Next Article in Journal
Meanders on the Move: Can AI-Based Solutions Predict Where They Will Be Located?
Previous Article in Journal
Characteristics and Leak Localization of Transient Flow in Gas-Containing Water Pipelines
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Enhanced Horned Lizard Optimization Algorithm for Flood Control Operation of Cascade Reservoirs

1
College of Hydraulic Science and Engineering, Yangzhou University, Yangzhou 225008, China
2
Modern Rural Water Resources Research Institute, Yangzhou University, Yangzhou 225008, China
3
Chongqing Western Water Resources Development Co., Ltd., Chongqing 401329, China
4
Chongqing Yufa Hydraulic Research Institute Co., Ltd., Chongqing 400020, China
5
Nanjing Hydraulic Research Institute, Nanjing 210029, China
*
Author to whom correspondence should be addressed.
Water 2024, 16(17), 2458; https://doi.org/10.3390/w16172458
Submission received: 14 July 2024 / Revised: 17 August 2024 / Accepted: 27 August 2024 / Published: 29 August 2024

Abstract

:
The multi-reservoir flood control operation (MRFCO) problem is characterized by high dimensions and multiple constraints. These features pose significant challenges to algorithms aiming to solve the MRFCO problem, requiring them not only to handle high-dimensional variables effectively but also to manage constraints efficiently. The Horned Lizard Optimization Algorithm (HLOA) performs excellently in handling high-dimensional problems and effectively integrates with penalty functions to manage constraints. However, it still exhibits poor convergence when dealing with certain benchmark functions. Therefore, this paper proposes the Enhanced Horned Lizard Optimization Algorithm (EHLOA), which incorporates Circle initialization and two strategies for avoiding local optima, thereby enhancing HLOA’s convergence performance. Firstly, EHLOA was tested on benchmark functions, where it demonstrated strong robustness and scalability. Then, EHLOA was applied to the MRFCO problem at the upper section of Lanzhou of the Yellow River in China, showing excellent convergence capabilities and the ability to escape local optima. The reduction rates of flood peaks achieved by EHLOA for the two millennial floods and two decamillennial floods were 55.6%, 52.8%, 58.1%, and 56.4%, respectively. Additionally, the generated operation schemes showed that the reservoir volumes changes were reasonable, and the discharge processes were stable under EHLOA’s operation. Overall, EHLOA can be considered a reliable algorithm for addressing the MRFCO problem.

1. Introduction

As global warming intensifies, the enhancement of the hydrological cycle has led to an increased frequency of extreme precipitation events [1]. The amount of rainfall and the areas affected by these extreme precipitation events have become larger than before [2]. Moreover, some studies suggest that by the end of this century, the frequency of extreme precipitation events will increase globally by approximately 1.8 times, with a significant rise in the frequency of extreme precipitation also expected between 2041 and 2070 [3,4]. With the rising frequency and intensity of extreme precipitation, the frequency of flood events has also increased accordingly [1]. Over the past three years, several countries have experienced devastating floods. From December 2021 to early 2022, Malaysia faced one of the most severe floods in its history, with approximately 70,000 victims evacuated daily, 54 fatalities, and total losses amounting to approximately $1.46 billion [5]. In July 2021, catastrophic floods struck western Germany and Henan Province, China. In Germany, over 107,000 people were affected, 205 lives were lost, and economic losses reached $40 billion [6]. In Henan Province, the floods impacted 14.786 million people, resulting in 398 deaths and losses of $18.9 billion [6]. In 2022, unprecedented massive floods hit southern Pakistan, displacing 33 million people [7]. In summary, climate warming has led to an increase in the frequency of extreme precipitation, which directly results in a higher probability of extreme flood events. Moreover, as the frequency of extreme precipitation is expected to rise significantly in the coming decades, the losses caused by extreme flood events to humanity may become increasingly severe.
Reservoirs are crucial tools for flood control. By utilizing their flood storage capacity to store more floodwaters while ensuring their own safety, reservoirs can effectively reduce peak flood flows and mitigate downstream flood damages. When a reservoir operates independently, its flood detention capacity can be limited when dealing with large flood volumes, increasing the risk of downstream flooding [8]. Therefore, with the development of socio-economic conditions, there is a tendency to use multiple reservoirs for flood control, and a flood control system often includes several reservoirs [9]. Multi-reservoir systems are categorized into cascade reservoirs and parallel reservoirs. Both types can reduce maximum discharge, enhance flood control capacity, and lower flood risks in downstream areas through coordinated operating of multiple reservoirs [10,11]. However, this approach introduces several challenging issues during the operation process, such as how to rationally utilize the flood storage capacities of the various reservoirs and how to ensure the safety of each reservoir. Consequently, multi-reservoir flood control operation (MRFCO) is a high-dimensional, multi-constraint problem.
There are two main approaches to solving the problem of multi-reservoir flood control operation. The first approach involves the use of metaheuristic optimization algorithms [12,13,14], while the second approach uses mathematical algorithms that divide the flood control operation process into several stages for optimization [15,16]. The latter can be time-consuming and difficult to converge when dealing with long-duration flood events. In contrast, metaheuristic algorithms perform exceptionally well in high-dimensional optimization problems and are widely applied in commercial, engineering, and economic fields [17].
Solving the MRFCO problem using metaheuristic algorithms requires the establishment of an appropriate mathematical model, which typically comprises three components: the objective function, the variable bounds and constraints, and the handling of constraint violations. There are two primary methods for addressing constraint violations: employing metaheuristic algorithms with built-in constraint handling techniques [18] and adding a penalty function to the objective function [19]. The former method, though proven to work, tends to become trapped in local optima and struggles to converge, especially in high-dimensional optimization problems where the feasible region is small [20]. Additionally, it demonstrates inefficiency in high-dimensional contexts, making it less suitable for complex optimization tasks [21,22]. The latter method, the penalty function approach, is generally more efficient [23]. It assigns high penalty values to infeasible solutions, thereby forcing the algorithm to search within the feasible solution space. However, the performance of different metaheuristic algorithms when combined with penalty functions can vary [24]. Penalty functions can also cause the algorithm to get stuck in local optima in high-dimensional problems [25]. The ability to escape these local optima depends on the algorithm’s inherent capacity to overcome local optima challenges. Therefore, to effectively solve the MRFCO problem, it is crucial to find a metaheuristic algorithm that not only integrates well with the penalty function approach but also possesses a strong ability to escape local optima.
The Horned Lizard Optimization Algorithm (HLOA), proposed by Vázquez et al. [26] achieves global optimization by mathematically simulating various defensive behaviors of horned lizards. The performance of HLOA was tested on the optimization problems from IEEE CEC 2017 “Constrained Real-Parameter Optimization” [27], with variable dimensions of 10, 30, 50, and 100. The results indicated that HLOA performed best at dimensions of 50 and 100 and ranked second at dimensions of 30 and 10. It suggests that HLOA excels in handling high-dimensional constrained problems even more than low-dimensional ones. Additionally, HLOA was tested on five real-world constrained optimization problems using the penalty function method to handle constraints. The results demonstrated that HLOA delivered competitive results across all five problems and provided the best solutions for three of them. It indicates that the performance of HLOA combined with the penalty function approach is reliable.
However, HLOA still has areas for improvement. In their study on 63 commonly used unconstrained test functions, Vázquez et al. [26] found that HLOA performed poorly on some functions, becoming trapped in local optima, demonstrating that its global search capability and ability to escape local optima need enhancement.
Therefore, this paper combines three strategies to enhance HLOA’s performance, aiming to improve the algorithm’s ability to escape local optima, ensuring that it demonstrates strong robustness and convergence when handling both benchmark problems and the MRFCO problem. The novelties of this work are as follows:
  • EHLOA demonstrates better robustness compared to widely used algorithms and highly cited algorithms from the past three years on both benchmark functions and the MRFCO problem.
  • EHLOA exhibits superior convergence compared to widely used algorithms and highly cited algorithms from the past three years on both benchmark functions and the MRFCO problem.
  • The flood control scheduling process provided by EHLOA is reasonable, making it a reliable algorithm for flood control operations.
The remainder of this paper is organized as follows: Section 2 introduces an overview of the study area and constructs the flood control operation model. Section 3 presents the basic framework of HLOA and explains the improvement strategies used in EHLOA. Section 4 tests the performance of EHLOA and its reliability in flood control operation through simulations on benchmark functions and the flood control operation model. Section 5 discusses the main findings of the study, and Section 6 presents the main conclusions of the paper. The flowchart of this study is presented in Figure 1.

2. Study Area and Flood Control Operation Model

2.1. Cascade Reservoirs and Flood Data

This section will introduce the study area of this paper, including the geographic location and composition of the cascade reservoirs, as well as the flood data used in this paper.
The Yellow River, the second longest river in China, traverses nine provinces and plays a crucial role in the agriculture, industry, and ecology of northern China. Floods in the upper reaches of the Yellow River generally take place between July and September. While the fluctuations of these floods are relatively mild, they tend to last for an extended period, approximately 40–45 days.
The cascaded reservoirs formed by Longyangxia (LYX) and Liujiaxia (LJX) bear the primary flood control tasks in the upper Yellow River due to their excellent flood mitigation capacity, playing a significant role in protecting the safety of Lanzhou, the second largest city in northwest China. This study is centered at the upper section of Lanzhou of Yellow River in China, where it conducts an in-depth analysis of flood control operation for the LYX and LJX cascade reservoirs across four different design floods.
The design floods used in this paper are based on typical floods from 1964 and 1967, provided by the Yellow River Conservancy Commission of China (http://www.yrcc.gov.cn, accessed on 20 May 2024). The 1964 flood is characterized by a sharp and narrow peak shape, while the 1967 flood features a flat-topped peak shape. Their characteristics include long durations (45 days) and large flood volumes. This study includes four different design floods: flood 1 (a millennial flood based on the typical 1964 flood), flood 2 (a millennial flood based on the typical 1967 flood), flood 3 (a decamillennial flood based on the typical 1964 flood), and flood 4 (a decamillennial flood based on the typical 1967 flood). Figure 2 illustrates the flood evolution process in the upper section of the Lanzhou section of the Yellow River. Table 1 details the characteristic parameters used in this study, including the reservoir capacity at the dead water level (VL), the reservoir capacity at the design flood level (VD) and the reservoir capacity at the check flood level (VC), and the maximum allowable discharge flow (QOM).

