X δ X
X 1 = X α A 1 · D α
X 2 = X β A 2 · D β
X 3 = X δ A 3 · D δ
X ( t + 1 ) = X 1 + X 2 + X 3 3
where X is the current position of the agent and X ( t + 1 ) is the updated one. The formula above indicates that the position of the wolf will be updated according to the best three wolves from the previous iteration. Notice that it will not be exactly equal to the average of the three best wolves because of the vector C which adds a small random shift. This makes sense because, from one side, we want our agents to be guided by the best individuals, but from the other side, we do not want to become stuck in local optima.

2.3.3. Whale Optimization Algorithm

The whale optimization algorithm (WOA) is a metaheuristic that was proposed by Mirjalili and Lewis [5]. Like the GWO, the whale metaheuristic is inspired by a hierarchy and a particular way of hunting called bubble-net hunting. The metaheuristic has three main phases:
(1)
Exploration phase: search for the prey.
(2)
Encircling the prey.
(3)
Exploitation phase: attacking the prey using a bubble-net method.
Based on the three main phases mentioned above, at each step of the exploration to search for the best solution (prey), the search agent (whale) is updated based on a random agent and not on the best. The mathematical model behind this logic is the following:
X ( t + 1 ) = X R a n d A · D
D =   C · X R a n d X
where A and C are coefficient vectors, and X R a n d is a random position vector selected from the current population. Vectors A and C are equal to:
A = 2 a · r a
C = 2 r
where r is a random vector in the range [ 0 , 1 ] and a decreases linearly from 2 to 0 during the iterations. In addition, if A > 1 , then the search agent is forced to move away from a reference whale.
Humpback whales encircle the prey during hunting. Then, they consider the current best candidate solution as the best solution and near the optimal one. In short, here is the model of encircling behavior that is used to update the position of the other whales towards the best search agent:
X ( t + 1 ) = X ( t ) A · D
D =   C · X ( t ) X ( t )
where t is the current iteration, X is the position of the best solution, X refers to the position vector of a solution, and finally, A and C are coefficient vectors, as shown in Equations (16) and (17).
The exploitation phase combines two approaches, shrinking the encircling mechanism and a spiral update of the position mechanism. In the shrinking encircling mechanism, the value of A is random within the interval [ a , a ] , and the value decreases from 2 to 0 as previously stated in Equation (16). In the spiral position update mechanism, we start by calculating the distance between the search agent (whale) and the best solution (prey), the mathematical model that simulates this movement is as follows:
X ( t + 1 ) = D · e b l · cos ( 2 π l ) + X
D = | X X t |
where D represents the distance between the whale and the prey (best solution obtained so far), l is a random number between [ 1 , 1 ] with a uniform distribution, and b is a constant defining the shape of the logarithmic spiral. Finally, the mathematical model that combines the two mechanisms is as follows:
X ( t + 1 ) = X ( t ) A · D If p < 0.5 D · e b l · cos ( 2 π l ) + X If p 0.5
where p is a random number in the range [ 0 , 1 ] and represents the probability of selecting one of these two methods to update the position of the whales.

2.4. Hybridization: Binarization Schemes Selector

In the literature, there are several related works on binarization [30,42] that have laid the groundwork for investigations into this domain problem, as there are several practical applications where working in binary domains is necessary. Moreover, research has emerged on how the change of binarization schemes affects each iteration of the search process, such as time-varying binarization schemes [38] or binarization scheme selectors [2,32,60], where the influence of binarization schemes and their impact at both the problem level and each iteration of the search has been demonstrated.
In Section 2.1, we can see how to adapt a continuous MH so that it can solve binary combinatorial problems. The two-step technique provides us with different possible combinations for binarizing continuous solutions. Although it is desirable to have a wide variety of combinations, each one must be tested individually to determine which is the best for a given problem.
In the literature, various related works have proposed the hybridization of the sine cosine algorithm, grey wolf optimizer, whale optimization algorithm, and Q-learning [2,31,36,40]. Q-learning was used as a dynamic binarization scheme selector in each of the metaheuristics, allowing them to solve binary combinatorial problems. This solution delegates the selection of a good binarization scheme to an artificial intelligence, eliminating any human bias.
The BSS provides a way to dynamically choose the binarization scheme, in this case the combination of transfer functions and binarization rules, within a set of them, using the scheme proposed in [2], where an intelligent operator chooses between a set of actions (possible binarization schemes) by observing the environment (exploration or exploitation).

2.4.1. Actions

The decision of which action to take is a complex task that requires careful evaluation of multiple options in different situations. In this context, Q-learning is utilized, which is a reinforcement learning technique that seeks to determine the best action to take in a specific state. In this work, as in previous studies, we define the considered actions as the existing combinations between the transfer functions (Table 1 and Table 2) and the binarization rules (Table 4). As an example, Figure 4 shows how the possible 40 actions that Q-learning would choose if it were working only with S- and V-type transfer functions and the five defined binarization rules, would be formed.

2.4.2. States

As can be seen in Section 2.3, metaheuristics perform the search process alternating between intensification (exploration) and diversification (exploitation). Previous proposals [2,31,40,60,61] used these phases as the states to use in Q-learning. In these papers, the authors determined the stage of the search process by calculating the population diversity. In particular, they used the diversity proposed by Hussain Kashif et al. [62], which is defined as follows:
D i v = 1 l · n d = 1 l i = 1 n | x ¯ d x i d | ,
where D i v represents the diversity status determination, x ¯ d denotes the mean values of the individuals in dimension d, x i d denotes the value of the i-th individual in dimension d, n denotes the population size, and l denotes the size of the individuals dimension.
If we consider the exploration and exploitation percentages to be X P L % (exploration) and X P T % (exploitation), the percentages X P L % and X P T % are computed from the study of Morales-Castañeda et al. [63] as follows:
X P L % = D i v D i v m a x · 100 ,
X P T % = | D i v D i v m a x | D i v m a x · 100 .
where D i v represents the diversity state determined by Equation (23) and D i v m a x denotes the maximum value of the diversity state discovered throughout the optimization process.

3. The Proposal: Analysis of Different Sets of Actions

Analyzing all the work presented so far and considering what is stated in Section 2.2, we ask ourselves the following questions:
(1)
Which will have more impact on binarization, the transfer function or the binarization rule?
(2)
Will the binarization schemes selector work better with more actions?
To answer these two questions, we apply the scheme proposed in Figure 5. For our analysis we used three continuous metaheuristics, which are SCA, GWO, and WOA. These three metaheuristics solved the set covering problem, a classical combinatorial optimization problem that will be defined in Section 4.1. Since it is a combinatorial problem and the chosen metaheuristics solve continuous problems, it is necessary to binarize the solutions.
As noted in Section 2.2, we have different ways of binarizing. On the other hand, Section 2.4 explains hybridizations where machine learning techniques are used to select binarization scheme dynamically.
We use the hybridization proposed in Section 2.4 as it allows us to evaluate how well a machine learning technique performs against different sets of actions.
In other words, we analyzed different combinations between four families of transfer functions (S-shaped, V-shaped, X-shaped, and Z-shaped) and the five binarization rules were carried out. Fourteen different action sets will be analyzed. First, a total of five sets with eight actions will be formed, where the S-shaped and V-shaped families will be used as transfer functions and the binarization function will be fixed in each set. Secondly, another five sets with 18 actions will be formed, where the S-shaped, V-shaped, X-shaped, and Z-shaped families will be used as transfer functions and the binarization function will be fixed in each set. Thirdly, a set with 40 actions will be formed, replicating the same work presented by the authors in [2,31,36,40]. Finally, a set with 80 actions will be formed, where the S-shaped, V-shaped, X-shaped, and Z-shaped families will be used as transfer functions and all the binarization functions will be used.
We present Table 5, which shows a set of actions analyzed in our study. The table includes 12 sets of actions, labeled as TFBR-1 to TFBR-12, and provides information on their transfer functions and binarization rules. The transfer functions considered are S-shaped, V-shaped, X-shaped, and Z-shaped, while the binarization rules used are standard, complement, static probability, elitist, and roulette elitist. The last column of the table reports the amount of actions associated with each set. The sets differ in terms of the combination of transfer functions and binarization rules used, and the number of actions considered. Table 5 serves as a reference for the subsequent experiments, in which we evaluate the performance of different algorithms on each set of actions.
The experimental results are presented in Section 4. In particular, in Section 4.2, the results obtained in each algorithm executed will be observed. Section 4.3 will analyze the convergence of each algorithm executed. In Section 4.4, we will analyze the exploration and exploitation behavior of each algorithm executed thanks to Equations (24) and (25). Finally, in Section 4.5, we will analyze the statistical test performed where all the executed versions are compared.

4. Experimental Results

To evaluate the performance of the proposed algorithms, the test cases of the set covering problem proposed in Beasley’s OR-Library [64] were used. In particular, 45 instances of this problem were solved. The algorithms were developed using the Python 3.7 programming language and executed using the free Google Colaboratory services [65]. The results obtained were stored and processed through databases provided by Google Cloud Platform.
Following recommendations from the literature [58], 40,000 calls were made to the objective function in each run. To achieve this, a population of 40 individuals and 1000 iterations were used across all GWO, SCA, and WOA runs. Thirty-one independent runs were performed for each instance. As for the parameters used for GWO, SCA, WOA, and Q-learning, they are detailed in Table 6.

4.1. Set Covering Problem

The set covering problem (SCP) is a classic NP-hard combinatorial optimization problem [66] and consists of finding the set of elements with the lowest cost that meets a certain amount of needs. The objective function of the problem is as follows:
A = a 11 a 12 a 1 n a 21 a 22 a 2 n a m 1 a m 2 a m n
M i n i m i z e Z = j = 1 n c j x j
Subject to the following restrictions:
j = 1 n a i j x j 1 i I x j { 0 , 1 } j J
where A is a binary matrix of size m rows and n columns and a i j { 0 , 1 } is the value of each cell in the matrix A. i and j are the sizes of the m rows and n columns. In the event that column j satisfies a row i, then a i j is equal to 1, otherwise it is 0. In addition, it has an associated cost c C , where C = { c 1 , c 2 , , c n } , together with i = { 1 , 2 , , m } and j = { 1 , 2 , , n } , which are the sets of rows and columns, respectively. Finally, x corresponds to the area to be covered.
The mathematical model of the set covering problem is explained in more detail in [67]. This problem formulation has inspired the modeling of different real-world problems such as airline and bus crew scheduling [68], the location of gas detectors for industrial plants [69], plant location selection [70], the location of emergency services [71], dynamic vehicle routing problems [72], the location of electric vehicle charging points in California [73], disaster management systems [74], emergency humanitarian logistics [75], the optimal UAV locations for the purpose of generating wireless communication networks in disaster areas [76], among others.
These studies allow us to appreciate the importance of solving this problem with optimization techniques that guarantee good results.

4.2. Summary of Results

This section will present an analysis of the results obtained using the three metaheuristics. Table 7, Table 8 and Table 9 display the relative percentage deviation (RPD) between the optimum and the best result obtained for 45 instances of the set covering problem using GWO, SCA, and WOA, respectively, with 12 different action sets. The RPD is defined in Equation (29), and the values of the RPD are grouped into four ranges. The first range corresponds to a deviation of 0%, the second range to a deviation of more than 0% up to 3%, the third range to a deviation of more than 3% up to 5%, and the last range corresponds to a deviation greater than 5%. The 12 different combinations are called TFBR-1 to TFBR-12, and the values shown in the table are the number of instances for each MH and evaluated combination that are within the RPD range indicated in each row.
The table presents thirteen columns, the first column indicates the four different RPD ranges and from column two to column thirteen indicates for each algorithm executed the number of instances whose RPD obtained is within the range.
RPD = 100 · B e s t O p t O p t .
Table 10 and Table 11 show the results obtained with the twelve sets applied to the grey wolf optimizer (GWO). Table 12 and Table 13 show the results obtained with the twelve sets applied to the sine cosine algorithm (SCA). Table 14 and Table 15 show the results obtained with the twelve sets applied to the whale optimization algorithm (WOA).
For all tables, the first column indicates the name the OR-Library instances solved (Inst.), the second column the optimal value known for each of these instances (Opt.), the following three columns are repeated for each executed set. The first one indicates the best result obtained for the 31 independent runs, the second one indicates the average of the 31 results obtained, and the third one indicates the RPD.

4.2.1. Analysis of the Results Obtained with Grey Wolf Optimizer

As can be seen in Table 7, only five sets achieved an RPD = 0 , i.e., reached the known optimum. In particular, TFBR-5 achieved this in 12 instances, TFBR-6 as well as TFBR-11 and TFBR-12 achieved this in 8 instances, and TFBR-10 achieved this in one instance.
For RPD ] 0 , 3 ] , all sets achieved fitness in this range. In particular, TFBR-12 as well as TFBR-11 achieved this in 33 instances, TFBR-6 achieved this in 32 instances, TFBR-5 achieved this in 30 instances, TFBR-10 achieved this in 25 instances, TFBR-1 achieved this in 20 instances, TFBR-4 as well as TFBR-7 achieved this in 13 instances, TFBR-9 achieved this in 7 instances, and TFBR-2 as well as TFBR-3 and TFBR-8 achieved this in 1 instance.
For RPD ] 3 , 5 ] , all polls achieved fitness in this range. In particular, TFBR-7 achieved this in 17 instances, TFBR-1 as well as TFBR-9 achieved this in 11 instances, TFBR-4 achieved this in 10 instances, TFBR-10 achieved this in 8 instances, TFBR-3 achieved this in 6 instances, TFBR-6 achieved this in 5 instances, TFBR-11 as well as TFBR-12 achieved this in 4 instances, TFBR-2 as well as TFBR-5 achieved this in 3 instances, and TFBR-8 achieved this in 2 instances.
Finally, for RPD > 5 , only eight sets achieved fitness in this range. In particular, TFBR-8 achieved this in 42 instances, TFBR-2 achieved this in 41 instances, TFBR-3 achieved this in 38 instances, TFBR-9 achieved this in 27 instances, TFBR-4 achieved this in 22 instances, TFBR-7 achieved this in 15 instances, TFBR-1 achieved this in 14 instances, and TFBR-10 achieved this in 11 instances.
Table 16 shows a ranking of the best sets of actions considering only the RPD obtained. From this table, the first and second best sets include the elitist binarization rule (TFBR-5: S-shaped and V-shaped × elitist and TFBR-11: S-shaped, V-shaped, X-shaped, and Z-shaped × elitist) and the third and fourth best sets include the roulette elitist binarization rule (TFBR-12: S-shaped, V-shaped, X-shaped, and Z-shaped × roulette elitist and TFBR-6: S-shaped and V-shaped × roulette elitist).
On the other hand, the worst and second worst sets include the standard binarization rule (TFBR-8: S-shaped, V-shaped, X-shaped, and Z-shaped × standard and TFBR-2: S-shaped and V-shaped × standard) and the third and fourth worst sets include the complement binarization rule (TFBR-3: S-shaped and V-shaped × complement and TFBR-9: S-shaped, V-shaped, X-shaped, and Z-shaped × complement).
In terms of the number of actions in each set, the best sets have 8 and 16 actions. In contrast, the sets with the most actions (TFBR-1 with 40 actions and TFBR-7 with 80 actions) are in the middle of the ranking.
Looking at these results, we can see that the binarization rule has a greater impact than the transfer functions. Moreover, increasing the number of actions does not imply better results.

4.2.2. Analysis of the Results Obtained with Sine Cosine Algorithm

As can be seen in Table 8, only five sets achieved a RPD = 0 , i.e., reached the known optimum. In particular, TFBR-6 achieved this in seven instances, TFBR-5 as well as TFBR-11 and TFBR-12 achieved this in six instances, and TFBR-7 achieved this in one instance.
For RPD ] 0 , 3 ] , only eight sets achieved fitness in this range. In particular, TFBR-12 as well as TFBR-5 and TFBR-6 achieved this in 33 instances, TFBR-11 achieved this in 31 instances, TFBR-7 as well as TFBR-9 achieved this in 14 instances, TFBR-1 achieved this in 13 instances, and TFBR-3 achieved this in 9 instances.
For RPD ] 3 , 5 ] , only eight sets achieved fitness in this range. In particular, TFBR-7 achieved this in 21 instances, TFBR-1 achieved this in 16 instances, TFBR-9 achieved this in 10 instances, TFBR-11 achieved this in 7 instances, TFBR-5 as well as TFBR-12 achieved this in 5 instances, TFBR-6 achieved this in 4 instances and TFBR-3 achieved this in 1 instance.
Finally, for RPD > 5 , all sets achieved fitness in this range. In particular, TFBR-2 as well as TFBR-4, TFBR-8, and TFBR-10 achieved this in 45 instances, TFBR-3 achieved this in 44 instances, TFBR-9 achieved this in 21 instances, TFBR-1 as well as TFBR-1 achieved this in 16 instances, TFBR-5 as well as TFBR-6, TFBR-11, and TFBR-12 achieved this in 1 instance.
Table 17 shows a ranking of the best sets of actions considering only the RPD obtained. From this table, the best set includes the roulette elitist binarization rule (TFBR-6: S-shaped and V-shaped × roulette elitist), the second best set includes the elitist binarization rule (TFBR-5: S-shaped and V-shaped × elitist), the third best set also includes the roulette elitist binarization rule (TFBR-12: S-shaped, V-shaped, X-shaped, and Z-shaped × roulette elitist), and the fourth best set also includes the elitist binarization rule (TFBR-11: S-shaped, V-shaped, X-shaped, and Z-shaped × elitist).
On the other hand, the worst set includes the static probability binarization rule (TFBR-10: S-shaped, V-shaped, X-shaped, and Z-shaped x static probability), the second worst set includes the standard binarization rule (TFBR-8: S-shaped, V-shaped, X-shaped, and Z-shaped × standard), the third worst set also includes the static probability binarization rule (TFBR-4: S-shaped and V-shaped × static probability), and the fourth worst set also includes the standard binarization rule (TFBR-2: S-shaped and V-shaped × standard).
In terms of the number of actions in each set, the best sets have 8 and 16 actions. In contrast, the sets with the most actions (TFBR-1 with 40 actions and TFBR-7 with 80 actions) are in the middle of the ranking.
Looking at these results, we can see that the binarization rule has a greater impact than the transfer functions. Moreover, increasing the number of actions does not imply better results.

4.2.3. Analysis of the Results Obtained with Whale Optimization Algorithm

As can be seen in Table 9, only six sets achieved an RPD = 0 , i.e., reached the known optimum. In particular, TFBR-6 achieved this in 10 instances, TFBR-5 achieved this in 8 instances, TFBR-12 achieved this in 7 instances, TFBR-11 achieved this in 6 instances, and TFBR-1 as well as TFBR-9 achieved this in 1 instance.
For RPD ] 0 , 3 ] , only nine sets achieved fitness in this range. In particular, TFBR-5 achieved this in 32 instances, TFBR-11 achieved this in 31 instances, TFBR-6 achieved this in 29 instances, TFBR-12 achieved this in 27 instances, TFBR-7 achieved this in 22 instances, TFBR-9 achieved this in 21 instances, TFBR-1 achieved this in 18 instances, TFBR-2 achieved this in 4 instances, and TFBR-3 achieved this in 1 instance.
For RPD ] 3 , 5 ] , only 10 sets achieved fitness in this range. In particular, TFBR-1 achieved this in 18 instances, TFBR-7 as well as TFBR-9 achieved this in 15 instances, TFBR-12 achieved this in 11 instances, TFBR-11 achieved this in 7 instances, TFBR-6 achieved this in 6 instances, TFBR-5 achieved this in 5 instances, TFBR-4 achieved this in 3 instances, and TFBR-2 as well as TFBR-3 achieved this in 1 instance.
Finally, for RPD > 5 , only nine sets achieved fitness in this range. In particular, TFBR-8 as well as TFBR-10 achieved this in 45 instances, TFBR-3 achieved this in 44 instances, TFBR-4 achieved this in 41 instances, TFBR-2 achieved this in 40 instances, TFBR-1 as well as TFBR-7 and TFBR-9 achieved this in 8 instancesm and TFBR-11 achieved this in 1 instance.
Table 18 shows a ranking of the best sets of actions considering only the RPD obtained. From this table, the best set includes the roulette elitist binarization rule (TFBR-6: S-shaped and V-shaped × roulette elitist), the second best set includes the elitist binarization rule (TFBR-5: S-shaped and V-shaped × elitist), the third best set also includes the roulette elitist binarization rule (TFBR-12: S-shaped, V-shaped, X-shaped, and Z-shaped × roulette elitist), and the fourth best set also includes the elitist binarization rule (TFBR-11: S-shaped, V-shaped, X-shaped, and Z-shaped × elitist).
On the other hand, the worst set includes the static probability binarization rule (TFBR-10: S-shaped, V-shaped, X-shaped, and Z-shaped x static probability), the second worst set includes the standard binarization rule (TFBR-8: S-shaped, V-shaped, X-shaped, and Z-shaped × standard), the third worst set includes the complement binarization rule (TFBR-3: S-shaped and V-shaped × complement), and the fourth worst set also includes the standard binarization rule (TFBR-2: S-shaped and V-shaped × standard).
In terms of the number of actions in each set, the best sets have 8 and 16 actions. In contrast, the sets with the most actions (TFBR-1 with 40 actions and TFBR-7 with 80 actions) are in the middle of the ranking.
Looking at these results, we can see that the binarization rule has a greater impact than the transfer functions. Moreover, increasing the number of actions does not imply better results.

4.3. Convergence Analysis

In this section, a convergence analysis will be presented for each metaheuristic using the 12 sets of actions. Figure 6 shows the 12 convergence graphs for the best execution of the 31 performed using the grey wolf optimizer solving the scp44 instance; Figure 7 shows the 12 convergence graphs for the best execution of the 31 performed using the sine cosine algorithm solving the scpb2 instance; and Figure 8 shows the 12 convergence graphs for the best execution of the 31 performed using the whale optimization algorithm solving the scp65 instance.
For all figures, the x-axis shows the 1000 iterations run and the y-axis shows the best fitness obtained during the optimization process.

4.3.1. Analysis of the Convergence Graphs Using Grey Wolf Optimizer

To analyze the convergence of the 12 sets applied to the GWO, the scp44 instance was used as an example. Table 19 shows the ranking of the algorithms ordered from the best fitness obtained to the worst fitness obtained for the scp44 instance. The global optimum for the scp44 instance is 494.
Analyzing Figure 6e,f,i,k, we can see that the algorithms had a fast convergence but were able to exit them and obtain better results. The sets of actions in these algorithms incorporate the elitist and elitist roulette binarization rules and they are the best-performing sets.
On the other hand, analyzing Figure 6b,c,h, we can see that the algorithms had slow convergence, indicating that they explored more of the search space. The sets of actions in these algorithms incorporate the standard and complement binarization rules and they are the worst-performing sets.
Finally, analyzing Figure 6a,g, we can see that the algorithms had a fast convergence, and from their behavior we can say that they fell into local optima since they did not improve much after convergence. The sets of actions in these algorithms incorporate all of the binarization rules.
Figure 6. Convergence graphs of the best execution obtained for the scp44 instance using GWO.
Figure 6. Convergence graphs of the best execution obtained for the scp44 instance using GWO.
Biomimetics 08 00400 g006
With all of the above analysis we can visualize that the binarization rules have a greater impact than the transfer functions.

4.3.2. Analysis of the Convergence Graphs Using Sine Cosine Algorithm

To analyze the convergence of the 12 sets applied to SCA, the scpb2 instance was used as an example. Table 20 shows the ranking of the algorithms ordered from the best fitness obtained to the worst fitness obtained for the scpb2 instance. The global optimum for the scpb2 instance is 76.
Analyzing Figure 7e,f,k,l, we can see that the algorithms had a fast convergence but were able to exit them and obtained better results. The sets of actions in these algorithms incorporate the elitist and elitist roulette binarization rules and they are the best-performing sets, moreover, the four sets reached the global optimum.
On the other hand, analyzing Figure 7b,d,h,j, we can see that the algorithms had slow convergence, indicating that they explored the search space. The sets of actions in these algorithms incorporate the standard and static probability binarization rules and they are the worst-performing sets, moreover, the four sets performed very poorly, reaching values above 1000.
Finally, analyzing Figure 7a,g, we can see that the algorithms had a fast convergence and from their behavior, we can say that they fell into local optima since they did not improve much after convergence. The sets of actions in these algorithms incorporate all of the binarization rules.
Figure 7. Convergence graphs of the best execution obtained for the scpb2 instance using SCA.
Figure 7. Convergence graphs of the best execution obtained for the scpb2 instance using SCA.
Biomimetics 08 00400 g007
With all of the above analysis, we can visualize that the binarization rules have a greater impact than the transfer functions.

4.3.3. Analysis of the Convergence Graphs Using Whale Optimization Algorithm

To analyze the convergence of the 12 sets applied to WOA, the scp65 instance was used as an example. Table 21 shows the ranking of the algorithms ordered from the best fitness obtained to the worst fitness obtained for the scp65 instance. The global optimum for the scp65 instance is 161.
Analyzing Figure 8e,f,k,l, we can see that the algorithms had a fast convergence but were able to exit them and obtained better results. The sets of actions in these algorithms incorporate the elitist and elitist roulette binarization rules and they are the best-performing sets, moreover, the TFBR-6 set reached the global optimum.
On the other hand, analyzing Figure 8c,d,h,j, we can see that the algorithms had slow convergence, indicating that they explored the search space. The sets of actions in these algorithms incorporate the static probability and complement binarization rules and they are the worst-performing sets.
Finally, analyzing Figure 8a,g, we can see that the algorithms had a fast convergence and from their behavior, we can say that they fell into local optimum since they did not improve much since convergence. The sets of actions in these algorithms incorporate all binarization rules.
Figure 8. Convergence graphs of the best execution obtained for the scp65 instance using WOA.
Figure 8. Convergence graphs of the best execution obtained for the scp65 instance using WOA.
Biomimetics 08 00400 g008
With all the above analysis we can visualize that the binarization rules have a greater impact than the transfer functions.

4.4. Exploration and Exploitation Analysis

In Section 2.4.2, Equations (24) and (25) were presented. The first one indicates the exploration percentages of the search process and the second one indicates the exploitation percentage of the search process. This section will analyze the evolution of the exploration and exploitation percentages obtained in the best execution over the iterations in a given instance. The latter were randomly selected among the most representative of the experiments conducted as it is not possible to present all of them in this document. Nevertheless, all results and the implemented code have been made publicly available at https://github.com/joselemusr/BSS-the-Transfer-Function-really-important, (accessed on 10 August 2023). Figure 9 shows the 12 percentage graphs using the grey wolf optimizer solving the scp44 instance; Figure 10 shows the 12 percentage graphs using the sine cosine algorithm solving scpb2 instance; and Figure 11 shows the 12 percentage graphs using the whale optimization algorithm solving the scp65 instance.
For all figures, the x-axis shows the 1000 iterations run and the y-axis shows the percentage obtained during the optimization process. The exploration percentage is represented by the color blue and the exploitation percentage is represented by the color orange.

4.4.1. Analysis of the Percentage Graphs Using Grey Wolf Optimizer

The instance selected to analyze the behavior of the the grey wolf optimizer is the same as the one selected in Section 4.3.1, i.e., the selected instance is the scp44.
Analyzing Figure 9e,f,k,l we can see that there is a good balance between exploration and exploitation, reaching percentages close to 50%. The set of actions in these algorithms incorporates the elitist and elitist roulette binarization rules. If we recall Table 19, these sets have the best performance.
On the other hand, analyzing Figure 9a–c,g–i we can see that there is a bad balance between exploration and exploitation. In particular, we can observe that the algorithms had high exploration rates throughout the iterations. The set of actions in these algorithms incorporates the elitist and elitist roulette binarization rules and these sets are the ones that presented the worst results.
Finally, analyzing Figure 9d,j we can see that they have high exploitation percentages. The set of actions in these algorithms incorporates the static probability binarization rule. If we consider the results obtained, we can conclude that both algorithms fell into local optima and did not have the ability to exit from it.
From the above, we can conclude that the binarization rules have a greater impact than the transfer functions.