2.2. Flood Control Operation Model of Cascade Reservoirs

2.2.1. Objective Function of Flood Control Operation

This section will present the objective function for flood control operation and explain the rationale for its use. As shown in Figure 2, the primary flood protection target for the cascade reservoirs in the upstream of the Yellow River is Lanzhou. The last large reservoir upstream of Lanzhou is LJX, and its maximum discharge directly impacts the safety of Lanzhou. If the maximum discharge from LJX is relatively low, the operation is considered successful during the process of a large flood. Therefore, the decision variables (variables to be optimized) in this model are the outflow of LYX during the operation process (QO1) and the outflow of LJX during the operation process (QO2). The known variables input into the model include the inflow rate of LYX (QI1) and the interval flows between the reservoirs during flood propagation (q1, q2, q3). The decision variables and known variables will be input into the optimization algorithm along with the objective function and constraints. The optimization algorithm will output the minimum value of the objective function and the outflow processes of LYX and LJX during the flood operation period. The operation period (T) for this model is 45 days, and there are two decision variables (QO1, QO2), making the problem dimension for this model 90 (45 × 2). Simultaneously, the reservoirs must ensure their own safety, and the maximum storage capacity during the operation process should not exceed the flood control standards for the corresponding flood frequency. The objective function and the corresponding penalty function are as follows:
  f u n = max Q O 2 t + k × p e n a l t y
p e n a l t y = t = 1 T f t + i = 1 T g t f t = 0   i f   V 1 t < V max , 1 ,   f t = V 1 t V max , 1 2   e l s e g t = 0   i f   V 2 t < V max , 2 ,   g t = V 2 t V max , 2 2   e l s e
where QO2(t) represents the discharge of LJX at the end of t period; V1 and V2 represent the reservoir volumes of LYX and LJX, respectively; and Vmax,1 and Vmax,2 represent the maximum storage capacities that LYX and LJX can reach during the flood control process, respectively.

2.2.2. Constraints of Flood Control Operation

(1)
Water balance constraint
V i t = V i t 1 + Q I i t Q O i t Δ t
where Vi(t) and Vi(t − 1) are the reservoir volumes of reservoir i at the end of t period and t − 1 period; and QIi(t) and QOi(t) are the inflow and outflow of reservoir i at the end of period t.
(2)
Outflow constraint
To ensure the safety of downstream protection objects and the stability of the downstream river channel of a reservoir, two constraints are set as follows:
Q O i t Q O i , max
Q O i t Q O i t 1 Δ Q O i , max
where QOi,max is the maximum allowable outflow of reservoir i; and ΔQOi,max is the maximum allowable fluctuation constraint for reservoir i.
(3)
Interval flow constraint
Q O i 1 , t Δ t + q i 1 , i Δ t = Q I i , t
where ∆t is equal to one day; and qi−1,i(∆t) represents the inter flow between reservoir i − 1 and reservoir i.
(4)
Reservoir storage capacity constraint
V i t V i , max
where Vi,max represents the maximum storage capacity that reservoir i can achieve during the operation process.
(5)
Initial condition constraint
V i 1 = V i 0
where Vi(0) represents the reservoir volume corresponding to the flood control level of reservoir i.
(6)
Non-negative constraint
All variables in the flood control operation model of cascade reservoirs are non-negative.

3. HLOA Algorithm

3.1. Basic HLOA Algorithm

This section will introduce the basic HLOA algorithm, including its main framework and how it is inspired by the behavior of horned lizards. There is a type of horned lizard that inhabits the region from south central United States to northeastern Mexico. These lizards are adapted to extreme temperatures in arid or semi-arid areas. Their primary passive defense method is camouflage, which includes the ability to blend into their surroundings through changes in color, pattern, and shape. Another passive defense strategy is relocation or fleeing. Additionally, when threatened, these lizards can adopt aggressive strategies such as squirting blood to deter predators. The horned lizard’s skin can lighten or darken depending on whether it needs to reduce or increase solar gain. In high temperatures, they adopt a lighter color, while in low temperatures, their skin darkens. Dark skin does not reflect any color; instead, it absorbs all wavelengths of light and converts them into heat. The rapid change in the horned lizard’s skin color is due to the effect of temperature on its alpha-melanocyte-stimulating hormone (α-MSH). Inspired by these horned lizards, Vázquez et al. [26] proposed the HLOA algorithm, which incorporates a mathematical model based on the behaviors.

3.1.1. Crypsis Behavior

The horned lizard’s skin color often changes with its external environment, this behavior can help it better hide from predators. To simulate the horned lizard’s constantly changing colors, the variability of sine and cosine functions is utilized. This variability increases the algorithm’s randomness, enhancing its ability to perform global searches. The mathematical formula for this is as follows [26]:
x i ( t + 1 ) = x b e s t ( t ) + 2 2 t Max _ iter c 1 sin ( x r 1 ( t ) ) cos ( x r 2 ( t ) ) ( 1 ) σ c 2 cos ( x r 3 ( t ) ) sin ( x r 4 ( t ) )
where x i ( t + 1 ) is the new search agent position in the solution search space for the generation t + 1; x b e s t ( t ) is the best search agent for the generation t; Max_iter represent the maximum number of iterations; and r1, r2, r3 and r4 are random numbers generated within the range of 1 to the population size. x r 1 ( t ) , x r 2 ( t ) , x r 3 ( t ) and x r 4 ( t ) are the r1, r2, r3, r4-th search agent selected; σ is a binary value, which can be either 0 or 1; and, c1, c2, with c1c2, are random numbers.

3.1.2. Skin Darkening or Lightening

Horned lizards can lighten or darken their skin depending on whether they need to reduce or increase their solar heat gain. The color changes in horned lizard skin are described by Equations (10) and (11), where Equation (10) represents the skin-lightening strategy, and Equation (11) represents the skin-darkening strategy [26].
x w o r s t ( t ) = x b e s t ( t ) + 1 2 L i g h t 1 sin x r 1 ( t ) x r 2 ( t ) ( 1 ) σ 1 2 L i g h t 2 sin x r 3 ( t ) x r 4 ( t )
x w o r s t ( t ) = x b e s t ( t ) + 1 2 D a r k 1 sin x r 1 ( t ) x r 2 ( t ) ( 1 ) σ 1 2 D a r k 2 sin x r 3 ( t ) x r 4 ( t )
where x w o r s t ( t ) is the worst search agent for the generation t; and Light1, Light2, Dark1, Dark2 are random numbers.

3.1.3. Blood-Squirting

Horned lizards defend themselves by squirting blood from their eyes to deter predators. This defensive behavior is defined as a projectile motion. By utilizing projectile motion, the current solution is combined with the best solution, allowing the algorithm to move closer to the optimal solution while maintaining population diversity. The mathematical formula as follows [26]:
x i ( t + 1 ) = cos π 2 t Max _ iter + ε 1 x b e s t ( t ) + sin π 2 π 2 t Max _ iter g + ε 1 x i ( t )
where ε1 is set to 1 × 10−6 g is set to 0.009807 to represent the gravity of the earth; and x i ( t ) is the current search agent.

3.1.4. Move-to-Escape

Horned lizards can move quickly and randomly in nature to evade predators. A function that includes both local and global movements is introduced to simulate this behavior. This combination of local and global movements reduces the likelihood of the algorithm becoming trapped in local optima [26]:
x i ( t + 1 ) = x b e s t ( t ) + w a l k ( 1 2 ε 2 ) x i ( t )
where walk is a random number generated between −1 and 1; ε2 is a random number generated from a standard Cauchy distribution with the mean and standard deviation set to 0 and 1.

3.1.5. Alpha Melanophore Stimulating Hormone (α-MSH) Rate

The color change in horned lizard skin can be attributed to the effect of temperature on melanophore. Inspired by this behavior, the rate of melanophore is introduced to assess the quality of the current solution, determining whether the solution enhancement procedure needs to be executed. The rate of melanophore activity in horned lizards is defined as follows [26]:
m e l a n o p h o r e ( i ) = F i t n e s s max F i t n e s s ( i ) F i t n e s s max F i t n e s s min
where Fitnessmin and Fitnessmax are the best and the worst fitness values in the current t generation, respectively; and Fitness(i) is the current fitness value of the i-th search agent.
The melanophore activity rate is a value within the interval [0, 1]. If its value is less than 0.3, the search agent will be replaced.
x i ( t ) = x b e s t ( t ) + 1 2 [ x r 1 ( t ) ( 1 ) σ x r 2 ( t ) ]
The flowchart of HLOA is shown in Figure 3.

3.2. Enhanced HLOA Algorithm

To enhance HLOA’s convergence capability, chaotic initialization and two solution enhancement strategies were adopted. Chaotic initialization can generate higher-quality initial solutions, helping the algorithm converge to smaller values within a limited number of iterations. The two solution enhancement strategies can increase the algorithm’s ability to escape local optima.

3.2.1. Circle Map Initialization

Circle map initialization is a type of chaotic initialization that effectively helps the algorithm generate higher-quality solutions during the initialization phase. Due to the ergodicity and randomness of chaotic search, it can easily escape local optima. Therefore, chaotic initialization is often incorporated into metaheuristic optimization algorithms [28]. Chaos can enhance the algorithm’s performance on benchmark functions [29,30] and improve its efficiency in solving engineering problems [31]. It also makes the algorithm perform exceptionally well in handling high-dimensional optimization problems [32]. The Circle map has been proven to be one of the better chaotic mapping methods [33]. Therefore, in EHLOA, the Circle map is used for initialization instead of random initialization [33].
x i + 1 = x i + b a 2 π sin 2 π x i mod 1 x n j = l b + x i + 1 × u b l b ,   n = 1 , 2 , , N p   and   j = 1 , 2 , ,   dim
where a and b are set to 0.5 and 0.2, respectively; xi+1 is a number obtained through the circle map; xi is a number obtained through random initialization. The mod (1) ensures that the value of xi+1 stays within the range of 0 to 1; x n j represents the initial position of the n th search agent’s j th search variable; lb and ub represent the lower and upper bounds of the problem to be solved, respectively; NP represents the population size of the algorithm; and dim represents the number of decision variables.

3.2.2. Trap Escaping Operator (TEO)

Trap Escaping Operator (TEO) is a strategy designed to help the algorithm avoid becoming trapped in the local optima. In HLOA, Strategies 4 and 5 can be considered as enhancing the quality of the population to increase the likelihood of escaping local optima. However, regarding Strategy 5 in HLOA and its Equation (15), although it includes random numbers, it may not be sufficient to allow the population to escape local optima. Moreover, it completely ignores the role of the current solution, which may reduce the diversity of the population in the early stages of iteration. Therefore, TEO is used to replace Equation (15). The essence of TEO is to generate enhanced quality solutions by combining the best position, the current velocity position, and the average position of each dimension. The parameters μ1 and μ2 in TEO are highly random, making it easier for the population to escape local optima and contributing to increased diversity within the population. The parameter δ is designed to maintain a balance between exploration and exploitation within the population. The TEO formula is inspired by the TAO strategy in the Newton–Raphson-based optimizer [34]. The mathematical expression of the TEO is as follows:
δ = 1 2 × t Max _ iter 5 μ 1 = β × 3 × r a n d + ( 1 β ) μ 2 = β × r a n d + ( 1 β ) x i ( t + 1 ) = x b e s t ( t ) + 2 r a n d 1 μ 1 x b e s t ( t ) μ 2   x i ( t ) + r a n d 0.5 δ μ 1 x a v g ( t ) μ 2 x i ( t )
where t represents the current iteration number; μ1 and μ2 are random numbers based on β; β denotes a binary number, either 1 or 0; rand denotes the random number; and x a v g ( t ) is a vector obtained by combining the average positions of all search agents in each dimension.

3.2.3. Sudden Attack Model

Horned lizards possess the ability to crypsis, which not only confuses predators but also serves as an excellent tool for hunting prey. Their color closely matches their surroundings, making them difficult to detect. When they spot their prey, they often lie in wait, seizing the moment when the prey is unaware, and then use their tongues to capture and devour the prey. Inspired by this unique hunting behavior, a sudden attack mathematical model was established to mimic this behavior. The sudden attack can enable the algorithm to systematically change the search step length and direction, helping to increase population diversity and escape local optima. The mathematical model for sudden attack is as follows:
W h i l e   i t e r = 25 , 50 , 75   x i ( t + 1 ) = x i ( t ) 1 + γ 0.5 r a n d
where γ is set to 6.
The pseudocode of EHLOA is presented in Table 2.

4. Experiments and Results

The experimental simulations in this section were conducted on a laptop equipped with the macOS Sonoma operating system, featuring 8 GB of RAM and an Apple M1 chip. The simulations were carried out using MATLAB R2023a. To evaluate the performance of EHLOA, it will be compared with HLOA and three classical algorithms widely used in engineering problems: Grey Wolf Optimizer (GWO) [35], Whale optimization algorithm (WOA) [36], Particle swarm optimization (PSO) [37], as well as three highly cited algorithms proposed in the last three years: Honey badger algorithm (HBA) [38], Golden jackal optimization algorithm (GJO) [39], and Dwarf mongoose optimization algorithm (DMO) [40].

4.1. Experiments 1: In Benchmark Functions

In this section, the tests will be conducted using the F1–F13 functions from the CEC2005 benchmark set [41], where F1–F7 are unimodal test functions and F8–F13 are multimodal test functions. To assess the robustness of the algorithms, these test functions will have dimensions of 30, 100. All algorithms will independently run 30 times on these test functions. The maximum number of iterations for each algorithm will be set to 1000, and the population size will be set to 30. The detailed expressions and optimal values of the test functions are provided in Table A1 in the Appendix A, and the important parameter settings for the algorithms are consistent with the settings in their references—please refer to [35,36,37,38,39,40]. Table A2 and Table A3 in the Appendix A present the minimum values, mean values, and standard deviations obtained by eight algorithms after 30 independent runs on benchmark functions with 30 and 100 dimensions, respectively. To enhance readability, the best results for each of the three statistical indicators on each benchmark function are highlighted.
As shown in Table A2 in the Appendix A, EHLOA achieved the best minimum values for all benchmark functions except F12. It also obtained the best mean values for all benchmark functions except F6 and F12, and the best standard deviations for all benchmark functions except F6, F8, and F12. From Table A3 in the Appendix A, it can be seen that EHLOA achieved the best minimum values and mean values in all cases under the 100-dimensional benchmark functions. Additionally, EHLOA obtained the best standard deviations for all benchmark functions except F6 and F13.
To comprehensively evaluate the performance of EHLOA, Wilcoxon signed-rank tests [42] were conducted to compare EHLOA’s results on each benchmark function with those of the comparison algorithms. This test determines whether there are statistically significant differences between EHLOA and the comparison algorithms on the benchmark functions. The tests were performed at the 5% significance level. When the p-value is less than 0.05, the result is denoted as “+” or “−”. “+” indicates that EHLOA performs better on the given benchmark function, while “−” indicates that EHLOA performs worse. When the p-value is greater than 0.05, the result is denoted as “=“, indicating that EHLOA and the comparison algorithm have similar performance on the given benchmark function. Table A4 and Table A5 in Appendix A present the p-values and Wilcoxon signed-rank test results for the 30-dimensional and 100-dimensional benchmark functions, respectively.
It can be found from Table A4 in Appendix A that EHLOA performs worse than the comparison algorithm HBA only on F6 and F12 for the 30-dimensional benchmark functions. The remaining results indicate that EHLOA’s performance is not inferior to the comparison algorithms, and it outperforms them in most cases. Specifically, EHLOA outperforms HLOA and HBA 8 times, GWO and PSO 12 times, WOA and GJO 10 times, and it outperforms DMO on all benchmark functions. In Table A5 in the Appendix A, EHLOA does not perform worse than any of the comparison algorithms on any benchmark function for the 100-dimensional benchmark functions. Specifically, EHLOA outperforms HLOA 8 times, GWO 12 times, WOA, HBA, and GJO 10 times, and it outperforms PSO and DMO on all benchmark functions.

4.2. Experiment 2: In the Flood Control Operation Model

In this section, the performance of 8 algorithms will be analyzed after independently running the flood control operation model 30 times under the conditions of a population size of 100 and a maximum of 1000 iterations.
Table 3 presents the minimum and mean values of the objective function obtained by EHLOA and the comparison algorithms after 30 independent runs on four typical flood datasets. In Table 3, the best value in each row is highlighted in bold, and N/A indicates that the algorithm could not find a feasible solution. As shown in Table 3, EHLOA achieved the best minimum and mean values across all four floods. Except for Flood 2, EHLOA’s minimum values after 30 runs were more than 40 lower than the second-best algorithm’s minimum values in the other three floods. However, in Flood 2, EHLOA’s minimum value was only slightly lower than that of HLOA. In Flood 1, EHLOA had the largest lead in mean value, outperforming the second-best HLOA by more than 100. In Flood 3, EHLOA’s lead in the mean value was the smallest, just slightly better than GWO. In both Flood 2 and Flood 4, EHLOA’s mean values were more than 20 lower than the second-best mean values.
Figure 4a,b shows the iterative processes of EHLOA, HLOA, HBA, GWO, WOA, and GJO when operating flood 1 and flood 2, respectively. These figures present the iterative process for the minimum fitness values. Please note that due to the large penalty function coefficients, fitness values exceeding 10,000 are uniformly replaced with a fitness value of 10,000. Additionally, the value 4510 is marked in the figure, representing the discharge limit of LJX under a millennial flood. Values below 4510 indicate that the algorithm has found a feasible region. From Figure 4a, it can be seen that the fitness values for all six algorithms exceed 10,000 at the start of the iterations. However, EHLOA quickly converges to below 4510 and achieves the best fitness value at the end of the iterations. Observing the iterative curves of GWO, GJO, and WOA, it is evident that they remain at the value of 4510 for an extended period, Additionally, GJO and GWO converge to 4510 significantly slower than the other four algorithms. As observed in Figure 4b, EHLOA starts with a fitness value around 4510, while the other five algorithms have initial fitness values exceeding 10,000. Moreover, the fitness values for both GWO and GJO do not drop below 10,000 until after 800 iterations. By the end of the iterations, the fitness values of EHLOA and HLOA are nearly the same and are better than those of the other four algorithms.
Figure 5a,b shows the iterative processes of EHLOA, HLOA, HBA, GWO, WOA, GJO, PSO, and DMO when operating flood 3 and flood 4, respectively. These figures present the iterative process for the minimum fitness values too. As shown in Figure 5a,b, EHLOA starts with a fitness value that is more than 300 lower than the other seven algorithms at the beginning of the operation process. Except for DMO, EHLOA has the fastest convergence rate. Although DMO converges quickly, its final fitness values in Figure 5a,b are much higher than those of EHLOA. Additionally, EHLOA achieves the best fitness values for both flood 3 and flood 4, maintaining a noticeable lead over the second-best algorithm.