4.4.2. Analysis of the Percentage Graphs Using Sine Cosine Algorithm

The instance selected to analyze the behavior of the sine cosine algorithm is the same as the one selected in Section 4.3.2, i.e., the selected instance is the scpb2.
Analyzing Figure 10e,f,k,l we can see that all four algorithms show a high percentage of exploitation and that even only the first iteration shows some exploration. The set of actions in these algorithms incorporates the elitist and elitist roulette binarization rules. If we recall Table 20, these sets are the ones that had the best results, and they even reached the known global optimum.
On the other hand, analyzing Figure 10a,b,d,g,j we can see that the algorithms do not present a good balance between exploration and exploitation. In particular, they have a very aggressive behavior, where in one iteration they have a high percentage of exploration and in the next iteration they have a high percentage of exploitation. The set of actions in these algorithms incorporates the standard, static probability binarization rules and the algorithms incorporating all the binarization rules are present. Using the fitness values show in Table 20, we can see that aggressive behavior leads to good results in some cases and very good results in others.
Finally, analyzing Figure 10c,i we can see that they have high exploration percentages. Moreover, in most iterations, the algorithms show high exploration percentages. The set of actions in these algorithms incorporates the complement binarization rule. When reviewing Table 20 we can see that they reach acceptable results but when reviewing Table 12 and Table 13 we can see that they present a high average. This indicates that they have a stochastic behavior, providing low confidence.
In conclusion, we can see that the binarization rules have a greater impact than the transfer functions.

4.4.3. Analysis of the Percentage Graphs Using Whale Optimization Algorithm

The instance selected to analyze the behavior of the whale optimization algorithm is the same as the one selected in Section 4.3.3, i.e., the selected instance is the scp65.
Analyzing Figure 11e,f,k,l we can see that all four algorithms show a high percentage of exploitation and that even only the first iteration shows some exploration. The set of actions in these algorithms incorporates the elitist and elitist roulette binarization rules. If we remember Table 21, these sets are the ones that had the best results, and one of them even reached the known global optimum.
On the other hand, analyzing Figure 11a,b,d,g,h,j we can see that the algorithms have an aggressive behavior at the beginning and as the iterations go by they present a more subdued behavior. The set of actions in these algorithms incorporates the standard, static probability binarization rules and the algorithms incorporating all the binarization rules are present. Considering the obtained results visible in Table 21, we can conclude that the algorithms fell into local optima and could not escape from there.
Finally, analyzing Figure 11c we can see that the algorithm presents a high exploration behavior that slowly decreases over the iterations. However, it does not reach high exploitation percentages. On the other hand, analyzing Figure 11i we can see that the algorithm has an explorative behavior that slowly decays until it reaches an exploitative behavior. The set of actions in these algorithms incorporates the complement binarization rule. Considering the obtained results visible in Table 21, we can conclude that they were in local optima and failed to intensify the search.
In conclusion, we can see that the binarization rules have a greater impact than the transfer functions.

4.5. Statistical Test

In order to determine the best action set, the Wilcoxon–Mann–Whitney test was applied. This is a non-parametric test [77] and it is used when the data are independent between samples and the data do not follow a normal distribution. Both characteristics are covered in this work since the data do not come from nature and each run performed was carried out independently of the others. As a sample size, 31 runs were used for each algorithm. The hypothesis used for this statistical test is the following:
H 0 = Algorithm   A Algorithm   B
H 1 = Algorithm   A < Algorithm   B
If the result of the statistical test has obtained a p-value < 0.05, we cannot assume that Algorithm A has a worse performance than Algorithm B, rejecting H 0 .
Table 22 shows the results when comparing the 12 sets of actions applied in the grey wolf optimizer; Table 23 shows the results when comparing the 12 action sets applied in the sine cosine algorithm; and Table 24 show the results when comparing the 12 action sets applied in the whale optimization algorithm. These tables are structured as follows: the first column presents the techniques used (Algorithm A); the following columns present the average p-values of the 45 instances compared with the version indicated in the column title (Algorithm B); if the value of this comparison is greater than 0.05 it is presented as “≥0.05”; when the comparison is against the same version the symbol “-” is presented; and the values have been approximated to the second decimal place
Analyzing the above three tables we can see that TFBR-5, TFBR-6, TFBR-11, and TFBR-12 were statistically better than TFBR-1, TFBR-2, TFBR-3, TFBR-4, TFBR-8, TFBR-9, and TFBR-10.
If we recall Table 5, the TFBR-5 and TFBR-11 sets incorporate the elitist binarization rule and their only difference is that the first set is made up of S-shaped and V-shaped transfer functions while the second set is made up of S-shaped, V-shaped, X-shaped, and Z-shaped transfer functions. On the other hand, the TFBR-6 and TFBR-12 sets incorporate the elitist roulette binarization rule and their only difference is that the first set is made up of the S-shaped and V-shaped transfer functions while the second set is made up of the S-shaped, V-shaped, X-shaped, and Z-shaped transfer functions.
These four sets are statistically better than the sets that incorporate the standard, complement, and static probability binarization rules. Moreover, they are better than those sets where all binarization rules are incorporated.
The fifth and sixth best sets are TFBR-1 and TFBR-7, which are those that include all the binarization rules and their only difference is that the first set is made up of the S-shaped and V-shaped transfer functions while the second set is made up of the S-shaped, V-shaped, X-shaped, and Z-shaped transfer functions.
With this in mind, we can observe that the best sets incorporate at least the elitist binarization rule or elitist roulette binarization rule. From this, we can conclude that the binarization rules have a greater impact than the transfer functions.
Table 25 shows the ranking of the sets by metaheuristic taking into account the statistical test applied. For each metaheuristic we have two columns, the first one refers to the name of the set and the second column refers to the number of times when the set was better than others. It is understood as a winning set when the comparison between them indicates a p-value lower than 0.05 .

4.6. Summary of the Analysis

In Section 3, we presented two research questions which were as follows.
(1)
Which will have more impact on binarization, the transfer function or the binarization rule?
(2)
Will the binarization schemes selector work better with more actions?
If we analyze Table 25, we can see that for the three metaheuristics used in the research the best sets of actions are shown in Table 26.
As can be seen in Table 26, the best action sets are composed of the elitist binarization rule and the elitist roulette binarization rule. Therefore, we can conclude that the binarization rules have a greater impact than the transfer functions and that the intelligent binarization scheme selector does not perform better by incorporating more actions.

5. Conclusions and Outlook

Continuous metaheuristics are a class of evolutionary algorithms that are used to solve combinatorial problems. This makes them a powerful tool for solving binary problems, as they can efficiently explore a large number of possible solutions. However, it is necessary to incorporate intermediate steps to convert continuous solutions to a binary domain. These techniques are also capable of avoiding falling into local optima and finding high-quality solutions in problems with a large number of variables. This work has important implications in industry, as the set covering problem is a key problem in many applications, such as production, logistics, project planning, and resource allocation. Using MH optimization techniques to tackle this problem helps to improve efficiency and reduce costs. Additionally, the proposed approach in this work allows for selecting the best combination of binarization rules and transfer functions for a given problem instance, leading to even better performance.
A proposal is presented to improve the performance of metaheuristic optimization algorithms by using differentiated sets of actions. These sets of actions are composed of combinations of binarization rules and transfer functions. Twelve different sets of actions were proposed and applied to three different metaheuristic optimization algorithms: grey wolf optimizer, sine cosine algorithm, and whale optimization algorithm. These algorithms were applied to 45 different instances of the set covering problem.
The experimental results showed that the sets of actions that incorporate at least one elitist or elitist roulette binarization rule are the best, as they obtained the best results in terms of fitness and were statistically superior to the other sets of actions. Furthermore, it was found that binarization rules have a greater impact on the performance of metaheuristic algorithms than transfer functions. This work has demonstrated the importance of solving combinatorial binary problems using continuous metaheuristic techniques. Through the proposal that selects among a set of actions based on a reinforcement learning technique, it has been possible to improve the results obtained using traditional techniques. Additionally, it has been demonstrated that the elitist and elitist roulette binarization schemes are the most effective compared to the standard, complementary, and static probability schemes. This work opens a new line of research to improve the resolution of combinatorial binary problems using continuous metaheuristic techniques and their hybridization with machine learning techniques.
Conclusively, this study transcends conventional research on the binarization of continuous metaheuristics by not only providing a deeper understanding of this fundamental process but also by pioneering innovative approaches hitherto unexplored in the literature. Through a comprehensive and comparative analysis, we have tangibly illustrated how the judicious selection of transfer functions can make a substantial difference in the effectiveness and precision of binarization in the context of metaheuristics. These distinctively pinpoint contributions establish this study as a prominent reference in the research of this discipline, underscoring its significance in the optimization of continuous algorithms.
Future work could investigate how to use these optimization techniques on coverage problems with additional constraints, such as time or capacity constraints. It would also be interesting to investigate how these techniques behave with other algorithms, such as genetic algorithms and knowledge-based algorithms. Additionally, it would be important to investigate how these optimization techniques can be adapted to real-time coverage problems and how they can be integrated with existing automation systems in industry. In general, this work provides a solid foundation for future research in this area and demonstrates the importance of using optimization techniques in coverage problems.

Author Contributions

F.C.-C., J.L.-R. and M.B.-R.: conceptualization, investigation, methodology, writing—review and editing, project administration, resources, formal analysis. B.C. and R.S.: writing—review and editing, investigation, validation, funding acquisition. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

All the results of this work are available at https://github.com/joselemusr/BSS-the-Transfer-Function-really-important (accessed on 23 May 2023).