4.3. Analysis of the Flood Control Operation Process Obtained by EHLOA

In this section, the scheme with the smallest fitness value obtained by EHLOA when operating four floods will be analyzed. Table 4 presents the best peak reduction rates achieved by EHLOA for four floods. As shown in Table 4, under EHLOA operation, the peak reduction rates of the cascade reservoirs are all above 50%, with higher peak reduction rates for the peak-shaped floods compared to the flat-topped floods.
Figure 6 and Figure 7 illustrate the variations in reservoir storage capacity, inflow, and discharge flow for floods 1 to 2, respectively. To better demonstrate the flood control effectiveness of the reservoir, the inflow of LJX uses the design flood, rather than the outflow from LYX during the operating process. Due to the peak shape and operating process of the decamillennial floods (flood 3 and flood 4) being essentially the same as those of the millennial floods, their detailed operating processes are included in Appendix B without further analysis.
Figure 6a shows that the pre-release period for LJX lasts up to 11 days, with its storage capacity being pre-released to 2.38 million m3 on the 11th day. LYX and LJX approach their flood control storage capacities (VL), on the 27th and 24th days, respectively. After this, the storage capacities gradually decrease, but LYX’s storage capacity rises again on the 40th day, while LJX’s storage capacity rises again on the 41st and 42nd days. Figure 5b indicates that LYX’s maximum inflow occurs on the 22nd day, after which the inflow gradually decreases. However, LYX’s inflow rate significantly increases again between the 38th and 41st days. The discharge process for LYX exhibits noticeable fluctuations but does not exceed the fluctuation constraint of 1000 m3/s. Figure 6c illustrates that LJX’s maximum inflow occurs on the 17th day, after which the inflow gradually decreases. However, LJX’s inflow rate significantly increases again on the 41st and 42nd days, rising to 5164 m3/s on the 42nd day. Overall, the discharge process for LJX is stable, with no significant fluctuations except on the 37th day.
Figure 7a shows that the pre-release period for LJX lasts 9 days, with its storage capacity being pre-released to 2.46 billion m3 on the 9th day. LYX and LJX approach their flood control storage capacities (VL), on the 29th day, and there is no significant rebound in their storage capacities afterward. Figure 7b indicates that LYX’s maximum inflow occurs on the 19th day. Although the inflow decreases between the 20th and 24th days, there are noticeable increases on the 22nd and 24th days. After the 24th day, LYX’s inflow declines rapidly, with a slight increase on the 43rd day, but it does not exceed 3000 m3/s. LYX’s discharge exhibits considerable fluctuations from the 1st to the 27th day, but these do not exceed the fluctuation constraint. After the 27th day, LYX’s discharge becomes stable with no significant fluctuations. Figure 7c illustrates that LJX’s maximum inflow occurs on the 20st day, followed by a gradual decrease. However, there is a noticeable increase on the 23rd day. Although there are rebounds after the 35th day, the inflow does not exceed 3600 m3/s.

5. Discussion

5.1. Robustness and Scalability of EHLOA

EHLOA demonstrates a good scalability. Comparing the results from Table A2, Table A3, Table A4 and Table A5 in the Appendix A, it can be seen that EHLOA’s performance on the 100-dimensional benchmark functions is even better than on the 30-dimensional ones. For the 30-dimensional benchmark functions, HBA was able to achieve the best minimum values and means on F6 and F12. However, for the 100-dimensional benchmark functions, EHLOA achieved the best minimum values and means across all benchmark functions. Additionally, according to the Wilcoxon test results in Table A4 and Table A5 in Appendix A, EHLOA outperformed the comparison algorithms three more times on the 100-dimensional problems than on the 30-dimensional ones. Interestingly, according to the results from Table A2 and Table A3 in Appendix A, EHLOA’s average and minimum values on benchmark functions F5 and F13 are lower for the 100-dimensional problems than for the 30-dimensional ones. This demonstrates that EHLOA’s performance does not degrade with increasing problem dimensionality and may even excel in handling high-dimensional problems.
EHLOA has demonstrated a good robustness. As shown in Table A2 and Table A3 in Appendix A, the comparison algorithms performed poorly on the unimodal function F5 and the multimodal function F8, with the minimum and mean values after 30 runs being significantly distant from the theoretical optimal values. On F5, the mean value of EHLOA is below 0, while the mean values of all comparison algorithms are above 20. On F8, the minimum values of all comparison algorithms, except for WOA, are more than 10,000 away from the theoretical optimal value after 30 runs, whereas the minimum value of EHLOA equals the theoretical optimal value. F5 and F8 present a substantial challenge due to the presence of numerous local optima, causing many algorithms to become trapped in these local optima, resulting in poor performance [43,44]. EHLOA’s excellent performance on the most challenging unimodal and multimodal functions in the CEC2005 test set demonstrates its ability to handle different types of problems, verifying its robustness and ability to escape local optima.

5.2. Reliability of EHLOA in a Multi-Reservoir Flood Control Operation

From Table 3, it can be seen that whether it is a millennial flood (flood 1, flood 2) or a decamillennial flood (flood 3, flood 4), the mean objective function value for operating peak-shaped floods (flood 1, flood 3) are lower than those for operation flat-topped floods (flood 2, flood 4) for all algorithms. This indicates that flat-topped floods are more difficult to operate than peak-shaped floods. EHLOA achieved the lowest mean fitness values and lowest minimum values in all four floods, demonstrating its good robustness in the MRFCO problem. It performs best regardless of whether it is operation peak-shaped or flat-topped floods. The fitness curves corresponding to the best fitness values of each algorithm for the four floods show that EHLOA consistently obtained the lowest best fitness values, further illustrating its excellent robustness in the MRFCO problem.
The significantly lower initial fitness values of EHLOA compared to the other algorithms when operating floods 2 to 4 suggest that the Circle map initialization strategy likely enables EHLOA to find feasible solutions in less time for the MRFCO problem. EHLOA exhibited the fastest convergence speed and the highest convergence accuracy (lowest fitness value) across all four floods, indicating strong convergence performance in the MRFCO problem.
Additionally, when operating flood 1, the fitness values of GWO, WOA, and GJO remained at 4510 for an extended period. This is because 4510 is the discharge limit of LJX for a millennial flood; a fitness value of 4510 implies that the algorithm releases a large flow to prevent LYX and LJX from exceeding their flood control capacity, resulting in a penalty function value of 0. However, the final operation results show that fitness values can be below 4510, indicating that 4510 is a local optimum. The iterative curve of EHLOA did not stay at 4510, illustrating that EHLOA has a strong ability to escape local optima in the MRFCO problem and can effectively integrate with penalty functions to handle constraints.
From the flood operation results and the operation process, the schemes provided by EHLOA are reliable. Firstly, under the operation of EHLOA, the peak reduction rates of the cascade reservoirs for all four floods are above 50%, proving that EHLOA has strong peak reduction capabilities for different types of floods. Secondly, the discharge processes of LJX are very stable, which greatly protects the stability of downstream slopes of the cascade reservoirs.
Finally, the changes in storage capacity of LYX and LJX during the operating of flood 1 and flood 2 show significant differences. The pre-release period for flood 1 is two days longer than that for flood 2, due to the much larger total flood volume in the first 10 days of the 1967 design flood compared to the 1964 design flood. During the operating of flood 1, both LYX and LJX exhibit a noticeable rebound in storage capacity towards the end of the operating period, whereas this phenomenon does not occur during the operating of flood 2. This is because the total flood volume in the last 10 days of the 1964 design flood is much larger than that of the 1967 design flood. Therefore, the 1964 design flood is characterized by smaller early and peak flows but larger later flows, while the 1967 design flood has larger early and peak flows but smaller later flows. EHLOA can flexibly adjust the pre-release duration and provide different operating schemes based on the varying flood patterns of these two types of floods.

6. Conclusions

The main conclusions of this paper are summarized as follows:
(1) EHLOA has excellent robustness and scalability.
(2) EHLOA can be considered a reliable algorithm for solving multi-reservoir flood control operation problems.
The methods used in this paper to enhance EHLOA’s performance are improving the quality of initial solutions and strengthening the ability to escape local optima. However, balancing exploration and exploitation is also crucial for metaheuristic algorithms. Therefore, future work will analyze the exploration-to-exploitation ratio of HLOA to determine if improvements are needed. Additionally, EHLOA will be tested on more benchmark functions and applied to parallel reservoir flood control operation to further validate its performance.

Author Contributions

Conceptualization, C.L. and Y.X.; methodology, C.L.; software, S.L.; validation, C.L., Y.X. and S.L.; formal analysis, J.Q.; investigation, Y.X.; resources, C.L.; data curation, J.W.; writing—original draft preparation, C.L.; writing—review and editing, Y.X.; visualization, H.F.; supervision, H.D.; project administration, Y.X.; funding acquisition, Y.X. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by 2024 Yangzhou University Humanities and Social Sciences Research Fund Project (Grant No. xjj2024-38), National Natural Science Foundation of China (Grant No. 42401010), The Natural Science Foundation of the Jiangsu Higher Education Institutions of China (Grant No. 24KJB570005), Chongqing Water Conservancy Science and Technology Project (Grant No. CQSLK-2023007), National Natural Science Foundation of China (Grant No. 52379027; and Grant No. 52379016).

Data Availability Statement

The data presented in this study are available upon request from the corresponding author. The processed data are not publicly available as the data also form part of an ongoing study.

Conflicts of Interest

Author Jiyao Qin was employed by the company Chongqing Western Water Resources Development Co., Ltd., author Jianfeng Wei was employed by the company Chongqing Yufa Hydraulic Research Institute Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Abbreviations

Common abbreviations and their full names used in this paper:
AbbreviationFull NameType
EHLOAEnhanced Horned Lizard Optimization AlgorithmAlgorithm
HLOAHorned Lizard Optimization AlgorithmAlgorithm
GWOGrey Wolf OptimizerAlgorithm
WOAWhale optimization algorithmAlgorithm
PSOParticle swarm optimizationAlgorithm
HBAHoney badger algorithmAlgorithm
GJOGolden jackal optimization algorithmAlgorithm
DMODwarf mongoose optimization algorithmAlgorithm
LYXLongyangxiaReservoir
LJXLiujiaxiaReservoir

Appendix A

Table A1. Details of the benchmark function.
Table A1. Details of the benchmark function.
FunDimensionRangeTheoretical
Optimization Value
f 1 x = i = 1 n x i 2 30/100[−100, 100]0
f 2 x = i = 1 n x i + i = 1 n x i 30/100[−10, 10]0
f 3 x = i = 1 n i = 1 i x i 2 2 30/100[−100, 100]0
f 4 x = max x i , 1 i n 30/100[−100, 100]0
f 5 x = i = 1 n 100 x i + 1 x i 2 2 + x i 1 2 30/100[−30, 30]0
f 6 x = i = 1 n x i + 0.5 2 30/100[−100, 100]0
f 7 x = i = 1 n i x i 4 + r a n d o m [ 0 , 1 ) 30/100[−1.28, 1.28]0
f 8 x = i = 1 n x i sin x i 30/100[−500, 500]418.9829 × Dimension
f 9 x = i = 1 n x i 2 10 cos 2 π x i + 10 30/100[−5.12, 5.12]0
f 10 x = 20 exp 0.2 1 n i = 1 n x i 2 exp 1 n i = 1 n cos 2 π x i + 20 + e 30/100[−32, 32]0
f 11 x = 1 + 1 400 i = 1 n x i 2 i = 1 n cos x i i + 1 30/100[−600, 600]0
f 12 ( x ) = π n 10 sin 2 π y i + i = 1 n 1 y i 1 2 1 + 10 sin 2 π y i + 1 + y n 1 2 + i = 1 n u x i , 10 , 100 , 4 y i = 1 + 1 4 x i + 1 u x i , a , k , m = k x i a m , x i > a , 0 , a x i a , k x i a m , x i < a . 30/100[−50, 50]0
f 13 x = 0.1 sin 2 3 π x 1 + i = 1 n x i 1 2 1 + sin 2 3 π x i + 1 + x n 1 1 + sin 2 2 π x n + i = 1 n u x i , 5 , 100 , 4 30/100[−50, 50]0
Table A2. Optimization results of EHLOA and comparison algorithms on benchmark functions (dimensions = 30).
Table A2. Optimization results of EHLOA and comparison algorithms on benchmark functions (dimensions = 30).
Fun.IndexEHLOAHLOAGWOWOAPSOHBAGJODMO
F1Min002.85 × 10−617.49 × 10−1673.25 × 10−65.06 × 10−2884.08 × 10−1171.02 × 10−4
Mean007.68 × 10−591.48 × 10−1484.50 × 10−51.33 × 10−2761.25 × 10−1104.35 × 10−4
Std002.25 × 10−587.39 × 10−1486.73 × 10−506.81 × 10−1103.35 × 10−4
F2Min08.99 × 10−2641.58 × 10−359.65 × 10−1158.69 × 10−58.21 × 10−1522.99 × 10−683.21 × 10−4
Mean01.06 × 10−2431.16 × 10−342.79 × 10−1000.331.06 × 10−1462.20 × 10−667.69 × 10−3
Std009.46 × 10−351.53 × 10−991.832.68 × 10−1463.49 × 10−661.28 × 10−2
F3Min003.92 × 10−202.29 × 1031.76 × 1024.71 × 10−2181.34 × 10−491.81 × 104
Mean007.19 × 10−142.04 × 1048.11 × 1024.01 × 10−2005.9 × 10−385.14 × 104
Std003.73 × 10−131.06 × 1041.29 × 10302.47 × 10−371.45 × 104
F4Min03.62 × 10−2551.05 × 10−157.7 × 10−12.476.05 × 10−1241.66 × 10−363.54 × 102
Mean02.71 × 10−2392.03 × 10−143.50 × 1014.555.23 × 10−1175.88 × 10−334.54 × 102
Std003.68 × 10−142.93 × 1019.6 × 1012.12 × 10−1162.08 × 10−324.82
F5Min2.95 × 10−124.13 × 10−42.62 × 1012.69 × 1012.02 × 1012.11 × 1012.62 × 1013.57 × 102
Mean4.25 × 10−22.2 × 1012.71 × 1012.73 × 1011.83 × 1022.18 × 1012.75 × 1012.43 × 103
Std2 × 10−21.23 × 1017.62 × 10−16.28 × 10−15.42 × 1024.56 × 10−17.43 × 10−12.24 × 103
F6Min3.13 × 10−115.89 × 10−61.64 × 10−51.04 × 10−24.07 × 10−62.62 × 10−91.59.28 × 10−5
Mean1.95 × 10−51.72 × 10−45.24 × 10−11.09 × 10−16.39 × 10−51.97 × 10−82.754.93 × 10−4
Std2.55 × 10−51.91 × 10−42.89 × 10−11.18 × 10−19.14 × 10−51.06 × 10−74.71 × 10−12.99 × 10−4
F7Min1.54 × 10−63.44 × 10−62.05 × 10−44.28 × 10−59.03 × 10−33.71 × 10−54.99 × 10−55.1 × 10−2
Mean4.70 × 10−51.53 × 10−49.20 × 10−41.36 × 10−32.41 × 10−21.65 × 10−31.89 × 10−58.25 × 10−2
Std3.94 × 10−51.48 × 10−44.43 × 10−41.52 × 10−37.63 × 10−31.02 × 10−41.31 × 10−41.74 × 10−2
F8Min−12,569.487−10,417.75−7318.73−12,569.486−8897.80−10,291.76−6410.95infinity
Mean−11,525.40−7412.19−6039.21−11,330.87−7793.66−8865.33−3928.43infinity
Std1548.62995.25718.531633.55539.36952.321053.01infinity
F9Min00002.36 × 101001.25 × 102
Mean008.1 × 10−104.38 × 101002.02 × 102
Std002.1301.67 × 101002.56 × 101
F10Min4.4 × 10−164.4 × 10−167.55 × 10−154.4 × 10−163.1 × 10−44.4 × 10−163.99 × 10−155.91 × 10−3
Mean4.4 × 10−164.4 × 10−161.59 × 10−144.1 × 10−158.1 × 10−34.4 × 10−164.47 × 10−151.53 × 10−2
Std003.02 × 10−152.37 × 10−151.86 × 10−201.23 × 10−151.63 × 10−2
F11Min00008.05 × 10−6001.49 × 10−3
Mean001.38 × 10−301.85 × 10−2005.98 × 10−2
Std004.55 × 10−308.08 × 10−3001.1 × 10−1
F12Min1.98 × 10−99.66 × 10−89.14 × 10−36.33 × 10−47.28 × 10−84.55 × 10−107.84 × 10−26.21
Mean1.69 × 10−66.92 × 10−34.24 × 10−26.08 × 10−36.22 × 10−21.66 × 10−82.63 × 10−11.53 × 101
Std2.16 × 10−62.6 × 10−22.56 × 10−25.29 × 10−31.03 × 10−13.97 × 10−81.79 × 10−15.03
F13Min4.49 × 10−86.04 × 10−71.00 × 10−13.83 × 10−22.63 × 10−61.12 × 10−71.209.91
Mean1.73 × 10−21.18 × 10−15.34 × 10−12.44 × 10−13.49 × 10−31.51 × 10−11.612.86 × 101
Std6.55 × 10−23.81 × 10−12.10 × 10−11.50 × 10−15.06 × 10−31.85 × 10−12.41 × 10−13.37 × 101
Table A3. Optimization results of EHLOA and comparison algorithms on benchmark functions (dimensions = 100).
Table A3. Optimization results of EHLOA and comparison algorithms on benchmark functions (dimensions = 100).
Fun.IndexEHLOAHLOAGWOWOAPSOHBAGJODMO
F1Min001.58 × 10−301.17 × 10−1661.60 × 1025.26 × 10−2624.55 × 10−621.97 × 105
Mean002.63 × 10−291.05 × 10−1486.46 × 1027.56 × 10−2485.52 × 10−602.51 × 105
Std004.42 × 10−295.75 × 10−1481.83 × 10301.19 × 10−592.27 × 105
F2Min08.25 × 10−2592.19 × 10−188.62 × 10−1136.068.56 × 10−1385.51 × 10−381.62 × 1016
Mean02.36 × 10−2396.54 × 10−183.83 × 10−1032.08 × 1016.82 × 10−1324.71 × 10−377.98 × 1034
Std003.04 × 10−181.99 × 10−1021.20 × 1013.41 × 10−1311.65 × 10−362.96 × 1035
F3Min002.00 × 10−25.44 × 1064.34 × 1041.57 × 10−1863.85 × 10−197.15 × 105
Mean009.958.87 × 1066.45 × 1044.02 × 10−1652.00 × 10−41.06 × 106
Std001.92 × 1011.58 × 1061.30 × 10406.00 × 10−32.23 × 105
F4Min03.40 × 10−2563.87 × 10−51.79 × 1012.60 × 1019.63 × 10−896.92 × 10−139.27 × 101
Mean05.82 × 10−2411.00 × 10−27.67 × 1013.34 × 1017.27 × 10−831.539.53 × 101
Std004.00 × 10−22.26 × 1013.092.18 × 10−825.201.04
F5Min9.09 × 10−114.13 × 10−49.59 × 1019.67 × 1011.61 × 1049.24 × 1019.62 × 1029.64 × 108
Mean8.59 × 10−42.20 × 1019.77 × 1019.77 × 1015.59 × 1049.57 × 1019.82 × 1011.12 × 109
Std2.58 × 10−31.23 × 1018.00 × 10−14.40 × 10−13.23 × 1041.996.02 × 10−18.29 × 107
F6Min2.91 × 10−105.89 × 10−66.749.10 × 10−11.23 × 1022.241.55 × 1011.99 × 105
Mean9.21 × 10−51.72 × 10−49.112.136.74 × 1024.161.68 × 1012.43 × 106
Std1.15 × 10−51.91 × 10−41.029.51 × 10−11.83 × 1038.41 × 10−18.36 × 10−12.11 × 105
F7Min1.34 × 10−63.44 × 10−61.14 × 10−36.55 × 10−55.33 × 10−12.44 × 10−55.31 × 10−51.06 × 103
Mean9.21 × 10−51.53 × 10−42.43 × 10−31.31 × 10−38.10 × 10−12.68 × 10−45.98 × 10−41.77 × 103
Std1.15 × 10−51.48 × 10−41.21 × 10−31.53 × 10−31.70 × 10−12.92 × 10−44.33 × 10−42.08 × 102
F8Min−41,898.29−25,513.15−20,216.25−41,897.14−25,484.57−28,539.74−16,502.35Inf
Mean−37,887.25−22,227.35−15,699.06−37,799.01−21,852.99−24,870.91−9351.13Inf
Std5381.911793.713511.175440.291453.263297.173940.74Inf
F9Min002.27 × 10−1302.09 × 1020.01.45 × 103
Mean003.71 × 10−13.78 × 10−152.94 × 102001.57 × 103
Std001.122.07 × 10−143.97 × 101005.36 × 101
F10Min4.44 × 10−164.44 × 10−169.99 × 10−144.44 × 10−163.584.44 × 10−167.55 × 10−152.05 × 102
Mean4.44 × 10−164.44 × 10−161.13 × 10−133.28 × 10−154.812.669.44 × 10−152.08 × 102
Std001.10 × 10−142.36 × 10−151.286.892.91 × 10−159.45 × 10−2
F11Min00002.47001.91 × 103
Mean002.8 × 10−306.47002.24 × 103
Std008.6 × 10−301.65001.53 × 102
F12Min1.33 × 10−139.66 × 10−81.38 × 10−17.23 × 10−31.96 × 1012.59 × 10−24.71 × 10−11.76 × 109
Mean5.43 × 10−71.04 × 10−32.55 × 10−11.68 × 10−29.66 × 1014.52 × 10−26.19 × 10−12.71 × 109
Std6.12 × 10−75.68 × 10−37.55 × 10−26.3 × 10−32.25 × 1021.45 × 10−27.49 × 10−23.07 × 108
F13Min2.49 × 10−91.28 × 10−55.587.62 × 10−16.23 × 1025.777.883.89 × 109
Mean7.60 × 10−39.41 × 10−36.291.977.32 × 1037.418.464.93 × 109
Std4.06 × 10−22.61 × 10−23.38 × 10−17.41 × 10−17.50 × 1037.95 × 10−12.95 × 10−13.96 × 109
Table A4. Wilcoxon signed-rank test simulation results: EHLOA and comparative algorithms on benchmark functions (dimensions = 30).
Table A4. Wilcoxon signed-rank test simulation results: EHLOA and comparative algorithms on benchmark functions (dimensions = 30).
Fun.IndexHLOAGWOWOAPSOHBAGJODMO
F1p-value11.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−6
+/=/−=++++++
F2p-value1.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−6
+/=/−+++++++
F3p-value11.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−6
+/=/−=++++++
F4p-value1.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−6
+/=/−+++++++
F5p-value1.74 × 10−44.86 × 10−54.86 × 10−52.35 × 10−65.31 × 10−52.35 × 10−61.73 × 10−6
+/=/−+++++++
F6p-value2.16 × 10−51.73 × 10−61.73 × 10−61.04 × 10−31.92 × 10−61.73 × 10−61.73 × 10−6
+/=/−++++++
F7p-value5.31 × 10−51.73 × 10−62.13 × 10−61.73 × 10−63.18 × 10−61.73 × 10−61.73 × 10−6
+/=/−+++++++
F8p-value1.73 × 10−61.73 × 10−611.73 × 10−66.64 × 10−41.73 × 10−61.73 × 10−6
+/=/−++=++++
F9p-value13.13 × 10−211.73 × 10−6111.73 × 10−6
+/=/−=+=+==+
F10p-value11.73 × 10−67.12 × 10−61.73 × 10−611.73 × 10−61.73 × 10−6
+/=/−=+++=++
F11p-value10.2511.73 × 10−6111.73 × 10−6
+/=/−===+==+
F12p-value8.31 × 10−41.73 × 10−61.73 × 10−69.32 × 10−61.73 × 10−61.73 × 10−61.73 × 10−6
+/=/−++++++
F13p-value1.25 × 10−21.73 × 10−66.98 × 10−60.322.22 × 10−41.73 × 10−61.73 × 10−6
+/=/−+++=+++
Total(+/=/−)8/5/012/1/010/3/012/1/08/3/210/3/013/0/0
Table A5. Wilcoxon signed-rank test simulation results: EHLOA and comparative algorithms on benchmark functions (dimensions = 100).
Table A5. Wilcoxon signed-rank test simulation results: EHLOA and comparative algorithms on benchmark functions (dimensions = 100).
Fun.IndexHLOAGWOWOAPSOHBAGJODMO
F1p-value11.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−6
+/=/−=++++++
F2p-value1.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−6
+/=/−+++++++
F3p-value11.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−6
+/=/−=++++++
F4p-value1.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−6
+/=/−+++++++
F5p-value2.35 × 10−61.73 × 10−64.86 × 10−52.35 × 10−61.73 × 10−61.73 × 10−61.73 × 10−6
+/=/−+++++++
F6p-value4.45 × 10−51.73 × 10−61.73 × 10−61.04 × 10−31.73 × 10−61.73 × 10−61.73 × 10−6
+/=/−+++++++
F7p-value2.11 × 10−31.73 × 10−62.13 × 10−61.73 × 10−64.45 × 10−51.73 × 10−61.73 × 10−6
+/=/−+++++++
F8p-value1.73 × 10−61.73 × 10−611.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−6
+/=/−++=++++
F9p-value11.48 × 10−611.73 × 10−6111.73 × 10−6
+/=/−=+=+==+
F10p-value11.61 × 10−62.93 × 10−51.73 × 10−60.121.73 × 10−61.73 × 10−6
+/=/−=+++=++
F11p-value10.2511.73 × 10−6111.73 × 10−6
+/=/−===+==+
F12p-value2.35 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−6
+/=/−+++++++
F13p-value1.39 × 10−21.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−6
+/=/−+++++++
Total(+/=/−)8/5/012/1/010/3/013/0/010/3/010/2/013/0/0