Acknowledgments

Broderick Crawford and Ricardo Soto are supported by grant ANID/FONDECYT/REGULAR/1210810. Marcelo Becerra-Rozas is supported by the National Agency for Research and Development (ANID)/Scholarship Program/DOCTORADO NACIONAL/2021-21210740. Felipe Cisternas-Caneo is supported by the National Agency for Research and Development (ANID)/Scholarship Program/DOCTORADO NACIONAL/2023-21230203. Broderick Crawford, Ricardo Soto and Felipe Cisternas-Caneo are supported by grant DI Investigación Asociativa Interdisciplinaria/VINCI/PUCV/039.347/2023.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Becerra-Rozas, M.; Lemus-Romani, J.; Cisternas-Caneo, F.; Crawford, B.; Soto, R.; Astorga, G.; Castro, C.; García, J. Continuous Metaheuristics for Binary Optimization Problems: An Updated Systematic Literature Review. Mathematics 2022, 11, 129. [Google Scholar]
  2. Crawford, B.; Soto, R.; Lemus-Romani, J.; Becerra-Rozas, M.; Lanza-Gutiérrez, J.M.; Caballé, N.; Castillo, M.; Tapia, D.; Cisternas-Caneo, F.; García, J.; et al. Q-learnheuristics: Towards data-driven balanced metaheuristics. Mathematics 2021, 9, 1839. [Google Scholar] [CrossRef]
  3. Ho, Y.; Pepyne, D. Simple explanation of the no-free-lunch theorem and its implications. J. Optim. Theory Appl. 2002, 115, 549–570. [Google Scholar] [CrossRef]
  4. Mirjalili, S.; Mirjalili, S.M.; Lewis, A. Grey wolf optimizer. Adv. Eng. Softw. 2014, 69, 46–61. [Google Scholar] [CrossRef]
  5. Mirjalili, S.; Lewis, A. The whale optimization algorithm. Adv. Eng. Softw. 2016, 95, 51–67. [Google Scholar] [CrossRef]
  6. Mirjalili, S. SCA: A sine cosine algorithm for solving optimization problems. Knowl.-Based Syst. 2016, 96, 120–133. [Google Scholar] [CrossRef]
  7. Emary, E.; Zawbaa, H.M.; Grosan, C.; Hassenian, A.E. Feature subset selection approach by gray-wolf optimization. In Proceedings of the Afro-European Conference for Industrial Advancement, Villejuif, France, 9–11 September 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 1–13. [Google Scholar]
  8. Kumar, V.; Chhabra, J.K.; Kumar, D. Grey wolf algorithm-based clustering technique. J. Intell. Syst. 2017, 26, 153–168. [Google Scholar] [CrossRef]
  9. Eswaramoorthy, S.; Sivakumaran, N.; Sekaran, S. Grey wolf optimization based parameter selection for support vector machines. COMPEL-Int. J. Comput. Math. Electr. Electron. Eng. 2016, 35, 1513–1523. [Google Scholar] [CrossRef]
  10. Li, S.X.; Wang, J.S. Dynamic modeling of steam condenser and design of PI controller based on grey wolf optimizer. Math. Probl. Eng. 2015, 2015, 120975. [Google Scholar] [CrossRef]
  11. Wong, L.I.; Sulaiman, M.; Mohamed, M.; Hong, M.S. Grey Wolf Optimizer for solving economic dispatch problems. In Proceedings of the 2014 IEEE International Conference on Power and Energy (PECon), Kuching, Malaysia, 1–3 December 2014; pp. 150–154. [Google Scholar]
  12. Tsai, P.W.; Nguyen, T.-T.; Dao, T.-K. Robot path planning optimization based on multiobjective grey wolf optimizer. In Proceedings of the International Conference on Genetic and Evolutionary Computing, Denver, CO, USA, 20–24 July 2016; Springer: Berlin/Heidelberg, Germany, 2016; pp. 166–173. [Google Scholar]
  13. Lu, C.; Gao, L.; Li, X.; Xiao, S. A hybrid multi-objective grey wolf optimizer for dynamic scheduling in a real-world welding industry. Eng. Appl. Artif. Intell. 2017, 57, 61–79. [Google Scholar] [CrossRef]
  14. Mosavi, M.R.; Khishe, M.; Ghamgosar, A. Classification of sonar data set using neural network trained by gray wolf optimization. Neural Netw. World 2016, 26, 393. [Google Scholar] [CrossRef]
  15. Bentouati, B.; Chaib, L.; Chettih, S. A hybrid whale algorithm and pattern search technique for optimal power flow problem. In Proceedings of the 2016 8th international conference on modelling, identification and control (ICMIC), Algiers, Algeria, 15–17 November 2016; pp. 1048–1053. [Google Scholar]
  16. Touma, H.J. Study of the economic dispatch problem on IEEE 30-bus system using whale optimization algorithm. Int. J. Eng. Technol. Sci. 2016, 3, 11–18. [Google Scholar] [CrossRef]
  17. Yin, X.; Cheng, L.; Wang, X.; Lu, J.; Qin, H. Optimization for hydro-photovoltaic-wind power generation system based on modified version of multi-objective whale optimization algorithm. Energy Procedia 2019, 158, 6208–6216. [Google Scholar] [CrossRef]
  18. Abd El Aziz, M.; Ewees, A.A.; Hassanien, A.E. Whale optimization algorithm and moth-flame optimization for multilevel thresholding image segmentation. Expert Syst. Appl. 2017, 83, 242–256. [Google Scholar] [CrossRef]
  19. Mafarja, M.M.; Mirjalili, S. Hybrid whale optimization algorithm with simulated annealing for feature selection. Neurocomputing 2017, 260, 302–312. [Google Scholar] [CrossRef]
  20. Tharwat, A.; Moemen, Y.S.; Hassanien, A.E. Classification of toxicity effects of biotransformed hepatic drugs using whale optimized support vector machines. J. Biomed. Inform. 2017, 68, 132–149. [Google Scholar] [CrossRef]
  21. Zhao, H.; Guo, S.; Zhao, H. Energy-related CO2 emissions forecasting using an improved LSSVM model optimized by whale optimization algorithm. Energies 2017, 10, 874. [Google Scholar] [CrossRef]
  22. Banerjee, A.; Nabi, M. Re-entry trajectory optimization for space shuttle using sine-cosine algorithm. In Proceedings of the 2017 8th International Conference on Recent Advances in Space Technologies (RAST), Istanbul, Turkey, 19–22 June 2017; pp. 73–77. [Google Scholar]
  23. Sindhu, R.; Ngadiran, R.; Yacob, Y.M.; Zahri, N.A.H.; Hariharan, M. Sine–cosine algorithm for feature selection with elitism strategy and new updating mechanism. Neural Comput. Appl. 2017, 28, 2947–2958. [Google Scholar] [CrossRef]
  24. Mahdad, B.; Srairi, K. A new interactive sine cosine algorithm for loading margin stability improvement under contingency. Electr. Eng. 2018, 100, 913–933. [Google Scholar] [CrossRef]
  25. Padmanaban, S.; Priyadarshi, N.; Holm-Nielsen, J.B.; Bhaskar, M.S.; Azam, F.; Sharma, A.K.; Hossain, E. A novel modified sine-cosine optimized MPPT algorithm for grid integrated PV system under real operating conditions. IEEE Access 2019, 7, 10467–10477. [Google Scholar] [CrossRef]
  26. Gonidakis, D.; Vlachos, A. A new sine cosine algorithm for economic and emission dispatch problems with price penalty factors. J. Inf. Optim. Sci. 2019, 40, 679–697. [Google Scholar] [CrossRef]
  27. Abd Elfattah, M.; Abuelenin, S.; Hassanien, A.E.; Pan, J.S. Handwritten arabic manuscript image binarization using sine cosine optimization algorithm. In Proceedings of the International Conference on Genetic and Evolutionary Computing, Denver, CO, USA, 20–24 July 2016; Springer: Berlin/Heidelberg, Germany, 2016; pp. 273–280. [Google Scholar]
  28. Mirjalili, S.; Mirjalili, S.M.; Yang, X.S. Binary bat algorithm. Neural Comput. Appl. 2014, 25, 663–681. [Google Scholar] [CrossRef]
  29. Rodrigues, D.; Pereira, L.A.; Nakamura, R.Y.; Costa, K.A.; Yang, X.S.; Souza, A.N.; Papa, J.P. A wrapper approach for feature selection based on Bat Algorithm and Optimum-Path Forest. Expert Syst. Appl. 2014, 41, 2250–2258. [Google Scholar] [CrossRef]
  30. Mirjalili, S.; Lewis, A. S-shaped versus V-shaped transfer functions for binary particle swarm optimization. Swarm Evol. Comput. 2013, 9, 1–14. [Google Scholar] [CrossRef]
  31. Cisternas-Caneo, F.; Crawford, B.; Soto, R.; de la Fuente-Mella, H.; Tapia, D.; Lemus-Romani, J.; Castillo, M.; Becerra-Rozas, M.; Paredes, F.; Misra, S. A Data-Driven Dynamic Discretization Framework to Solve Combinatorial Problems Using Continuous Metaheuristics. In Innovations in Bio-Inspired Computing and Applications; Abraham, A., Sasaki, H., Rios, R., Gandhi, N., Singh, U., Ma, K., Eds.; Springer: Cham, Switzerland, 2021; pp. 76–85. [Google Scholar] [CrossRef]
  32. Lemus-Romani, J.; Becerra-Rozas, M.; Crawford, B.; Soto, R.; Cisternas-Caneo, F.; Vega, E.; Castillo, M.; Tapia, D.; Astorga, G.; Palma, W.; et al. A Novel Learning-Based Binarization Scheme Selector for Swarm Algorithms Solving Combinatorial Problems. Mathematics 2021, 9, 2887. [Google Scholar] [CrossRef]
  33. Taghian, S.; Nadimi-Shahraki, M. Binary Sine Cosine Algorithms for Feature Selection from Medical Data. arXiv 2019, arXiv:1911.07805. [Google Scholar] [CrossRef]
  34. Faris, H.; Mafarja, M.M.; Heidari, A.A.; Aljarah, I.; Ala’M, A.Z.; Mirjalili, S.; Fujita, H. An efficient binary salp swarm algorithm with crossover scheme for feature selection problems. Knowl.-Based Syst. 2018, 154, 43–67. [Google Scholar] [CrossRef]
  35. Tubishat, M.; Ja’afar, S.; Alswaitti, M.; Mirjalili, S.; Idris, N.; Ismail, M.A.; Omar, M.S. Dynamic Salp swarm algorithm for feature selection. Expert Syst. Appl. 2021, 164, 113873. [Google Scholar] [CrossRef]
  36. Tapia, D.; Crawford, B.; Soto, R.; Palma, W.; Lemus-Romani, J.; Cisternas-Caneo, F.; Castillo, M.; Becerra-Rozas, M.; Paredes, F.; Misra, S. Embedding Q-Learning in the selection of metaheuristic operators: The enhanced binary grey wolf optimizer case. In Proceedings of the 2021 IEEE International Conference on Automation/XXIV Congress of the Chilean Association of Automatic Control (ICA-ACCA), Valparaiso, Chile, 22–26 March 2021; pp. 1–6. [Google Scholar] [CrossRef]
  37. Sharma, P.; Sundaram, S.; Sharma, M.; Sharma, A.; Gupta, D. Diagnosis of Parkinson’s disease using modified grey wolf optimization. Cogn. Syst. Res. 2019, 54, 100–115. [Google Scholar] [CrossRef]
  38. Mafarja, M.; Aljarah, I.; Heidari, A.A.; Faris, H.; Fournier-Viger, P.; Li, X.; Mirjalili, S. Binary dragonfly optimization for feature selection using time-varying transfer functions. Knowl.-Based Syst. 2018, 161, 185–204. [Google Scholar] [CrossRef]
  39. Eluri, R.K.; Devarakonda, N. Binary Golden Eagle Optimizer with Time-Varying Flight Length for feature selection. Knowl.-Based Syst. 2022, 247, 108771. [Google Scholar] [CrossRef]
  40. Becerra-Rozas, M.; Lemus-Romani, J.; Crawford, B.; Soto, R.; Cisternas-Caneo, F.; Embry, A.T.; Molina, M.A.; Tapia, D.; Castillo, M.; Misra, S.; et al. Reinforcement Learning Based Whale Optimizer. In Proceedings of the Computational Science and Its Applications—ICCSA 2021, Cagliari, Italy, 13–16 September 2021; Gervasi, O., Murgante, B., Misra, S., Garau, C., Blečić, I., Taniar, D., Apduhan, B.O., Rocha, A.M.A.C., Tarantino, E., Torre, C.M., Eds.; Springer: Cham, Switzerland, 2021; pp. 205–219. [Google Scholar] [CrossRef]
  41. Mirjalili, S.; Hashim, S.Z.M. BMOA: Binary magnetic optimization algorithm. Int. J. Mach. Learn. Comput. 2012, 2, 204. [Google Scholar] [CrossRef]
  42. Crawford, B.; Soto, R.; Astorga, G.; García, J.; Castro, C.; Paredes, F. Putting continuous metaheuristics to work in binary search spaces. Complexity 2017, 2017, 8404231. [Google Scholar] [CrossRef]
  43. Leonard, B.J.; Engelbrecht, A.P.; Cleghorn, C.W. Critical considerations on angle modulated particle swarm optimisers. Swarm Intell. 2015, 9, 291–314. [Google Scholar] [CrossRef]
  44. Zhang, G. Quantum-inspired evolutionary algorithms: A survey and empirical study. J. Heuristics 2011, 17, 303–351. [Google Scholar] [CrossRef]
  45. García, J.; Crawford, B.; Soto, R.; Castro, C.; Paredes, F. A k-means binarization framework applied to multidimensional knapsack problem. Appl. Intell. 2018, 48, 357–380. [Google Scholar] [CrossRef]
  46. García, J.; Moraga, P.; Valenzuela, M.; Crawford, B.; Soto, R.; Pinto, H.; Peña, A.; Altimiras, F.; Astorga, G. A Db-Scan Binarization Algorithm Applied to Matrix Covering Problems. Comput. Intell. Neurosci. 2019, 2019, 3238574. [Google Scholar] [CrossRef]
  47. Saremi, S.; Mirjalili, S.; Lewis, A. How important is a transfer function in discrete heuristic algorithms. Neural Comput. Appl. 2015, 26, 625–640. [Google Scholar] [CrossRef]
  48. Kennedy, J.; Eberhart, R.C. A discrete binary version of the particle swarm algorithm. In Proceedings of the 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation, Orlando, FL, USA, 12–15 October 1997; Volume 5, pp. 4104–4108. [Google Scholar] [CrossRef]
  49. Crawford, B.; Soto, R.; Olivares-Suarez, M.; Palma, W.; Paredes, F.; Olguin, E.; Norero, E. A binary coded firefly algorithm that solves the set covering problem. Rom. J. Inf. Sci. Technol. 2014, 17, 252–264. [Google Scholar]
  50. Rajalakshmi, N.; Padma Subramanian, D.; Thamizhavel, K. Performance enhancement of radial distributed system with distributed generators by reconfiguration using binary firefly algorithm. J. Inst. Eng. (India) Ser. B 2015, 96, 91–99. [Google Scholar] [CrossRef]
  51. Ghosh, K.K.; Singh, P.K.; Hong, J.; Geem, Z.W.; Sarkar, R. Binary social mimic optimization algorithm with x-shaped transfer function for feature selection. IEEE Access 2020, 8, 97890–97906. [Google Scholar] [CrossRef]
  52. Beheshti, Z. A novel x-shaped binary particle swarm optimization. Soft Comput. 2021, 25, 3013–3042. [Google Scholar] [CrossRef]
  53. Guo, S.s.; Wang, J.s.; Guo, M.w. Z-shaped transfer functions for binary particle swarm optimization algorithm. Comput. Intell. Neurosci. 2020, 2020, 6502807. [Google Scholar] [CrossRef]
  54. Sun, W.Z.; Zhang, M.; Wang, J.S.; Guo, S.S.; Wang, M.; Hao, W.K. Binary Particle Swarm Optimization Algorithm Based on Z-shaped Probability Transfer Function to Solve 0–1 Knapsack Problem. IAENG Int. J. Comput. Sci. 2021, 48, 2. [Google Scholar]
  55. Islam, M.J.; Li, X.; Mei, Y. A time-varying transfer function for balancing the exploration and exploitation ability of a binary PSO. Appl. Soft Comput. 2017, 59, 182–196. [Google Scholar] [CrossRef]
  56. Mohd Yusof, N.; Muda, A.K.; Pratama, S.F.; Carbo-Dorca, R.; Abraham, A. Improved swarm intelligence algorithms with time-varying modified Sigmoid transfer function for Amphetamine-type stimulants drug classification. Chemom. Intell. Lab. Syst. 2022, 226, 104574. [Google Scholar] [CrossRef]
  57. Mohd Yusof, N.; Muda, A.K.; Pratama, S.F.; Abraham, A. A novel nonlinear time-varying sigmoid transfer function in binary whale optimization algorithm for descriptors selection in drug classification. Mol. Divers. 2022, 27, 71–80. [Google Scholar] [CrossRef]
  58. Lanza-Gutierrez, J.M.; Crawford, B.; Soto, R.; Berrios, N.; Gomez-Pulido, J.A.; Paredes, F. Analyzing the effects of binarization techniques when solving the set covering problem through swarm optimization. Expert Syst. Appl. 2017, 70, 67–82. [Google Scholar] [CrossRef]
  59. Talbi, E.G. Metaheuristics: From Design to Implementation; John Wiley & Sons: Hoboken, NJ, USA, 2009. [Google Scholar]
  60. Becerra-Rozas, M.; Lemus-Romani, J.; Cisternas-Caneo, F.; Crawford, B.; Soto, R.; García, J. Swarm-Inspired Computing to Solve Binary Optimization Problems: A Backward Q-Learning Binarization Scheme Selector. Mathematics 2022, 10, 4776. [Google Scholar] [CrossRef]
  61. Becerra-Rozas, M.; Cisternas-Caneo, F.; Crawford, B.; Soto, R.; García, J.; Astorga, G.; Palma, W. Embedded Learning Approaches in the Whale Optimizer to Solve Coverage Combinatorial Problems. Mathematics 2022, 10, 4529. [Google Scholar] [CrossRef]
  62. Hussain, K.; Zhu, W.; Mohd Salleh, M.N. Long-Term Memory Harris’ Hawk Optimization for High Dimensional and Optimal Power Flow Problems. IEEE Access 2019, 7, 147596–147616. [Google Scholar] [CrossRef]
  63. Morales-Castañeda, B.; Zaldívar, D.; Cuevas, E.; Fausto, F.; Rodríguez, A. A better balance in metaheuristic algorithms: Does it exist? Swarm Evol. Comput. 2020, 54, 100671. [Google Scholar] [CrossRef]
  64. Beasley, J.; Jørnsten, K. Enhancing an algorithm for set covering problems. Eur. J. Oper. Res. 1992, 58, 293–300. [Google Scholar] [CrossRef]
  65. Bisong, E. Google Colaboratory. In Building Machine Learning and Deep Learning Models on Google Cloud Platform: A Comprehensive Guide for Beginners; Apress: Berkeley, CA, USA, 2019; pp. 59–64. [Google Scholar] [CrossRef]
  66. Garey, M.R.; Johnson, D.S. Computers and Intractability: A Guide to the Theory of NP-completeness. J. Symb. Log. 1979, 48, 498–500. [Google Scholar] [CrossRef]
  67. Lanza-Gutierrez, J.M.; Caballe, N.; Crawford, B.; Soto, R.; Gomez-Pulido, J.A.; Paredes, F. Exploring Further Advantages in an Alternative Formulation for the Set Covering Problem. Math. Probl. Eng. 2020, 2020, 5473501. [Google Scholar] [CrossRef]
  68. Smith, B.M. IMPACS-a bus crew scheduling system using integer programming. Math. Program. 1988, 42, 181–187. [Google Scholar] [CrossRef]
  69. Vianna, S.S. The set covering problem applied to optimisation of gas detectors in chemical process plants. Comput. Chem. Eng. 2019, 121, 388–395. [Google Scholar] [CrossRef]
  70. Liu, Z.; Xu, H.; Liu, P.; Li, L.; Zhao, X. Interval-valued intuitionistic uncertain linguistic multi-attribute decision-making method for plant location selection with partitioned hamy mean. Int. J. Fuzzy Syst. 2020, 22, 1993–2010. [Google Scholar] [CrossRef]
  71. Bahrami, I.; Ahari, R.M.; Asadpour, M. A maximal covering facility location model for emergency services within an M (t)/M/m/m queuing system. J. Model. Manag. 2020, 16, 963–986. [Google Scholar] [CrossRef]
  72. Xiang, X.; Qiu, J.; Xiao, J.; Zhang, X. Demand coverage diversity based ant colony optimization for dynamic vehicle routing problems. Eng. Appl. Artif. Intell. 2020, 91, 103582. [Google Scholar] [CrossRef]
  73. Zhang, L.; Shaffer, B.; Brown, T.; Scott Samuelsen, G. The optimization of DC fast charging deployment in California. Appl. Energy 2015, 157, 111–122. [Google Scholar] [CrossRef]
  74. Mandal, S.; Patra, N.; Pal, M. Covering problem on fuzzy graphs and its application in disaster management system. Soft Comput. 2021, 25, 2545–2557. [Google Scholar] [CrossRef]
  75. Alizadeh, R.; Nishi, T. Hybrid Set Covering and Dynamic Modular Covering Location Problem: Application to an Emergency Humanitarian Logistics Problem. Appl. Sci. 2020, 10, 7110. [Google Scholar] [CrossRef]
  76. Park, Y.; Nielsen, P.; Moon, I. Unmanned aerial vehicle set covering problem considering fixed-radius coverage constraint. Comput. Oper. Res. 2020, 119, 104936. [Google Scholar] [CrossRef]
  77. Mann, H.B.; Whitney, D.R. On a test of whether one of two random variables is stochastically larger than the other. Ann. Math. Stat. 1947, 18, 50–60. [Google Scholar] [CrossRef]
Figure 1. S-shaped and V-shaped transfer functions.
Figure 1. S-shaped and V-shaped transfer functions.
Biomimetics 08 00400 g001
Figure 2. X-shaped and Z-shaped transfer functions.
Figure 2. X-shaped and Z-shaped transfer functions.
Biomimetics 08 00400 g002
Figure 3. Time-varying S-shaped and V-shaped transfer functions when τ m a x = 4 and τ m i n = 0.01 during 100 iterations with time step 2 [38].
Figure 3. Time-varying S-shaped and V-shaped transfer functions when τ m a x = 4 and τ m i n = 0.01 during 100 iterations with time step 2 [38].
Biomimetics 08 00400 g003
Figure 4. Building actions on the basis of binarization schemes.
Figure 4. Building actions on the basis of binarization schemes.
Biomimetics 08 00400 g004
Figure 5. Proposal.
Figure 5. Proposal.
Biomimetics 08 00400 g005
Figure 9. Exploration–exploitation graphs of the best execution obtained for the scp44 instance using GWO.
Figure 9. Exploration–exploitation graphs of the best execution obtained for the scp44 instance using GWO.
Biomimetics 08 00400 g009
Figure 10. Exploration–exploitation graphs of the best execution obtained for the scpb2 instance using SCA.
Figure 10. Exploration–exploitation graphs of the best execution obtained for the scpb2 instance using SCA.
Biomimetics 08 00400 g010
Figure 11. Exploration–exploitation graphs of the best execution obtained for the scp65 instance using WOA.
Figure 11. Exploration–exploitation graphs of the best execution obtained for the scp65 instance using WOA.
Biomimetics 08 00400 g011
Table 1. S-shaped and V-shaped transfer functions.
Table 1. S-shaped and V-shaped transfer functions.
Transfer Functions
S-shaped [30,49]V-shaped [30,49,50]
NameEquationNameEquation
S1 T ( d w j ) = 1 1 + e 2 d w j V1 T ( d w j ) = e r f π 2 d w j
S2 T ( d w j ) = 1 1 + e d w j V2 T ( d w j ) = t a n h ( d w j )
S3 T ( d w j ) = 1 1 + e d w j 2 V3 T ( d w j ) = d w j 1 + ( d w j ) 2
S4 T ( d w j ) = 1 1 + e d w j 3 V4 T ( d w j ) = 2 π a r c t a n π 2 d w j
Table 2. X-shaped and Z-shaped transfer functions.
Table 2. X-shaped and Z-shaped transfer functions.
Transfer Functions
X-shaped [51,52]Z-shaped [53,54]
NameEquationNameEquation
X1 T ( d w j ) = 1 1 + e 2 d w j Z1 T ( d w j ) = 1 2 d w j
X2 T ( d w j ) = 1 1 + e d w j Z2 T ( d w j ) = 1 5 d w j
X3 T ( d w j ) = 1 1 + e d w j 2 Z3 T ( d w j ) = 1 8 d w j
X4 T ( d w j ) = 1 1 + e d w j 3 Z4 T ( d w j ) = 1 20 d w j
Table 3. X-shaped and Z-shaped transfer functions.
Table 3. X-shaped and Z-shaped transfer functions.
Time-Varying Transfer Functions [38]
S-shapedV-shaped
NameEquationNameEquation
T V S 1 T ( d w j , τ ) = 1 1 + e 2 d w j τ T V V 1 T ( d w j , τ ) = 1 2 1 + e 2 d w j τ d w j 0 2 1 + e 2 d w j τ 1 d w j > 0
T V S 2 T ( d w j , τ ) = 1 1 + e d w j τ T V V 2 T ( d w j , τ ) = 1 2 1 + e d w j τ d w j 0 2 1 + e d w j τ 1 d w j > 0
T V S 3 T ( d w j , τ ) = 1 1 + e d w j 2 τ T V V 3 T ( d w j , τ ) = 1 2 1 + e d w j 2 τ d w j 0 2 1 + e d w j 2 τ 1 d w j > 0
T V S 4 T ( d w j , τ ) = 1 1 + e d w j 3 τ T V V 4 T ( d w j , τ ) = 1 2 1 + e d w j 3 τ d w j 0 2 1 + e d w j 3 τ 1 d w j > 0
Table 4. Binarization rules.
Table 4. Binarization rules.
TypeBinarization Rules
Standard X n e w j = 1 i f r a n d T ( d w j ) 0 e l s e .
Complement X n e w j = C o m p l e m e n t ( X w j ) i f r a n d T ( d w j ) 0 e l s e .
Static Probability X n e w j = 0 i f T ( d w j ) α X w j i f α < T ( d w j ) 1 2 ( 1 + α ) 1 i f T ( d w j ) 1 2 ( 1 + α )
Elitist X n e w j = X B e s t j i f r a n d < T ( d w j ) 0 e l s e .
Roulette Elitist X n e w j = P [ X n e w j = ζ j ] = f ( ζ ) δ Q g f ( δ ) if rand T ( d w j ) P [ X n e w j = 0 ] = 1 e l s e .
Table 5. Set of actions analyzed.
Table 5. Set of actions analyzed.
Set of Actions
Set IDTransfer FunctionsBinarization RulesAmount
of actions
TFBR-1S-shaped and V-shapedStandard, Complement, Static Probability,
Elitist, and Roulette Elitist
40
TFBR-2S-shaped and V-shapedStandard8
TFBR-3S-shaped and V-shapedComplement8
TFBR-4S-shaped and V-shapedStatic Probability8
TFBR-5S-shaped and V-shapedElitist8
TFBR-6S-shaped and V-shapedRoulette Elitist8
TFBR-7S-shaped, V-shaped, X-shaped and Z-shapedStandard, Complement, Static Probability,
Elitist, and Roulette Elitist
80
TFBR-8S-shaped, V-shaped, X-shaped, and Z-shapedStandard16
TFBR-9S-shaped, V-shaped, X-shaped, and Z-shapedComplement16
TFBR-10S-shaped, V-shaped, X-shaped, and Z-shapedStatic Probability16
TFBR-11S-shaped, V-shaped, X-shaped, and Z-shapedElitist16
TFBR-12S-shaped, V-shaped, X-shaped, and Z-shapedRoulette Elitist16
Table 6. Parameter settings.
Table 6. Parameter settings.
ParameterValue
Independent runs31
Number of populations40
Number of iterations1000
Parameter a of SCA2
Parameter a of GWODecreases linearly from 2 to 0
Parameter a of WOADecreases linearly from 2 to 0
Parameter b of WOA1
Parameter α of Q-learning0.1
Parameter γ of Q-learning0.4
Table 7. RPD obtained for 12 sets using GWO.
Table 7. RPD obtained for 12 sets using GWO.
RPDTFBR-1TFBR-2TFBR-3TFBR-4TFBR-5TFBR-6TFBR-7TFBR-8TFBR-9TFBR-10TFBR-11TFBR-12
00000128000188
] 0 , 3 ] 20111330321317253333
] 3 , 5 ] 1136103517211844
>514413822001542271100
Table 8. RPD obtained for the 12 sets using SCA.
Table 8. RPD obtained for the 12 sets using SCA.
RPDTFBR-1TFBR-2TFBR-3TFBR-4TFBR-5TFBR-6TFBR-7TFBR-8TFBR-9TFBR-10TFBR-11TFBR-12
0000067100066
] 0 , 3 ] 1309033331401403133
] 3 , 5 ] 160105421010075
>51645444511945214511
Table 9. RPD obtained for 12 sets using WOA.
Table 9. RPD obtained for 12 sets using WOA.