Appendix B

Figure A1. Changes in reservoir volumes (a) and discharge flow of LYX (b) and LJX (c) reservoirs for flood 3 (a decamillennial flood based on the typical 1964 flood). Note: V denotes the reservoir volume at the time t; VL denotes the reservoir capacity at the dead water level; VC denotes the reservoir capacity at the check flood level; QI denotes the reservoir inflow at the time t; QOM denotes the maximum allowable discharge flow; and subscripts 1 and 2 denote LYX and LJX reservoirs, respectively.
Figure A1. Changes in reservoir volumes (a) and discharge flow of LYX (b) and LJX (c) reservoirs for flood 3 (a decamillennial flood based on the typical 1964 flood). Note: V denotes the reservoir volume at the time t; VL denotes the reservoir capacity at the dead water level; VC denotes the reservoir capacity at the check flood level; QI denotes the reservoir inflow at the time t; QOM denotes the maximum allowable discharge flow; and subscripts 1 and 2 denote LYX and LJX reservoirs, respectively.
Water 16 02458 g0a1
Figure A2. Changes in reservoir volume (a) and discharge flow of LYX (b) and LJX (c) reservoirs for flood 4 (a decamillennial flood based on the typical 1967 flood). (Note: the signs are the same with Figure A1).
Figure A2. Changes in reservoir volume (a) and discharge flow of LYX (b) and LJX (c) reservoirs for flood 4 (a decamillennial flood based on the typical 1967 flood). (Note: the signs are the same with Figure A1).
Water 16 02458 g0a2