RPDTFBR-1TFBR-2TFBR-3TFBR-4TFBR-5TFBR-6TFBR-7TFBR-8TFBR-9TFBR-10TFBR-11TFBR-12
01000810001067
] 0 , 3 ] 1840132292202103127
] 3 , 5 ] 1811356150150711
>584044410084584510
Table 10. Results obtained with GWO and the TFBR-1, TFBR-2, TFBR-3, TFBR-4, TFBR-5, and TFBR-6 sets.
Table 10. Results obtained with GWO and the TFBR-1, TFBR-2, TFBR-3, TFBR-4, TFBR-5, and TFBR-6 sets.
SCPTFBR-1TFBR-2TFBR-3TFBR-4TFBR-5TFBR-6
Inst.Opt.BestAvgRPDBestAvgRPDBestAvgRPDBestAvgRPDBestAvgRPDBestAvgRPD
41429431.0436.810.47439.0472.352.33435.0448.481.4432.0445.480.7430.0433.230.23430.0434.290.23
42512532.0543.483.91562.0611.429.77551.0578.977.62543.0558.976.05521.0530.321.76518.0529.391.17
43516535.0542.713.68567.0626.979.88543.0577.715.23532.0551.943.1517.0525.680.19522.0526.11.16
44494508.0521.292.83520.0581.875.26523.0539.685.87506.0530.132.43496.0507.390.4502.0509.291.62
45512532.0545.233.91547.0602.036.84552.0581.777.81529.0552.03.32520.0526.421.56521.0527.291.76
46560576.0582.392.86592.0670.775.71582.0617.523.93574.0591.942.5566.0570.261.07563.0570.290.54
47430437.0444.191.63454.0492.525.58449.0468.064.42441.0451.812.56434.0436.870.93433.0436.90.7
48492502.0508.452.03510.0598.453.66522.0547.526.1506.0524.292.85494.0500.450.41493.0500.290.2
49641670.0688.584.52684.0763.716.71679.0727.525.93685.0705.816.86652.0669.131.72661.0671.683.12
410514524.0529.711.95552.0601.657.39541.0557.555.25522.0545.681.56518.0522.480.78519.0523.130.97
51253261.0266.873.16277.0305.169.49264.0283.94.35263.0272.873.95257.0261.191.58255.0262.550.79
52302324.0331.487.28349.0381.4515.56332.0353.749.93333.0341.3210.26315.0322.94.3316.0322.454.64
53226231.0234.062.21245.0270.298.41236.0247.524.42233.0239.813.1228.0230.230.88229.0230.941.33
54242249.0252.522.89254.0283.294.96255.0265.775.37252.0260.064.13244.0248.00.83245.0248.291.24
55211215.0218.261.9221.0245.844.74220.0228.554.27216.0224.742.37212.0214.550.47212.0215.480.47
56213218.0227.452.35240.0267.8712.68221.0243.683.76224.0233.715.16214.0219.060.47215.0220.520.94
57293307.0312.034.78320.0354.619.22317.0333.138.19308.0318.975.12298.0303.031.71297.0303.01.37
58288294.0298.422.08314.0338.069.03303.0319.065.21295.0308.772.43290.0293.90.69291.0294.521.04
59279285.0289.682.15301.0330.137.89293.0307.875.02287.0297.842.87281.0284.550.72280.0284.030.36
510265274.0278.423.4292.0318.7710.19284.0296.427.17274.0283.873.4268.0272.061.13266.0271.160.38
61138144.0146.584.35155.0219.3512.32150.0169.948.7146.0150.875.8141.0143.232.17140.0143.061.45
62146153.0156.394.79171.0264.417.12166.0199.2913.7151.0160.613.42148.0150.01.37146.0150.580.0
63145147.0150.321.38189.0250.6530.34152.0184.584.83149.0155.742.76145.0148.060.0147.0148.421.38
64131133.0135.01.53147.0199.012.21138.0151.165.34134.0138.452.29131.0132.770.0131.0132.90.0
65161173.0178.617.45188.0271.2916.77188.0215.1616.77173.0180.427.45161.0168.350.0162.0169.00.62
a1253262.0268.13.56309.0362.2622.13286.0314.6113.04270.0278.746.72258.0262.321.98259.0262.522.37
a2252266.0271.815.56316.0364.4225.4285.0314.113.1271.0280.777.54258.0263.612.38259.0265.292.78
a3232245.0248.035.6280.0326.1320.69264.0286.6513.79248.0255.066.9239.0242.813.02240.0243.683.45
a4234247.0251.265.56273.0332.4216.67269.0295.6514.96247.0262.195.56236.0242.520.85236.0242.870.85
a5236245.0249.773.81265.0330.9712.29265.0294.3912.29247.0259.874.66239.0243.421.27240.0243.611.69
b16971.072.582.9137.0211.1998.55106.0132.2953.6271.076.942.969.070.290.069.070.060.0
b27678.080.972.63146.0196.1692.11112.0142.2647.3781.086.556.5876.077.320.076.077.480.0
b38082.084.132.5161.0240.94101.25129.0166.8461.2584.090.135.080.081.060.081.081.451.25
b47983.085.295.06158.0214.74100.0114.0153.944.384.089.586.3379.081.260.080.081.611.27
b57273.075.01.39140.0193.0694.44101.0137.3940.2873.082.681.3972.072.870.072.072.810.0
c1227245.0250.687.93289.0371.3227.31279.0316.4522.91248.0260.529.25231.0238.451.76233.0239.12.64
c2219232.0241.485.94295.0364.7734.7268.0305.7722.37239.0252.689.13226.0230.233.2227.0231.323.65
c3243256.0263.975.35348.0415.3543.21293.0343.0320.58267.0280.749.88248.0252.652.06248.0253.652.06
c4219232.0237.065.94314.0359.5243.38270.0303.923.29233.0247.976.39225.0230.92.74226.0230.523.2
c5215229.0233.356.51293.0358.7136.28270.0303.4225.58228.0243.846.05220.0224.162.33220.0224.162.33
d16065.066.948.33171.0250.42185.0130.0174.23116.6766.072.7710.060.061.610.061.062.031.67
d26667.070.91.52222.0305.71236.36136.0176.35106.0670.081.036.0666.067.450.066.067.870.0
d37277.079.976.94230.0314.58219.44159.0209.1120.8382.090.3513.8973.074.711.3973.075.231.39
d46263.065.351.61155.0254.77150.0125.0163.23101.6165.075.324.8462.062.90.062.062.970.0
d56165.066.746.56159.0250.29160.66139.0170.06127.8766.075.138.261.062.350.061.062.680.0
263.07268.53.88305.58363.143.64286.58314.425.83265.51277.095.19256.87261.271.07257.4261.71.29
Table 11. Continued results obtained with GWO and the TFBR-7, TFBR-8, TFBR-9, TFBR-10, TFBR-11, and TFBR-12 sets.
Table 11. Continued results obtained with GWO and the TFBR-7, TFBR-8, TFBR-9, TFBR-10, TFBR-11, and TFBR-12 sets.
SCPTFBR-7TFBR-8TFBR-9TFBR-10TFBR-11TFBR-12
Inst.Opt.BestAvgRPDBestAvgRPDBestAvgRPDBestAvgRPDBestAvgRPDBestAvgRPD
41429433.0437.870.93438.0460.392.1432.0442.550.7430.0436.060.23431.0433.390.47430.0433.520.23
42512530.0545.263.52544.0590.266.25538.0557.195.08521.0546.651.76518.0530.771.17524.0533.032.34
43516533.0544.263.29554.0598.427.36537.0558.684.07530.0541.02.71519.0527.030.58523.0528.391.36
44494517.0523.14.66528.0558.656.88513.0532.973.85506.0523.972.43499.0509.291.01501.0509.161.42
45512529.0544.033.32552.0602.977.81532.0560.13.91527.0541.742.93520.0526.01.56516.0527.650.78
46560572.0583.352.14592.0634.325.71572.0599.162.14568.0582.01.43562.0568.060.36565.0569.740.89
47430438.0444.451.86453.0481.875.35440.0451.872.33435.0445.481.16433.0436.480.7435.0437.581.16
48492502.0511.12.03508.0576.353.25506.0525.712.85500.0508.741.63497.0499.351.02496.0499.870.81
49641671.0688.524.68693.0750.138.11680.0705.526.08673.0688.714.99658.0670.12.65661.0672.483.12
410514526.0530.972.33542.0576.95.45526.0540.582.33522.0532.841.56517.0520.840.58518.0522.10.78
51253256.0268.421.19265.0291.844.74262.0273.813.56260.0268.422.77256.0262.941.19256.0262.061.19
52302327.0332.818.28341.0366.012.91337.0343.9711.59324.0333.327.28315.0322.584.3316.0324.134.64
53226231.0234.522.21243.0262.037.52235.0241.453.98230.0235.741.77228.0229.870.88228.0230.480.88
54242249.0253.12.89256.0277.945.79249.0256.872.89249.0252.772.89246.0248.481.65245.0247.711.24
55211216.0218.482.37222.0237.585.21216.0222.062.37214.0218.01.42211.0214.060.0212.0214.970.47
56213221.0228.713.76226.0255.196.1226.0235.136.1222.0228.234.23216.0220.191.41215.0219.710.94
57293309.0313.195.46310.0339.295.8307.0320.064.78300.0311.352.39296.0302.971.02297.0303.421.37
58288297.0299.523.12304.0329.845.56298.0309.973.47292.0299.581.39290.0293.060.69290.0292.870.69
59279285.0290.352.15293.0320.655.02283.0297.91.43284.0291.11.79281.0283.350.72280.0282.940.36
510265272.0278.872.64284.0305.067.17275.0286.773.77271.0279.452.26267.0271.390.75267.0271.580.75
61138145.0147.655.07151.0186.619.42147.0153.656.52144.0147.484.35141.0142.552.17141.0142.772.17
62146153.0157.134.79173.0230.3918.49156.0168.776.85149.0158.422.05149.0150.772.05147.0150.710.68
63145149.0151.032.76155.0208.716.9151.0161.714.14148.0152.032.07146.0148.060.69147.0148.161.38
64131133.0135.231.53138.0169.395.34135.0139.423.05131.0134.870.0131.0132.650.0131.0132.550.0
65161174.0178.428.07193.0240.6519.88181.0191.4512.42165.0178.872.48164.0167.651.86162.0169.480.62
a1253262.0268.523.56284.0337.7412.25274.0286.978.3264.0271.744.35259.0261.842.37258.0261.871.98
a2252264.0273.684.76286.0340.3213.49279.0295.110.71266.0274.655.56258.0263.742.38258.0263.322.38
a3232246.0249.396.03277.0307.919.4254.0265.069.48240.0250.583.45238.0242.02.59237.0242.352.16
a4234246.0253.15.13280.0310.119.66259.0269.7110.68243.0255.553.85238.0242.451.71240.0242.682.56
a5236248.0250.875.08271.0309.5214.83258.0269.819.32246.0254.234.24240.0242.651.69241.0242.772.12
b16970.072.771.45107.0171.0355.0779.096.1914.4971.077.292.969.069.840.069.069.810.0
b27678.082.422.63104.0170.4236.8488.0100.1615.7977.084.451.3276.076.770.076.076.810.0
b38082.083.972.5123.0212.2953.7585.0110.946.2581.088.451.2581.081.131.2581.081.11.25
b47983.086.295.06120.0193.3951.989.0104.6812.6683.088.975.0679.081.060.079.081.160.0
b57275.075.654.17132.0181.5583.3381.096.2612.574.077.972.7872.072.390.072.072.520.0
c1227243.0250.427.05283.0340.2624.67264.0279.7416.3241.0257.636.17234.0238.423.08236.0238.653.96
c2219236.0242.97.76302.0344.037.9261.0273.8419.18234.0245.326.85227.0230.523.65225.0230.712.74
c3243259.0264.96.58332.0398.4536.63274.0297.2912.76259.0272.876.58247.0251.711.65249.0252.452.47
c4219231.0237.875.48288.0351.8731.51245.0268.5211.87232.0240.685.94226.0228.353.2226.0228.843.2
c5215227.0233.815.58269.0338.3225.12239.0262.6811.16226.0238.395.12220.0223.12.33220.0223.652.33
d16065.067.038.33168.0228.9180.084.0100.6540.064.072.976.6761.061.971.6761.062.11.67
d26668.071.353.03183.0258.87177.2784.0115.6827.2769.076.04.5567.067.421.5266.067.390.0
d37277.080.266.94192.0288.61166.6791.0117.9426.3978.090.458.3374.074.972.7874.074.942.78
d46264.066.353.23175.0232.74182.2679.097.4527.4263.070.871.6162.062.390.062.062.740.0
d56164.067.294.92149.0217.16144.2683.0102.1936.0766.073.978.261.062.390.061.062.390.0
263.47269.324.1295.18341.8934.47270.76286.49.97261.6271.113.44257.33261.041.36257.64261.451.37
Table 12. Results obtained with SCA and the TFBR-1, TFBR-2, TFBR-3, TFBR-4, TFBR-5 and TFBR-6 sets.
Table 12. Results obtained with SCA and the TFBR-1, TFBR-2, TFBR-3, TFBR-4, TFBR-5 and TFBR-6 sets.
SCPTFBR-1TFBR-2TFBR-3TFBR-4TFBR-5TFBR-6
Inst.Opt.BestAvgRPDBestAvgRPDBestAvgRPDBestAvgRPDBestAvgRPDBestAvgRPD
41429436.0442.611.63626.0666.7245.92446.0461.163.96630.0669.0846.85431.0434.080.47430.0434.280.23
42512545.0554.776.451061.01116.68107.23565.0595.1610.351015.01095.898.24524.0530.762.34525.0531.82.54
43516537.0549.064.071097.01195.08112.6546.0592.725.811085.01210.52110.27522.0526.441.16520.0527.60.78
44494519.0530.05.06881.0975.7278.34537.0562.248.7857.0964.873.48499.0508.01.01503.0508.761.82
45512537.0550.294.881076.01132.76110.16561.0592.449.571029.01113.44100.98521.0526.481.76522.0527.241.95
46560577.0590.453.041241.01360.88121.61590.0635.925.361262.01372.12125.36564.0568.00.71564.0568.160.71
47430438.0449.191.86796.0853.4485.12457.0482.246.28779.0853.5681.16434.0436.920.93432.0437.080.47
48492505.0514.232.641077.01150.96118.9549.0570.7611.591052.01160.16113.82494.0499.480.41495.0500.680.61
49641682.0695.166.41466.01580.72128.71723.0760.6412.791484.01590.4131.51660.0672.122.96661.0672.443.12
410514526.0534.352.33978.01070.4490.27551.0579.67.21023.01091.299.03515.0521.00.19518.0521.280.78
51253264.0272.774.35517.0565.16104.35281.0293.4811.07546.0577.16115.81257.0263.841.58259.0263.522.37
52302324.0335.137.28794.0870.08162.91345.0369.7614.24815.0879.24169.87319.0323.165.63320.0324.645.96
53226230.0235.321.77493.0524.04118.14244.0260.967.96472.0521.52108.85229.0230.481.33229.0230.521.33
54242251.0255.03.72500.0540.0106.61265.0277.29.5509.0546.72110.33246.0248.881.65246.0248.761.65
55211217.0220.812.84363.0398.872.04226.0237.567.11362.0395.3271.56212.0214.360.47213.0215.120.95
56213225.0230.845.63469.0497.04120.19241.0258.0813.15458.0502.08115.02216.0219.81.41215.0220.40.94
57293308.0315.05.12645.0672.48120.14329.0346.2812.29620.0664.56111.6299.0303.282.05301.0302.882.73
58288296.0300.872.78647.0697.0124.65319.0335.2810.76645.0694.76123.96290.0293.440.69290.0293.560.69
59279288.0293.583.23654.0699.4134.41308.0326.0810.39685.0707.12145.52281.0283.560.72281.0284.080.72
510265271.0280.92.26570.0623.28115.09294.0308.4410.94603.0631.24127.55267.0271.040.75267.0271.240.75
61138145.0147.815.07692.0739.12401.45161.0176.7216.67670.0751.56385.51141.0142.962.17141.0142.82.17