References

  1. Tabari, H. Climate change impact on flood and extreme precipitation increases with water availability. Sci. Rep. 2020, 10, 13768. [Google Scholar] [CrossRef] [PubMed]
  2. Zhao, D.; Xu, H.; Wang, H.; Yu, Y.; Duan, Y.; Chen, L. Quantitative attribution of historical anthropogenic warming on the extreme rainfall event over Henan in July 2021. Environ. Res. Lett. 2023, 18, 104037. [Google Scholar] [CrossRef]
  3. Chen, H.; Sun, J. Significant increase of the global population exposure to increased precipitation extremes in the future. Earth’s Future 2021, 9, e2020EF001941. [Google Scholar] [CrossRef]
  4. Sung, J.H.; Eum, H.I.; Park, J.; Cho, J. Assessment of climate change impacts on extreme precipitation events: Applications of CMIP5 climate projections statistically downscaled over South Korea. Adv. Meteorol. 2018, 2018, 4720523. [Google Scholar] [CrossRef]
  5. Tew, Y.L.; Tan, M.L.; Juneng, L.; Chun, K.P.; bin Hassan, M.H.; bin Osman, S.; Samat, N.; Chang, C.K.; Kabir, M.H. Rapid extreme tropical precipitation and flood inundation mapping framework (RETRACE): Initial testing for the 2021–2022 Malaysia flood. ISPRS Int. J. Geo-Inf. 2022, 11, 378. [Google Scholar] [CrossRef]
  6. Manandhar, B.; Cui, S.; Wang, L.; Shrestha, S. Post-flood resilience assessment of July 2021 flood in western Germany and Henan, China. Land 2023, 12, 625. [Google Scholar] [CrossRef]
  7. Nanditha, J.S.; Kushwaha, A.P.; Singh, R.; Malik, I.; Solanki, H.; Chuphal, D.S.; Dangar, S.; Mahto, S.S.; Vegad, U.; Mishra, V. The Pakistan flood of August 2022 causes and implications. Earth’s Future 2023, 11, e2022EF003230. [Google Scholar] [CrossRef]
  8. Karbowski, A. Optimal control of single retention reservoir during flood: Solution of deterministic, continuous-time problems. J. Optim. Theory Appl. 1991, 69, 55–81. [Google Scholar] [CrossRef]
  9. Zha, G.; Zhou, J.; Yang, X.; Fang, W.; Dai, L.; Wang, Q.; Ding, X. Modeling and solving of joint flood control operation of large-scale reservoirs: A case study in the Middle and Upper Yangtze River in China. Water 2021, 13, 41. [Google Scholar] [CrossRef]
  10. Jing, Z.; Zhang, R.; Bao, H.; Zhang, S. Joint flood control scheduling strategy of large cascade reservoirs: A case study of the cascade reservoirs in the upper reaches of the Yangtze River in China. J. Flood Risk Manag. 2022, 15, e12802. [Google Scholar] [CrossRef]
  11. Chen, J.; Zhong, P.A.; Liu, W.; Wan, X.Y.; Yeh, W.W.G. A multi-objective risk management model for real-time flood control optimal operation of a parallel reservoir system. J. Hydrol. 2020, 590, 125264. [Google Scholar] [CrossRef]
  12. Tao, Y.; Mo, L.; Yang, Y.; Liu, Z.; Liu, Y.; Liu, T. Optimization of Cascade Reservoir Operation for Power Generation, Based on an Improved Lightning Search Algorithm. Water 2023, 15, 3417. [Google Scholar] [CrossRef]
  13. Diao, Y.; Ma, H.; Wang, H.; Wang, J.; Li, S.; Li, X.; Pan, J.; Qiu, Q. Optimal flood-control operation of cascade reservoirs using an improved particle swarm optimization algorithm. Water 2022, 14, 1239. [Google Scholar] [CrossRef]
  14. He, J.; Guo, W.; Wang, S.; Chen, H.; Guo, X.; Li, S. Application of Multi-Strategy Based Improved DBO Algorithm in Optimal Operation of Reservoir Groups. Water Resour. Manag. 2024, 38, 1883–1901. [Google Scholar] [CrossRef]
  15. Zhu, D.; Chen, H.; Zhou, Y.; Mei, Y.; Xu, X.; Guo, S. A triple-stage operation method for deriving operation rules for cascade reservoirs during catastrophic flood events. Water Resour. Manag. 2022, 36, 4863–4883. [Google Scholar] [CrossRef]
  16. Zhu, D.; Mei, Y.; Xu, X.; Liu, Z.; Wu, Z.; Cai, H. Optimal operation of a parallel multireservoir system for flood control using a stagewise compensation method. Water Resour. Manag. 2021, 35, 1689–1710. [Google Scholar] [CrossRef]
  17. Mahdavi, S.; Shiri, M.E.; Rahnamayan, S. Metaheuristics in large-scale global continues optimization: A survey. Inf. Sci. 2015, 295, 407–428. [Google Scholar] [CrossRef]
  18. Wang, W.; Tian, W.; Chau, K.; Zang, H.; Ma, M.; Feng, Z.; Xu, D. Multi-reservoir flood control operation using improved bald eagle search algorithm with ε constraint method. Water 2023, 15, 692. [Google Scholar] [CrossRef]
  19. Lai, V.; Huang, Y.F.; Koo, C.H.; Ahmed, A.N.; El-Shafie, A. A review of reservoir operation optimisations: From traditional models to metaheuristic algorithms. Arch. Comput. Methods Eng. 2022, 29, 3435–3457. [Google Scholar] [CrossRef]
  20. Hellwig, M.; Beyer, H.G. A modified matrix adaptation evolution strategy with restarts for constrained real-world problems. In Proceedings of the 2020 IEEE Congress on Evolutionary Computation (CEC), Glasgow, UK, 19–24 July 2020; pp. 1–8. [Google Scholar]
  21. Fan, Z.; Fang, Y.; Li, W.; Yuan, Y.; Wang, Z.; Bian, X. LSHADE44 with an improved ε constraint-handling method for solving constrained single-objective optimization problems. In Proceedings of the 2018 IEEE Congress on Evolutionary Computation (CEC), Rio de Janeiro, Brazil, 8–13 July 2018; pp. 1–8. [Google Scholar]
  22. Sun, J.; Garibaldi, J.M. A novel memetic algorithm for constrained optimization. In Proceedings of the IEEE Congress on Evolutionary Computation, Barcelona, Spain, 18–23 July 2010; pp. 1–8. [Google Scholar]
  23. Basharu, M.; Arana, I.; Ahriz, H. Escaping local optima: Constraint weights vs. value penalties. In Proceedings of the International Conference on Innovative Techniques and Applications of Artificial Intelligence, Cambridge, UK, 10–12 December 2007; Springer: London, UK, 2007; pp. 51–64. [Google Scholar]
  24. Çınar, A.; Kıran, M. The performance of penalty methods on tree-seed algorithm for numerical constrained optimization problems. Int. Arab J. Inf. Technol. 2020, 17, 799–807. [Google Scholar] [CrossRef]
  25. Sefa AR, A.S.; Kahraman, H.T.; Gedikli, E. Determination of the effects of penalty coefficient on the meta-heuristic optimization process. In Proceedings of the 2018 International Conference on Artificial Intelligence and Data Processing (IDAP), Malatya, Turkey, 28–30 September 2018; pp. 1–6. [Google Scholar]
  26. Peraza-Vázquez, H.; Peña-Delgado, A.; Merino-Treviño, M.; Morales-Cepeda, A.B.; Sinha, N. A novel metaheuristic inspired by horned lizard defense tactics. Artif. Intell. Rev. 2024, 57, 59. [Google Scholar] [CrossRef]
  27. Wu, G.; Mallipeddi, R.; Suganthan, P.N. Problem Definitions and Evaluation Criteria for the CEC 2017 Competition on Constrained Real-Parameter Optimization; Technical, Report; National University of Defense Technology: Changsha, China; Kyungpook National University: Daegu, Republic of Korea; Nanyang Technological University: Singapore, 2017. [Google Scholar]
  28. Atali, G.; PehlIvan, İ.; Gürevin, B.; Şeker, H.İ. Chaos in metaheuristic based artificial intelligence algorithms: A short review. Turk. J. Electr. Eng. Comput. Sci. 2021, 29, 1354–1367. [Google Scholar] [CrossRef]
  29. Ouertani, M.W.; Manita, G.; Korbaa, O. Chaotic lightning search algorithm. Soft Comput. 2021, 25, 2039–2055. [Google Scholar] [CrossRef]
  30. Akyol, S.; Yildirim, M.; Alatas, B. CIDO: Chaotically initialized dandelion optimization for global optimization. Int. J. Adv. Netw. Appl. 2023, 14, 5696–5704. [Google Scholar] [CrossRef]
  31. Gezici, H.; Livatyalı, H. Chaotic Harris hawks optimization algorithm. J. Comput. Des. Eng. 2022, 9, 216–245. [Google Scholar] [CrossRef]
  32. Zhu, Q.; Yang, Y.; Li, H.; Yang, H.; Zhang, B.; Gao, S. Chaotic Mapping Genetic Algorithm with Multiple Strategies. In Proceedings of the 2023 15th International Conference on Advanced Computational Intelligence (ICACI), Seoul, Republic of Korea, 6–9 May 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1–4. [Google Scholar]
  33. Yang, D.; Liu, Z.; Yi, P. Computational efficiency of accelerated particle swarm optimization combined with different chaotic maps for global optimization. Neural Comput. Appl. 2017, 28, 1245–1264. [Google Scholar] [CrossRef]
  34. Sowmya, R.; Premkumar, M.; Jangir, P. Newton-Raphson-based optimizer: A new population-based metaheuristic algorithm for continuous optimization problems. Eng. Appl. Artif. Intell. 2024, 128, 107532. [Google Scholar] [CrossRef]
  35. Mirjalili, S.; Mirjalili, S.M.; Lewis, A. Grey wolf optimizer. Adv. Eng. Softw. 2014, 69, 46–61. [Google Scholar] [CrossRef]
  36. Mirjalili, S.; Lewis, A. The whale optimization algorithm. Adv. Eng. Softw. 2016, 95, 51–67. [Google Scholar] [CrossRef]
  37. Kennedy, J.; Eberhart, R. Particle swarm optimization. In Proceedings of the ICNN’95-International Conference on Neural Networks, Perth, WA, Australia, 27 November–1 December 1995; IEEE: Piscataway, NJ, USA, 1995; Volume 4, pp. 1942–1948. [Google Scholar]