62146151.0157.583.42998.01098.04583.56181.0216.9623.971029.01123.04604.79148.0150.81.37148.0151.21.37
63145147.0150.771.38957.01047.92560.0168.0205.3615.86989.01048.24582.07146.0148.160.69146.0148.080.69
64131134.0135.712.29602.0649.16359.54147.0160.5612.21595.0656.92354.2131.0132.440.0131.0132.560.0
65161168.0181.424.351024.01098.32536.02191.0228.2818.631019.01099.76532.92164.0167.561.86162.0167.440.62
a1253263.0268.453.951263.01337.08399.21289.0338.2414.231233.01335.12387.35260.0262.322.77260.0262.442.77
a2252268.0272.656.351183.01228.4369.44282.0335.7611.91161.01234.96360.71261.0263.43.57259.0263.62.78
a3232242.0248.264.311066.01153.44359.48273.0305.1617.671086.01165.12368.1240.0242.243.45237.0242.442.16
a4234246.0251.585.131093.01142.04367.09285.0320.5621.791066.01148.16355.56238.0241.641.71240.0243.122.56
a5236244.0250.063.391113.01161.8371.61275.0312.816.531086.01167.92360.17240.0242.441.69241.0242.882.12
b16970.072.261.451386.01463.681908.791.0153.9231.881408.01462.81940.5869.069.80.069.070.040.0
b27679.080.583.951389.01467.881727.63106.0155.1239.471368.01468.241700.076.076.920.076.076.880.0
b38082.082.812.51806.01883.882157.5102.0187.7627.51818.01887.962172.581.081.081.2580.081.040.0
b47983.084.555.061560.01674.41874.68115.0182.445.571597.01676.761921.5280.081.361.2780.081.521.27
b57274.074.652.781424.01495.881877.7892.0164.3227.781427.01489.681881.9472.072.60.072.072.680.0
c1227244.0250.067.491510.01634.92565.2296.0333.430.41555.01617.6585.02235.0237.483.52235.0238.243.52
c2219234.0240.486.851781.01863.36713.24286.0329.2430.59246.01785.2812.33226.0230.163.2228.0230.724.11
c3243256.0262.065.352099.02182.0763.79319.0370.9631.281952.02161.6703.29248.0251.322.06249.0252.322.47
c4219230.0235.05.021635.01776.44646.58286.0333.6830.591608.01776.52634.25226.0229.763.2227.0229.843.65
c5215226.0232.655.121596.01713.16642.33252.0329.9617.211583.01707.88636.28221.0223.02.79219.0222.561.86
d16063.065.325.02090.02154.683383.3390.0174.1250.02015.02166.63258.3361.061.881.6761.061.921.67
d26668.069.453.032366.02467.03484.85115.0202.874.242369.02460.323489.3967.067.41.5267.067.21.52
d37276.078.165.562587.02705.043493.0699.0213.3237.52611.02691.963526.3974.075.02.7874.074.722.78
d46263.063.611.612089.02192.563269.3591.0171.8846.772075.02164.43246.7762.062.760.062.062.840.0
d56164.065.714.922119.02199.123373.7782.0167.1234.432072.02181.683296.7261.062.240.061.062.120.0
264.36270.494.061186.21260.44808.15290.02331.4820.31145.981259.35788.39257.96261.151.57258.13261.451.58
Table 13. Continued results obtained with SCA and the TFBR-7, TFBR-8, TFBR-9, TFBR-10, TFBR-11 and TFBR-12 sets.
Table 13. Continued results obtained with SCA and the TFBR-7, TFBR-8, TFBR-9, TFBR-10, TFBR-11 and TFBR-12 sets.
SCPTFBR-7TFBR-8TFBR-9TFBR-10TFBR-11TFBR-12
Inst.Opt.BestAvgRPDBestAvgRPDBestAvgRPDBestAvgRPDBestAvgRPDBestAvgRPD
41429438.0443.02.1632.0672.9247.32434.0442.321.17620.0671.5644.52432.0435.00.7430.0434.640.23
42512541.0551.165.661023.01105.3299.8537.0552.444.881051.01120.24105.27522.0531.681.95526.0533.882.73
43516538.0546.714.261134.01194.16119.77533.0546.963.291148.01210.96122.48524.0529.561.55523.0530.081.36
44494515.0528.974.25904.0967.8883.0516.0527.284.45875.0965.7277.13501.0508.61.42503.0510.081.82
45512531.0549.193.711072.01138.52109.38526.0543.42.731042.01117.36103.52522.0528.21.95522.0528.641.95
46560573.0586.552.321288.01377.0130.0575.0584.762.681269.01365.32126.61564.0569.080.71566.0568.841.07
47430440.0447.652.33790.0865.2483.72441.0449.122.56790.0864.683.72436.0438.121.4434.0438.160.93
48492505.0513.02.641086.01163.44120.73503.0514.082.241077.01160.92118.9496.0500.280.81497.0500.841.02
49641679.0692.355.931504.01592.68134.63686.0700.727.021473.01560.2129.8663.0673.723.43660.0674.642.96
410514527.0533.742.531004.01079.095.33526.0534.642.33972.01053.8489.11519.0522.040.97518.0522.40.78
51253264.0271.14.35502.0575.8498.42269.0274.46.32548.0575.16116.6261.0263.923.16259.0264.242.37
52302327.0333.978.28811.0870.52168.54330.0335.89.27815.0872.24169.87318.0325.165.3318.0324.25.3
53226233.0234.93.1491.0527.4117.26231.0236.362.21488.0521.72115.93230.0230.561.77230.0230.881.77
54242249.0254.062.89510.0544.64110.74251.0254.763.72506.0541.84109.09247.0249.482.07244.0248.960.83
55211217.0219.452.84358.0397.6869.67217.0221.362.84356.0398.0468.72213.0215.760.95213.0215.160.95
56213221.0229.613.76483.0502.12126.76228.0231.087.04427.0497.88100.47217.0221.21.88216.0220.881.41
57293307.0313.974.78616.0663.68110.24307.0314.04.78642.0673.6119.11298.0303.841.71295.0303.320.68
58288295.0300.162.43633.0691.92119.79298.0303.03.47673.0700.72133.68291.0294.121.04292.0294.121.39
59279286.0291.812.51652.0695.36133.69288.0293.523.23627.0693.0124.73282.0284.641.08281.0284.760.72
510265275.0279.873.77552.0617.12108.3271.0279.02.26609.0632.04129.81267.0271.880.75268.0271.361.13
61138143.0147.13.62667.0741.8383.33144.0148.764.35689.0740.64399.28140.0143.161.45141.0143.042.17
62146152.0157.034.111039.01111.2611.64154.0157.65.48935.01099.08540.41149.0151.322.05148.0150.641.37
63145147.0150.481.38977.01046.24573.79149.0152.42.76958.01042.36560.69147.0148.241.38147.0148.521.38
64131132.0135.320.76606.0651.44362.6134.0136.122.29608.0655.08364.12131.0132.720.0132.0132.960.76
65161175.0181.488.7982.01095.04509.94172.0178.46.831008.01084.64526.09162.0168.920.62162.0168.680.62
a1253263.0267.773.951279.01349.96405.53266.0270.165.141236.01327.92388.54259.0262.562.37261.0262.843.16
a2252264.0271.684.761134.01221.84350.0268.0274.06.351161.01232.48360.71262.0264.083.97260.0264.123.17
a3232242.0247.844.311100.01168.4374.14247.0250.326.471071.01152.0361.64239.0242.523.02241.0242.523.88
a4234242.0250.523.421066.01133.2355.56250.0253.486.841078.01141.72360.68241.0243.122.99240.0243.242.56
a5236246.0250.04.241084.01172.12359.32248.0250.925.081132.01168.44379.66241.0242.842.12240.0242.841.69
b16970.072.291.451345.01440.921849.2871.072.562.91282.01445.641757.9769.070.120.069.070.040.0
b27679.080.453.951364.01471.21694.7479.082.563.951352.01449.481678.9576.076.840.076.076.960.0
b38082.082.682.51823.01870.482178.7583.084.683.751732.01857.122065.081.081.081.2580.081.240.0
b47983.084.685.061604.01678.41930.3885.086.327.591614.01681.241943.0480.081.721.2780.081.641.27
b57274.074.742.781396.01485.41838.8974.075.682.781334.01486.041752.7872.072.560.072.072.440.0
c1227239.0248.265.291556.01624.12585.46244.0250.687.491511.01627.56565.64233.0238.22.64235.0238.63.52
c2219229.0239.714.571733.01848.56691.32237.0241.88.221778.01859.8711.87226.0230.763.2228.0230.644.11
c3243253.0261.424.122092.02189.8760.91256.0265.565.352090.02171.96760.08248.0252.42.06247.0252.481.65
c4219232.0234.845.941678.01787.12666.21234.0239.286.851709.01780.92680.37228.0230.324.11225.0230.22.74
c5215224.0231.584.191649.01712.48666.98226.0232.325.121633.01723.8659.53221.0223.362.79221.0223.42.79
d16064.065.586.672067.02163.963345.064.066.886.672017.02164.883261.6761.062.041.6761.062.21.67
d26668.069.393.032383.02466.443510.6170.072.46.062314.02455.123406.0666.067.480.067.067.361.52
d37277.078.036.942623.02699.563543.0677.080.326.942372.02687.963194.4473.074.921.3973.074.921.39
d46262.063.710.02078.02197.043251.6163.066.161.612057.02208.843217.7462.062.840.062.063.00.0
d56164.065.744.922055.02173.963268.8565.067.766.562080.02187.83309.8462.062.441.6461.062.520.0
263.71269.633.891187.221260.96805.67265.04271.024.711172.421258.43786.57258.49261.851.7258.31261.941.62
Table 14. Results obtained with WOA and the TFBR-1, TFBR-2, TFBR-3, TFBR-4, TFBR-5, and TFBR-6 sets.
Table 14. Results obtained with WOA and the TFBR-1, TFBR-2, TFBR-3, TFBR-4, TFBR-5, and TFBR-6 sets.
SCPTFBR-1TFBR-2TFBR-3TFBR-4TFBR-5TFBR-6
Inst.Opt.BestAvgRPDBestAvgRPDBestAvgRPDBestAvgRPDBestAvgRPDBestAvgRPD
41429432.0439.130.7434.0472.161.17449.0466.034.66437.0472.771.86431.0434.770.47430.0434.190.23
42512540.0546.395.47553.0634.948.01575.0602.912.3539.0637.655.27521.0531.01.76520.0531.521.56
43516531.0542.92.91551.0645.396.78578.0612.6512.02541.0636.14.84521.0525.650.97520.0527.030.78
44494510.0523.163.24526.0591.136.48544.0573.0610.12519.0568.455.06500.0507.771.21501.0509.161.42
45512533.0543.164.1554.0641.948.2570.0602.9711.33539.0665.685.27520.0526.871.56521.0525.741.76
46560569.0582.451.61607.0697.778.39597.0649.136.61591.0725.035.54562.0568.840.36565.0569.480.89
47430438.0445.421.86442.0506.232.79457.0489.166.28448.0506.94.19435.0437.421.16435.0437.551.16
48492499.0507.481.42528.0622.267.32547.0587.911.18527.0607.557.11494.0500.480.41493.0500.230.2
49641670.0688.064.52736.0860.4514.82731.0775.2314.04707.0841.110.3662.0672.93.28663.0673.483.43
410514523.0530.521.75529.0623.352.92561.0590.559.14545.0619.136.03518.0522.10.78515.0521.840.19
51253261.0267.943.16279.0327.2610.28288.0301.8113.83277.0312.849.49258.0264.031.98258.0263.191.98
52302324.0332.037.28345.0417.7714.24350.0377.7415.89344.0401.8113.91315.0323.294.3316.0323.554.64
53226231.0233.842.21239.0288.395.75243.0266.267.52247.0283.779.29229.0230.481.33229.0230.741.33
54242249.0252.812.89266.0305.589.92265.0282.559.5258.0302.266.61246.0248.741.65246.0248.261.65
55211217.0218.712.84216.0246.062.37227.0242.167.58227.0251.297.58212.0215.350.47212.0215.130.47
56213222.0227.614.23235.0277.2910.33235.0259.4510.33230.0273.747.98214.0219.450.47217.0220.321.88
57293305.0311.654.1316.0370.397.85325.0349.7410.92318.0364.398.53297.0302.451.37297.0303.481.37
58288295.0297.972.43316.0373.19.72325.0342.7412.85308.0374.196.94291.0294.131.04289.0293.770.35
59279283.0289.131.43306.0357.529.68314.0333.4212.54312.0358.3911.83280.0284.740.36281.0284.320.72
510265274.0278.813.4285.0344.557.55300.0316.9413.21292.0334.4210.19267.0271.190.75267.0271.130.75
61138142.0146.322.9154.0194.1311.59154.0184.8111.59153.0200.4810.87140.0142.611.45142.0142.942.9
62146152.0156.324.11174.0252.2919.18172.0224.017.81159.0208.238.9147.0150.550.68148.0150.521.37
63145148.0150.292.07155.0225.526.9173.0220.0319.31173.0253.1919.31146.0148.520.69147.0148.551.38
64131133.0135.11.53137.0165.844.58145.0176.110.69142.0177.688.4131.0132.730.0131.0132.970.0
65161170.0178.745.59185.0255.114.91206.0243.7427.95196.0267.9721.74163.0167.681.24161.0168.320.0
a1253263.0267.193.95331.0417.930.83312.0353.6123.32323.0466.927.67259.0262.322.37260.0262.352.77
a2252266.0270.165.56315.0458.4225.0300.0348.4819.05311.0422.1323.41259.0264.032.78260.0264.293.17
a3232242.0246.684.31278.0368.3519.83276.0318.1618.97292.0346.0325.86239.0242.613.02239.0242.743.02
a4234244.0249.584.27299.0412.3227.78282.0327.1320.51308.0431.1331.62239.0242.92.14239.0242.812.14
a5236244.0248.613.39289.0361.3522.46266.0330.2612.71308.0405.7130.51241.0242.842.12241.0243.292.12
b16970.071.651.45111.0312.7160.8793.0175.6534.78126.0259.1382.6169.070.060.069.069.940.0
b27677.080.11.32140.0255.6584.21134.0185.7476.32129.0295.8769.7476.077.10.076.076.680.0
b38081.082.611.25161.0318.26101.25105.0207.8131.25165.0305.42106.2581.081.391.2580.081.230.0
b47982.084.163.8132.0323.3567.09129.0206.8163.29146.0332.2684.8179.081.190.079.081.160.0
b57274.074.522.78124.0230.6172.22118.0184.2963.89140.0320.2994.4472.072.480.072.072.710.0
c1227243.0247.777.05356.0529.9756.83289.0364.3527.31376.0529.6865.64235.0238.483.52234.0238.033.08
c2219236.0239.197.76365.0508.966.67305.0371.1339.27326.0462.7448.86224.0230.262.28227.0230.13.65
c3243255.0259.654.94415.0553.0370.78338.0399.6139.09403.0649.0665.84249.0252.842.47248.0252.582.06
c4219229.0234.134.57349.0491.2359.36275.0361.4225.57353.0559.6161.19227.0229.973.65225.0229.812.74
c5215227.0230.655.58310.0473.5244.19275.0341.9427.91330.0545.8453.49221.0223.452.79220.0223.742.33
d16062.064.743.33210.0527.0250.0111.0222.4585.0192.0472.55220.061.061.841.6760.061.90.0
d26668.069.03.03291.0697.77340.91147.0251.94122.73289.0755.23337.8866.067.520.067.067.551.52
d37276.077.425.56319.0781.61343.06104.0277.2944.44300.0688.87316.6773.074.941.3973.075.01.39
d46262.063.520.0234.0610.23277.42101.0215.9462.9226.0569.26264.5262.062.90.062.062.970.0
d56163.065.483.28227.0575.29272.13134.0241.35119.67198.0422.32224.5961.062.450.061.062.480.0
262.56267.843.44318.31442.3155.66298.33350.1427.94317.11441.8954.5257.62261.451.36257.69261.531.39
Table 15. Continued results obtained with WOA and the TFBR-7, TFBR-8, TFBR-9, TFBR-10, TFBR-11, and TFBR-12 sets.
Table 15. Continued results obtained with WOA and the TFBR-7, TFBR-8, TFBR-9, TFBR-10, TFBR-11, and TFBR-12 sets.
SCPTFBR-7TFBR-8TFBR-9TFBR-10TFBR-11TFBR-12
Inst.Opt.BestAvgRPDBestAvgRPDBestAvgRPDBestAvgRPDBestAvgRPDBestAvgRPD
41429434.0439.421.17611.0647.042.42434.0439.651.17556.0637.6829.6430.0435.420.23432.0435.160.7
42512538.0546.745.08649.01037.3526.76528.0545.063.12912.01029.3278.12523.0534.132.15529.0535.393.32
43516527.0542.872.131076.01143.58108.53532.0542.233.1997.01137.0393.22525.0530.231.74523.0529.741.36
44494509.0522.293.04865.0934.5875.1508.0520.682.83847.0922.7471.46500.0508.741.21495.0511.10.2
45512530.0543.773.52897.01067.1675.2529.0538.553.32950.01080.1985.55521.0529.391.76523.0528.032.15
46560565.0581.130.891174.01305.71109.64569.0576.01.611171.01296.94109.11566.0570.131.07566.0569.681.07
47430438.0444.841.86739.0813.071.86437.0444.741.63748.0803.1973.95434.0437.550.93434.0438.10.93
48492501.0508.681.83989.01088.74101.02498.0508.551.221002.01101.55103.66497.0501.291.02493.0500.320.2
49641676.0688.235.461263.01492.2997.04673.0691.944.991333.01496.29107.96665.0676.573.74665.0679.163.74
410514524.0531.11.95914.01018.3977.82517.0528.680.58905.01024.0376.07517.0522.260.58520.0523.131.17
51253261.0268.193.16495.0547.1995.65264.0270.94.35506.0546.23100.0259.0264.742.37261.0265.163.16
52302323.0330.616.95743.0836.42146.03324.0331.327.28748.0828.71147.68318.0324.95.3317.0324.294.97
53226231.0233.972.21446.0501.4897.35230.0234.061.77465.0496.48105.75229.0230.681.33229.0230.941.33
54242249.0252.132.89484.0514.68100.0248.0253.062.48468.0513.7793.39246.0249.031.65247.0249.392.07
55211214.0217.651.42317.0371.7150.24214.0218.711.42331.0377.3256.87212.0215.520.47214.0215.421.42
56213220.0226.293.29448.0474.71110.33222.0227.04.23416.0473.195.31216.0221.031.41218.0221.392.35
57293305.0311.424.1603.0642.48105.8305.0310.654.1573.0632.7495.56300.0304.322.39297.0303.741.37
58288296.0298.712.78543.0663.2388.54291.0298.771.04603.0658.77109.38291.0294.651.04291.0293.711.04
59279285.0289.262.15598.0658.23114.34286.0289.872.51559.0658.32100.36281.0284.480.72282.0284.351.08
510265273.0278.033.02517.0595.3995.09271.0277.352.26531.0593.97100.38268.0272.291.13267.0271.420.75
61138145.0146.195.07657.0705.68376.09143.0146.523.62588.0694.32326.09142.0143.582.9141.0143.262.17
62146150.0155.872.74853.01051.29484.25152.0155.454.11890.01044.55509.59148.0151.771.37149.0151.392.05
63145147.0150.451.38735.0981.26406.9147.0150.391.38919.01005.35533.79146.0148.680.69146.0148.420.69
64131133.0134.91.53539.0616.9311.45131.0134.650.0501.0603.61282.44131.0132.770.0131.0133.160.0
65161171.0178.96.21756.01041.06369.57171.0176.686.21878.01046.81445.34164.0169.581.86166.0170.353.11
a1253263.0266.423.951163.01289.55359.68262.0266.843.561158.01279.52357.71261.0262.773.16261.0262.973.16
a2252264.0271.064.761057.01186.23319.44265.0270.395.161076.01187.03326.98261.0264.393.57261.0264.393.57
a3232243.0246.974.74978.01101.74321.55244.0246.655.171030.01110.61343.97241.0243.263.88240.0242.93.45
a4234241.0248.482.99965.01095.94312.39243.0249.353.85964.01086.9311.97238.0243.231.71238.0243.581.71
a5236242.0247.652.541045.01124.58342.8243.0247.842.971010.01123.42327.97240.0243.11.69240.0243.421.69
b16971.072.02.91316.01414.391807.2570.071.811.451318.01409.91810.1469.069.90.069.069.90.0
b27678.079.712.631278.01414.031581.5877.079.681.321302.01421.521613.1676.077.10.076.076.90.0
b38081.082.351.251701.01826.772026.2581.083.231.251687.01823.322008.7580.081.030.080.081.260.0
b47981.083.812.531506.01635.91806.3382.083.713.81420.01611.941697.4780.081.91.2780.081.871.27
b57273.074.351.391300.01452.11705.5673.074.481.391216.01428.771588.8972.072.650.072.072.710.0
c1227239.0246.15.291483.01585.42553.3239.0244.775.291434.01592.42531.72235.0238.453.52235.0238.233.52
c2219229.0238.94.571227.01761.81460.27234.0237.656.851629.01779.84643.84228.0231.194.11228.0231.324.11
c3243255.0259.684.941825.02100.68651.03248.0259.522.061916.02113.77688.48249.0252.842.47249.0252.942.47
c4219230.0233.95.021608.01730.81634.25227.0235.03.651616.01731.35637.9226.0229.93.2227.0230.063.65
c5215224.0229.614.191590.01663.94639.53226.0228.945.121599.01681.77643.72221.0223.522.79220.0223.162.33
d16062.064.93.331929.02091.713115.062.064.683.332019.02122.13265.061.062.261.6761.062.391.67
d26668.069.133.032010.02395.262945.4568.069.423.032255.02433.263316.6767.067.651.5267.067.681.52
d37276.077.775.562323.02629.033126.3976.077.715.562408.02622.193244.4474.075.322.7874.075.552.78
d46263.063.681.61868.02064.031300.063.064.11.611962.02136.193064.5262.062.840.062.062.770.0
d56163.064.973.281962.02125.193116.3962.064.941.642013.02107.773200.062.062.581.6461.062.680.0
262.02267.623.251045.441209.75685.81261.53267.383.081098.421211.26745.64258.49262.211.73258.6262.291.76
Table 16. Ranking of the best sets considering RPD for GWO.
Table 16. Ranking of the best sets considering RPD for GWO.
1. TFBR-54. TFBR-67. TFBR-710. TFBR-3
2. TFBR-115. TFBR-108. TFBR-411. TFBR-2
3. TFBR-126. TFBR-19. TFBR-912. TFBR-8
Table 17. Ranking of the best sets considering RPD for SCA.
Table 17. Ranking of the best sets considering RPD for SCA.
1. TFBR-64. TFBR-117. TFBR-910. TFBR-4
2. TFBR-55. TFBR-78. TFBR-311. TFBR-8
3. TFBR-126. TFBR-19. TFBR-212. TFBR-10
Table 18. Ranking of the best sets considering RPD for WOA.
Table 18. Ranking of the best sets considering RPD for WOA.
1. TFBR-64. TFBR-117. TFBR-710. TFBR-3
2. TFBR-55. TFBR-98. TFBR-411. TFBR-8
3. TFBR-126. TFBR-19. TFBR-212. TFBR-10
Table 19. Ranking of the best sets considering fitness obtained using GWO for scp44 instance.
Table 19. Ranking of the best sets considering fitness obtained using GWO for scp44 instance.
Set—FitnessSet—FitnessSet—FitnessSet—Fitness
1. TFBR-5—4964. TFBR-6—5027. TFBR-1—50810. TFBR-2—520
2. TFBR-11—4995. TFBR-4—5068. TFBR-9—51311. TFBR-3—523
3. TFBR-12—5016. TFBR-10—5069. TFBR-7—51712. TFBR-8—528
Table 20. Ranking of the best sets considering fitness obtained using SCA for scpb2 instance.
Table 20. Ranking of the best sets considering fitness obtained using SCA for scpb2 instance.
Set—FitnessSet—FitnessSet—FitnessSet—Fitness
1. TFBR-5—764. TFBR-12—767. TFBR-9—7910. TFBR-8—1364
2. TFBR-6—765. TFBR-1—798. TFBR-3—10611. TFBR-4—1368
3. TFBR-11—766. TFBR-7—799. TFBR-10—135212. TFBR-2—1389
Table 21. Ranking of the best sets considering fitness obtained using WOA for scp65 instance.
Table 21. Ranking of the best sets considering fitness obtained using WOA for scp65 instance.
Set—FitnessSet—FitnessSet—FitnessSet—Fitness
1. TFBR-6—1614. TFBR-12—1667. TFBR-9—17110. TFBR-3—206
2. TFBR-5—1635. TFBR-1—1708. TFBR-2—18511. TFBR-8—756
3. TFBR-11—1646. TFBR-7—1719. TFBR-4—19612. TFBR-10—878
Table 22. Average p-value of GWO compared to others algorithm.
Table 22. Average p-value of GWO compared to others algorithm.
TFBR-1TFBR-2TFBR-3TFBR-4TFBR-5TFBR-6TFBR-7TFBR-8TFBR-9TFBR-10TFBR-11TFBR-12
TFBR-1-0.000.000.00≥0.05≥0.05≥0.050.000.00≥0.05≥0.05≥0.05
TFBR-2≥0.05-≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05
TFBR-3≥0.050.00-≥0.05≥0.05≥0.05≥0.050.00≥0.05≥0.05≥0.05≥0.05
TFBR-4≥0.050.000.00-≥0.05≥0.05≥0.050.00≥0.05≥0.05≥0.05≥0.05
TFBR-50.000.000.000.00-≥0.050.000.000.000.00≥0.05≥0.05
TFBR-60.000.000.000.00≥0.05-0.000.000.000.00≥0.05≥0.05
TFBR-7≥0.050.000.000.00≥0.05≥0.05-0.000.00≥0.05≥0.05≥0.05
TFBR-8≥0.050.02≥0.05≥0.05≥0.05≥0.05≥0.05-≥0.05≥0.05≥0.05≥0.05
TFBR-9≥0.050.000.00≥0.05≥0.05≥0.05≥0.050.00-≥0.05≥0.05≥0.05
TFBR-10≥0.050.000.000.03≥0.05≥0.05≥0.050.000.00-≥0.05≥0.05
TFBR-110.000.000.000.00≥0.05≥0.050.000.000.000.00-≥0.05
TFBR-120.000.000.000.00≥0.05≥0.050.000.000.000.00≥0.05-
Table 23. Average p-value of SCA compared to others algorithm.
Table 23. Average p-value of SCA compared to others algorithm.
TFBR-1TFBR-2TFBR-3TFBR-4TFBR-5TFBR-6TFBR-7TFBR-8TFBR-9TFBR-10TFBR-11TFBR-12
TFBR-1-0.000.000.00≥0.05≥0.05≥0.050.00≥0.050.00≥0.05≥0.05
TFBR-2≥0.05-≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05
TFBR-3≥0.050.00-0.00≥0.05≥0.05≥0.050.00≥0.050.00≥0.05≥0.05
TFBR-4≥0.05≥0.05≥0.05-≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05
TFBR-50.000.000.000.00-≥0.050.000.000.000.00≥0.05≥0.05
TFBR-60.000.000.000.00≥0.05-0.000.000.000.00≥0.05≥0.05
TFBR-7≥0.050.000.000.00≥0.05≥0.05-0.00≥0.050.00≥0.05≥0.05
TFBR-8≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05-≥0.05≥0.05≥0.05≥0.05
TFBR-9≥0.050.000.000.00≥0.05≥0.05≥0.050.00-0.00≥0.05≥0.05
TFBR-10≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05-≥0.05≥0.05
TFBR-110.000.000.000.00≥0.05≥0.050.000.000.000.00-≥0.05
TFBR-120.000.000.000.00≥0.05≥0.050.000.000.000.00≥0.05-
Table 24. Average p-value of WOA compared to others algorithm.
Table 24. Average p-value of WOA compared to others algorithm.
TFBR-1TFBR-2TFBR-3TFBR-4TFBR-5TFBR-6TFBR-7TFBR-8TFBR-9TFBR-10TFBR-11TFBR-12
TFBR-1-0.000.000.00≥0.05≥0.05≥0.050.00≥0.050.00≥0.05≥0.05
TFBR-2≥0.05-≥0.05≥0.05≥0.05≥0.05≥0.050.00≥0.050.00≥0.05≥0.05
TFBR-3≥0.05≥0.05-≥0.05≥0.05≥0.05≥0.050.00≥0.050.00≥0.05≥0.05
TFBR-4≥0.05≥0.05≥0.05-≥0.05≥0.05≥0.050.00≥0.050.00≥0.05≥0.05
TFBR-50.000.000.000.00-≥0.050.000.000.000.00≥0.05≥0.05
TFBR-60.000.000.000.00≥0.05-0.000.000.000.00≥0.05≥0.05
TFBR-7≥0.050.000.000.00≥0.05≥0.05-0.00≥0.050.00≥0.05≥0.05
TFBR-8≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05-≥0.05≥0.05≥0.05≥0.05
TFBR-9≥0.050.000.000.00≥0.05≥0.05≥0.050.00-0.00≥0.05≥0.05
TFBR-10≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05≥0.05-≥0.05≥0.05
TFBR-110.000.000.000.00≥0.05≥0.050.000.000.000.00-≥0.05
TFBR-120.000.000.000.00≥0.05≥0.050.000.000.000.00≥0.05-
Table 25. Ranking of the best set based on the statistical test.
Table 25. Ranking of the best set based on the statistical test.
GWOSCAWOA
setWinsetWinsetWin
1.   TFBR-581.   TFBR-581.   TFBR-58
2.   TFBR-682.   TFBR-682.   TFBR-68
  3.   TFBR-118  3.   TFBR-118  3.   TFBR-118
  4.   TFBR-128  4.   TFBR-128  4.   TFBR-128
5.   TFBR-155.   TFBR-155.   TFBR-15
6.   TFBR-756.   TFBR-756.   TFBR-75
  7.   TFBR-1057.   TFBR-957.   TFBR-95
8.   TFBR-438.   TFBR-348.   TFBR-22
9.   TFBR-939.   TFBR-209.   TFBR-32
10. TFBR-3210. TFBR-4010. TFBR-42
11. TFBR-8111. TFBR-8011. TFBR-80
12. TFBR-20  12. TFBR-100  12. TFBR-100
Table 26. Best sets of actions.
Table 26. Best sets of actions.
Set of Actions
Set IDTransfer FunctionsBinarization RulesAmount of actions
TFBR-5S-shaped and V-shapedElitist8
TFBR-6S-shaped and V-shapedRoulette Elitist8
TFBR-11S-shaped, V-shaped, X-shaped, and Z-shapedElitist16
TFBR-12S-shaped, V-shaped, X-shaped, and Z-shapedRoulette Elitist16
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Lemus-Romani, J.; Crawford, B.; Cisternas-Caneo, F.; Soto, R.; Becerra-Rozas, M. Binarization of Metaheuristics: Is the Transfer Function Really Important? Biomimetics 2023, 8, 400. https://doi.org/10.3390/biomimetics8050400

AMA Style

Lemus-Romani J, Crawford B, Cisternas-Caneo F, Soto R, Becerra-Rozas M. Binarization of Metaheuristics: Is the Transfer Function Really Important? Biomimetics. 2023; 8(5):400. https://doi.org/10.3390/biomimetics8050400

Chicago/Turabian Style

Lemus-Romani, José, Broderick Crawford, Felipe Cisternas-Caneo, Ricardo Soto, and Marcelo Becerra-Rozas. 2023. "Binarization of Metaheuristics: Is the Transfer Function Really Important?" Biomimetics 8, no. 5: 400. https://doi.org/10.3390/biomimetics8050400

APA Style

Lemus-Romani, J., Crawford, B., Cisternas-Caneo, F., Soto, R., & Becerra-Rozas, M. (2023). Binarization of Metaheuristics: Is the Transfer Function Really Important? Biomimetics, 8(5), 400. https://doi.org/10.3390/biomimetics8050400

Article Metrics

Back to TopTop