  38. Hashim, F.A.; Houssein, E.H.; Hussain, K.; Mabrouk, M.S.; Al-Atabany, W. Honey Badger Algorithm: New metaheuristic algorithm for solving optimization problems. Math. Comput. Simul. 2022, 192, 84–110. [Google Scholar] [CrossRef]
  39. Chopra, N.; Ansari, M.M. Golden jackal optimization: A novel nature-inspired optimizer for engineering applications. Expert Syst. Appl. 2022, 198, 116924. [Google Scholar] [CrossRef]
  40. Agushaka, J.O.; Ezugwu, A.E.; Abualigah, L. Dwarf mongoose optimization algorithm. Comput. Methods Appl. Mech. Eng. 2022, 391, 114570. [Google Scholar] [CrossRef]
  41. Suganthan, P.N.; Hansen, N.; Liang, J.J.; Deb, K.; Chen, Y.P.; Auger, A.; Tiwari, S. Problem Definitions and Evaluation Criteria for the CEC 2005 Special Session on Real-Parameter Optimization; KanGAL report, 2005005; Nanyang Technological University: Singapore, 2005. [Google Scholar]
  42. Woolson, R.F. Wilcoxon signed-rank test. Encycl. Biostat. 2005, 8. [Google Scholar] [CrossRef]
  43. Li, H.; Zhu, X.; Li, M.; Yang, Z.; Wen, M. Multi-threshold image segmentation research based on improved enhanced arithmetic optimization algorithm. Signal Image Video Process. 2024, 18, 4045–4058. [Google Scholar] [CrossRef]
  44. Feng, Z.K.; Niu, W.J.; Liu, S. Cooperation search algorithm: A novel metaheuristic evolutionary intelligence algorithm for numerical optimization and engineering optimization problems. Appl. Soft Comput. 2021, 98, 106734. [Google Scholar] [CrossRef]
Figure 1. Flowchart of this study.
Figure 1. Flowchart of this study.
Water 16 02458 g001
Figure 2. Cascade reservoirs and model operation flowchart.
Figure 2. Cascade reservoirs and model operation flowchart.
Water 16 02458 g002
Figure 3. Flowchart of HLOA.
Figure 3. Flowchart of HLOA.
Water 16 02458 g003
Figure 4. Iterative process for the minimum fitness values after 30 runs of each algorithm on flood 1 (a) and flood 2 (b). Note: flood1 and flood 2 denote a millennial flood based on the typical 1964 and 1967 flood, respectively.
Figure 4. Iterative process for the minimum fitness values after 30 runs of each algorithm on flood 1 (a) and flood 2 (b). Note: flood1 and flood 2 denote a millennial flood based on the typical 1964 and 1967 flood, respectively.
Water 16 02458 g004
Figure 5. Iterative process for the minimum fitness values after 30 runs of each algorithm on flood 3 (a) and flood 4 (b). Note: flood 3 and flood 4 denote a decamillennial flood based on the typical 1964 and 1967 flood, respectively.
Figure 5. Iterative process for the minimum fitness values after 30 runs of each algorithm on flood 3 (a) and flood 4 (b). Note: flood 3 and flood 4 denote a decamillennial flood based on the typical 1964 and 1967 flood, respectively.
Water 16 02458 g005
Figure 6. Changes in reservoir volume (a) and discharge flow of LYX (b) and LJX (c) reservoirs for flood 1 (a millennial flood based on the typical 1964 flood). Note: V denotes the reservoir volume at the time t; VL denotes the reservoir capacity at the dead water level; VC denotes the reservoir capacity at the check flood level; QI denotes the reservoir inflow at the time t; QOM denotes the maximum allowable discharge flow; and subscripts 1 and 2 denote LYX and LJX reservoirs, respectively.
Figure 6. Changes in reservoir volume (a) and discharge flow of LYX (b) and LJX (c) reservoirs for flood 1 (a millennial flood based on the typical 1964 flood). Note: V denotes the reservoir volume at the time t; VL denotes the reservoir capacity at the dead water level; VC denotes the reservoir capacity at the check flood level; QI denotes the reservoir inflow at the time t; QOM denotes the maximum allowable discharge flow; and subscripts 1 and 2 denote LYX and LJX reservoirs, respectively.
Water 16 02458 g006
Figure 7. Changes in reservoir volume (a) and discharge flow of LYX (b) and LJX (c) reservoirs for flood 1 (a millennial flood based on the typical 1967 flood). (Note: the signs are the same with Figure 6).
Figure 7. Changes in reservoir volume (a) and discharge flow of LYX (b) and LJX (c) reservoirs for flood 1 (a millennial flood based on the typical 1967 flood). (Note: the signs are the same with Figure 6).
Water 16 02458 g007
Table 1. Parameter values used for flood control operation.
Table 1. Parameter values used for flood control operation.
ReservoirVL (Billion m3)VD (Billion m3)VC (Billion m3)QOM,0.1% (m3/s)QOM,0.01% (m3/s)
LYX22.4625.5627.4240006000
LJX2.924.074.39545107290
Note: VL denotes the reservoir capacity at the dead water level; VD denotes the reservoir capacity at the design flood level; VC denotes the reservoir capacity at the check flood level; and QOM,P (p = 0.1% and 0.01%) denotes the maximum allowable discharge flow of a reservoir corresponding to a millennial flood and a decamillennial flood.
Table 2. Pseudo code of the EHLOA algorithm.
Table 2. Pseudo code of the EHLOA algorithm.
Pseudo code of enhanced Horned Lizard Optimization Algorithm
1: Initialize random variables such as p. Specify the number of search agents, Population Size, and Maximum number of iterations.
2: Generate the initial population by Equation (16)
3: While (t < max number of iterations)
4:   for each search agent
5:      if t/25 = 1,2…, n? then
6:       compute sudden attack, update the positions by Equation (18)
7:      else
8:        if p > 0.5? then
9:         compute Crypsis in HLOA, update the positions by Equation (9)
10:       else
11:          if t is an even number? then
12:           compute Blood-squirting in HLOA, update the positions by Equation (12)
13:          else
14:           compute Move-to-escape in HLOA, update the positions by Equation (13)
15:          end if
16:       end if
17:     end if
18:     Replace the worst search agent by randomly select Equation (10) or Equation (11)
19:     if Alpha melanophore rate lower than 0.3? then
20:        compute trap escaping operator in EHLOA, update the positions by Equation (17)
21:     end if
22:     Calculate xnew, the fitness value of the new search agents
23:     t = t + 1
24:     end for
25:     end while
26:     find the lowest fitness value, Display it and its position xbest
Table 3. Optimization results of EHLOA and comparison algorithms on benchmark flood control operation model.
Table 3. Optimization results of EHLOA and comparison algorithms on benchmark flood control operation model.
Flood TypeIndexEHLOAHLOAGWOWOAPSOHBAGJODMO
Flood1Min4160.894201.444276.814319.78N/A4261.154421.58N/A
Mean4194.124295.044418.684393.19N/A4375.084504.88N/A
Flood 2Min4408.794412.104452.014467.01N/A4430.414484.03N/A
Mean4421.134449.074487.364489.90N/A4468.284507.46N/A
Flood 3Min4521.824588.6245624756.934943.814619.974646.385253.01
Mean4592.954680.024598.694923.784986.574713.984767.075332.82
Flood 4Min4701.874753.194749.664964.864950.834796.514821.835302.54
Mean4754.324845.174780.115037.514971.294865.934897.725379.37
Table 4. Best peak reduction rates achieved by EHLOA for four floods.
Table 4. Best peak reduction rates achieved by EHLOA for four floods.
Flood TypePeak Values of the Design Floods (m3/s) Peak Values after Operation (m3/s) Peak Reduction Rates (%)
flood 19368416155.6
flood 29343440952.8
flood 310,800452258.1
flood 410,791470256.4
Note: flood 1 and flood 2 denote a millennial flood based on the typical 1964 and 1967 flood, respectively; and flood 3 and flood 4 denote a decamillennial flood based on the typical 1964 and 1967 flood, respectively.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liu, C.; Xie, Y.; Liu, S.; Qin, J.; Wei, J.; Fang, H.; Du, H. An Enhanced Horned Lizard Optimization Algorithm for Flood Control Operation of Cascade Reservoirs. Water 2024, 16, 2458. https://doi.org/10.3390/w16172458

AMA Style

Liu C, Xie Y, Liu S, Qin J, Wei J, Fang H, Du H. An Enhanced Horned Lizard Optimization Algorithm for Flood Control Operation of Cascade Reservoirs. Water. 2024; 16(17):2458. https://doi.org/10.3390/w16172458

Chicago/Turabian Style

Liu, Chenye, Yangyang Xie, Saiyan Liu, Jiyao Qin, Jianfeng Wei, Hongyuan Fang, and Huihua Du. 2024. "An Enhanced Horned Lizard Optimization Algorithm for Flood Control Operation of Cascade Reservoirs" Water 16, no. 17: 2458. https://doi.org/10.3390/w16172458

APA Style

Liu, C., Xie, Y., Liu, S., Qin, J., Wei, J., Fang, H., & Du, H. (2024). An Enhanced Horned Lizard Optimization Algorithm for Flood Control Operation of Cascade Reservoirs. Water, 16(17), 2458. https://doi.org/10.3390/w16172458

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop