Disassembly Sequence Planning for Intelligent Manufacturing Using Social Engineering Optimizer

: Product disassembly and recycling are important issues in green design. Disassembly sequence planning (DSP) is an important problem in the product disassembly process. The core idea is to generate the best or approximately optimal disassembly sequence to reduce disassembly costs and time. According to the characteristics of the DSP problem, a new algorithm to solve the DSP problem is proposed. Firstly, a disassembly hybrid graph is introduced, and a disassembly constraint matrix is established. Secondly, the disassembling time, replacement frequency of disassembly tool and replacement frequency of disassembly direction are taken as evaluation criteria to establish the product ﬁtness function. Then, an improved social engineering optimizer (SEO) method is proposed. In order to enable the algorithm to solve the problem of disassembly sequence planning, a swap operator and swap sequence are introduced, and steps of the social engineering optimizer are redeﬁned. Finally, taking a worm reducer as an example, the proposed algorithm is used to generate the disassembly sequence, and the inﬂuence of the parameters on the optimization results is analyzed. Compared with several heuristic intelligent optimization methods, the effectiveness of the proposed method is veriﬁed.


Introduction
With the continuous development of the manufacturing industry, the problems of resource reuse and the potential environmental pollution caused by a large number of end-of-life (EOL) products urgently need to be solved. How to deal with EOL products efficiently and economically has become a research interest. The disassembly of EOL products is an important part of recycling or maintenance [1] and can reduce environmental pollution and promote resource recycling. Disassembly Sequence Planning (DSP) aims to generate the disassembly sequence of parts or sub-assemblies [2] to meet various disassembly requirements, such as disassembly costs, benefits, and disassembly methods.
Early research mainly tends to graph theory research. Henrioud et al. [3] describe the direct-connection relationship between product structures through an association graph model. Sanderson and Homem de Mello et al. [4] propose the AND/OR graph model, which represents the disassembly unit of the product as a node. If the connecting line between the nodes is curved, then the two disassembly units have a logical AND relationship; otherwise, the relationship between the two is OR. Li et al. [5] proposed a hybrid diagram that can be used to represent the dynamic changes in geometric constraints and priority constraints during product disassembly, and simplify the process of determining the disassembly sequence. Huang et al. [6] propose a disassembly matrix model on this basis, which can accurately describe the priority order of disassembly units.
On this basis, Mitrouchev et al. [7] proposed a disassembly geometric contact diagram based on the lowest level of the disassembly product diagram, which eliminates parts that are not related to the target before the sequence is generated, thereby generating a feasible alternative disassembly sequence. Hu et al. [8] put forward a new disassembly diagram and its related indicators to estimate the time of complete and selective disassembly in the design phase of the disassembly scheme. Edmunds et al. [9] find the best order of component removal by converting an AND/OR graph to a priority graph according to the constraint between parts, thus effectively reducing the complexity of complex mechanism disassembly. In order to increase the revenue when retrieving only some components from a given product, Smith and Chen [10] proposed a rule-based recursive method to find a near-optimal heuristic selective disassembly sequence. Issaoui et al. [11] propose a new disassembly direction matrix as a representative model of the disassembly direction, and updated the movement matrix of the parts to provide information about the movement status of the parts during the disassembly sequencing process. Tian et al. [12] introduce a conflict matrix in the AOG graph to deal with the exclusive OR problem that the existing heuristic disassembly algorithm cannot solve. Wang et al. [13] propose a disassembly design technology, combining regret theory and entropy weight method, and provide a systematic support tool for the evaluation of schemes of disassembly. Feng et al. [14] propose a hybrid disassembly modeling and optimization method for obsolete products based on the reusability of sub-components. Yuan et al. [15] established a multi-objective comprehensive disassembly evaluation model based on Drosophila algorithm, cross-efficiency and extended gray correlation, and evaluated the approximate optimal disassembly scheme from the aspects of time, economy and environment, then obtained the best scheme.
However, as the complexity of the product structure increases, the number of parts involved in disassembly has also increased exponentially [16], and the traditional DSP method has been unable to meet the disassembly requirements of complex products. The heuristic intelligent optimization method has the advantages of a high solving speed and convenient parameter adjustment [17] and has been widely used in optimization problems of various manufacturing sequences, such as automated production lines [18], hot rolling [19], and non-sharp distillation [20]. It also applies to the disassembly sequence. Kongar and Gupta [21] propose a genetic algorithm (GA) for solving disassembly sequence planning. Zhang et al. [22] map the disassembly mixed graph model to the particle swarm model and realized the optimal disassembly sequence planning of complex products through particle swarm optimization. Xing et al. [23] search for feasible solutions through ant colony optimization (ACO) and calculate the dominance relationship between each solution, and obtained the Pareto solution set, thereby realizing the disassembly sequence planning.
With the continuous deepening of research, heuristic intelligent optimization has become an important method to obtain an optimal or nearly optimal disassembly sequence. Many new algorithms have been proposed, and old algorithms have been improved for DSP problems. Wu et al. [24] use the binary tree algorithm to optimize the generation of the initial population and the crossover and mutation process of the population, and realize the solution of disassembly sequence planning through an improved genetic algorithm. Kheder et al. [25] apply GA to DSP by taking the maintainability of the machine, number of components, number of tool changes and directions during disassembly into account. Tseng et al. [26] compare the GA algorithm of Kongar and Gupta with Dijkstra's algorithms, and propose a new block-based DSP genetic algorithm. Zhang et al. [27] use an artificial bee colony (ABC) algorithm to solve the complicated product disassembly sequence problem under parallel disassembly. Ren et al. [28] improve the multi-objective discrete ABC algorithm for the selective collaborative DSP problem of complex products. Yeh [29] improve the update mechanism of the simplified group optimization method (SSO), modify the adaptive parameter control program of SSO, and propose a learning-effect DSP. Xia et al. [30] simplify the teaching-learning-based optimization (TLBO) algorithm, develop three new operators and combine them into the STLBO algorithm and apply them to the DSP problem with complex disassembly priority constraints. To solve the degree of freedom in modular product design, Tao et al. [31] design an automatic self-decomposed disassembly precedence matrix and propose a tabu-search-based hyper heuristic algorithm with exponentially decreasing diversity management strategy. As the synchronous parallel disassembly theory cannot accurately reflect the actual situation in the work, Ren et al. [32] propose an asynchronous parallel disassembly plan based on GA. Considering the constraints of disassembly operators and tools, Guo et al. [33] put forward a dual-objective optimization model with a scatter search method, which means that disassembly profit is maximized, and time is minimized. Based on the uncertainty of component quality and operation cost during the disassembly process, Tian et al. [34] propose a hybrid intelligent algorithm combining fuzzy uncertainty theory and an ABC algorithm. According to the requirements of low carbon emission and resource reuse, Yang et al. [35] propose a multi-objective disassembly line balancing fruit-fly optimization algorithm for the DSP of obsolete agricultural machinery.
Stefanini et al. [36] propose a method based on process mining, which combines Time-Driven Activity-Based Costing and process mining approaches to predict the resource consumption of patients in hospitals. Parsa et al. [37] define new optimization parameters based on disassembly and component requirements for the same EOL product in different states. Bentaha et al. [38] regard the quality of EOL products and their parts as random variables, and determine the best process and the depth of disassembly based on the quality of products to be disassembled. Babbitt et al. [39] collect the quality information of the main materials and components contained in 95 kinds of consumer electronic products, and establish a complete bill of materials (BOM) data database to provide assistance in the disassembly and recycling of EOL consumer electronic products. Tian et al. [40] propose a new hybrid multi-criteria decision-making method, which combines fuzzy AHP and fuzzy G-TOPSIS to evaluate the production and remanufacturing methods of automotive component remanufacturing. Tian et al. [41] propose a novel fuzzy Choquet integralbased grey comprehensive evaluation method, use an improved teaching-learning-based optimization algorithm to lambda-fuzzy-measures following the weights given by experts in order to enhance the consistency of weights. Wang et al. [42] improve the artificial bee colony algorithm and propose an optimization method for milling parameters of CNC machine tools, considering energy consumption.
The above research results introduce the application of an intelligent algorithm in disassembly sequence programming solutions. However, according to the free lunch theory [43], none of the meta-heuristics mentioned above can solve all optimization problems. It is always possible that new algorithms based on current or new optimization problems are better than current meta-heuristic algorithms. Therefore, it is still necessary to try to find new optimization algorithms to solve the DSP problem. The social engineering optimizer (SEO) proposed by A. M. Fathollahi-Fard [44], inspired by the concept of social engineering theory, has four main steps and three undetermined parameters, which is simpler and more intelligent than traditional methods. The approach starts with generating two random solutions called attackers and defenders. According to the rules of social engineering technology, the attacker gets the information of the defender to achieve the desired goal (to get the optimal value), while the defender evades it. When the attacker achieves his goal, it searches for the next victim (a new defender) from his current position. At present, there is no research on applying an SEO algorithm to the DSP problem.
Combining the above documents, this article proposes an improved SEO algorithm. Unlike the original SEO and other algorithms, the swap sequence is used as the individual to be optimized instead of the disassembly sequence. Aiming at the shortcomings that the original SEO cannot solve in the discrete optimization problem, the original algorithm flow is improved, and three sequence operation operators are defined to replace numerical calculations. Finally, through a case of a turbine reducer, the parameter sensitivity and effectiveness of the proposed algorithm are studied.
The rest of this paper is organized as follows. Section 2 describes the disassembly theories. Section 3 introduces the basic concept of Social Engineering Optimizer. The improved SEO method for solving DSP problems is provided in Section 4. In Section 5, an illustrative example to verify the feasibility of the proposed method is utilized, followed by a comparative analysis with other methods. The last section gives some summary remarks and looks forward to furthering the research.

Disassembly Hybrid Graph
The disassembly hybrid graph [5] is a product topological structure model, which describes the hierarchical information and constraint relations between the product components, and is easy to express by computer programs. The basic product disassembly hybrid diagram is represented by a triple where V = {v 1 , v 2 , . . . , v n } represents the basic disassembly unit of the product, such as product parts and sub-assemblies, and n is the number of basic disassembly units; Z = {z 1 , z 2 , . . . , z l } is the undirected edge set of the product disassembly mixed graph, indicating that there is a direct contact relationship between the two parts; O = {o 1 , o 2 , . . . , o m } is the product disassembly mixed graph. The directed edge set indicates that there is a priority relationship between the two parts. The disassembly hybrid diagram can be expressed as the structure shown in Figure 1. The circle represents the parts and sub-assemblies of the product; the solid line represents the direct contact between the disassembled components; the solid arrow represents the mandatory disassembly priority relationship between the two parts.
Combining the above documents, this article proposes an improved SEO algorithm. Unlike the original SEO and other algorithms, the swap sequence is used as the individual to be optimized instead of the disassembly sequence. Aiming at the shortcomings that the original SEO cannot solve in the discrete optimization problem, the original algorithm flow is improved, and three sequence operation operators are defined to replace numerical calculations. Finally, through a case of a turbine reducer, the parameter sensitivity and effectiveness of the proposed algorithm are studied.
The rest of this paper is organized as follows. Section 2 describes the disassembly theories. Section 3 introduces the basic concept of Social Engineering Optimizer. The improved SEO method for solving DSP problems is provided in Section 4. In Section 5, an illustrative example to verify the feasibility of the proposed method is utilized, followed by a comparative analysis with other methods. The last section gives some summary remarks and looks forward to furthering the research.

Disassembly Hybrid Graph
The disassembly hybrid graph is a product topological structure model, which describes the hierarchical information and constraint relations between the product components, and is easy to express by computer programs. The basic product disassembly hybrid diagram is represented by a triple where V = {v1, v2, …, vn} represents the basic disassembly unit of the product, such as product parts and sub-assemblies, and n is the number of basic disassembly units; Z = {z1, z2, …, zl} is the undirected edge set of the product disassembly mixed graph, indicating that there is a direct contact relationship between the two parts; O = {o1, o2, …, om} is the product disassembly mixed graph. The directed edge set indicates that there is a priority relationship between the two parts. The disassembly hybrid diagram can be expressed as the structure shown in Figure 1. The circle represents the parts and sub-assemblies of the product; the solid line represents the direct contact between the disassembled components; the solid arrow represents the mandatory disassembly priority relationship between the two parts. According to the product disassembly of the vertex set, undirected edge set and directed edge set of the mixed graph model, the contact constraint matrix C and priority constraint matrix P can be constructed: According to the matrices, a generation method of disassembly sequence can be obtained. First, generate a priority constraint matrix and contact constraint matrix according to the disassembly hybrid graph. Next, look for rows in the matrix that meet the detachability, and randomly select one of them as the first part to be disassembled. Then, remove the row from the matrices. Finally, repeat the above steps until the priority constraint matrix and contact constraint matrices are empty to generate a feasible disassembly sequence According to the product disassembly of the vertex set, undirected edge set and directed edge set of the mixed graph model, the contact constraint matrix C and priority constraint matrix P can be constructed: According to the matrices, a generation method of disassembly sequence can be obtained. First, generate a priority constraint matrix and contact constraint matrix according to the disassembly hybrid graph. Next, look for rows in the matrix that meet the detachability, and randomly select one of them as the first part to be disassembled. Then, remove the row from the matrices. Finally, repeat the above steps until the priority constraint matrix and contact constraint matrices are empty to generate a feasible disassembly sequence where c ij = 1, part i and j are in direct contact; 0, part i and j are not in direct contact or i = j; n is the number of basic disassembly units. If vertex i is dismountable, it must satisfy [45]: According to the matrices, a generation method of disassembly sequence can be obtained. First, generate a priority constraint matrix and contact constraint matrix according to the disassembly hybrid graph. Next, look for rows in the matrix that meet the detachability, and randomly select one of them as the first part to be disassembled. Then, remove the row from the matrices. Finally, repeat the above steps until the priority constraint matrix and contact constraint matrices are empty to generate a feasible disassembly sequence.

Objective Function of DSP
Disassembly cost is an important measure of selective disassembly sequence planning. In previous research, the change in disassembly tool, change in disassembly direction and the disassembly time are usually chosen to measure the cost of disassembly. According to the literature [46], setting the standard time for disassembly tools and direction change can unify the dimensions of the objective function, as shown in Equation (3) where e ij = 1, if tool is not changed; 0, if tool is changed; if direction is not changed 1, if direction is changed by 90 o 2, if direction is changed by 180 o F represents the comprehensive time cost of product disassembly; t j represents the time required to disassemble part j, and the weight is ω t ; t e represents the time to change the disassembly tool during the disassembly process, and the weight is ω e ; t d indicates the time taken to change the direction of disassembly during the process, and the weight is ω d .

Social Engineering
The advent of social engineering optimizer has been inspired by social engineering theory. Social engineering (SE) is defined as the act of obtaining people's personal information through certain technologies and inducing or forcing them to meet the requirements of social engineers [47]. Social engineers often use disguise and deception to achieve their goals. In social engineering, the party collecting information is called the attacker, and the target of the information stolen is called the defender. A social engineering attack is mainly divided into four steps: First, the attacker obtains part of the defender's information from various channels and specifies an attack plan against the defender. Then, the attacker harasses the defender to force him to reveal his weaknesses. Next, the defender analyzes the attacker's thinking and takes measures to get rid of the attack. Finally, the above steps are repeated until the attack is successful or the defense is successful.
According to SE, the steps of social engineering optimizer are established according to the above process.

Swap Operator and Swap Sequence
DSP is a discrete combinatorial optimization problem. A social engineering optimizer is widely used in continuous optimization problems, but is rarely used in discrete combinatorial optimization problems. In order to solve this problem, the concepts of swap operator and swap sequence [48] are introduced in SEO.
Suppose a disassembly sequence of a mechanism consisting of n parts is S = (a i ), i = 1, 2, . . . , n. Let a j and a k be two points in S, SO(a j , a k ) is defined as a swap operator, means exchanging points a j and a k . "⊕" is defined as the calculation of two swap operators, S = S ⊕ SO(a j , a k ) means using swap operator SO(a j , a k ) to S and obtain a new solution sequence S .
Swap sequence means an ordered queue of multiple swap operators. A swap sequence formed by l swap operators is expressed as SS = (SO 1 , SO 2 , . . . , SO l ). When the swap sequence acts on a disassembly sequence, all swap operators included in the swap sequence must act in turn, which is Several swap sequences and swap operators can be combined to form a new swap sequence, so the above equation can also be expressed as The set of all swap sequences that produce same solutions is called equivalent set. In equivalent set, the swap sequence that contains the fewest swap operators is called a basic swap sequence. Taking the structure shown in Figure 1 as an example, the generation method of a basic swap sequence is as follows: Let S 1 = (1, 4, 2, 3, 5, 6), S 2 = (3, 1, 4, 2, 5, 6) be two disassembly sequences of the structure in Figure 1, search from the first bit of sequence S 1 , it can be found that Since S 1 (4) = S 23 (4), S 1 (5) = S 23 (5), S 1 (6) = S 23 (6), SO 4 = SO(4, 4), SO 5 = SO(5, 5), SO 6 = SO(6, 6), the sequence does not change, which is equivalent to a do-nothing operation. Therefore, the basic swap sequence from S 2 to S 1 is

Swap Sequence Based SEO
A standard SEO consists of the following steps: initialize the attacker and the defender; train and retrain, spot an attack; respond to attack and create a new defender. An SEO that introduces swap operators and swapping sequences needs to redefine several steps. The steps for improvement are as follows.
(1) Initialize disassembly sequence Unlike the continuous optimization problem, the generation of the disassembly sequence needs to satisfy the disassembly of the parts. It is necessary to generate three feasible initial disassembly sequences according to the disassembly sequence generation method proposed in Section 2.1; (2) Initialize the attacker and the defender The solution to the SEO optimization problem is a vector, called "person"; each bit of the vector represents a variable of the objective function, called the "trait" of "person". The algorithm generates two random initial solutions. Unlike the disassembly sequence, the swap sequence can directly perform operations, such as exchange and displacement, so the attacker and defender in the proposed method are composed of swap sequences. The value of the objective function in the middle is selected as the standard solution. Use the basic swap sequence generation method given in Section 3.2 to generate two. In order to make the length of the swap sequence consistent, all swap operators are reserved.
The swap sequence that transforms the standard solution into the optimal solution acts as the attacker, while the other acts as the defender, as shown in Figure 2; An SEO that introduces swap operators and swapping sequences needs to redefine several steps. The steps for improvement are as follows.
(1) Initialize disassembly sequence Unlike the continuous optimization problem, the generation of the disassembly sequence needs to satisfy the disassembly of the parts. It is necessary to generate three feasible initial disassembly sequences according to the disassembly sequence generation method proposed in Section 2.1; (2) Initialize the attacker and the defender The solution to the SEO optimization problem is a vector, called "person"; each bit of the vector represents a variable of the objective function, called the "trait" of "person". The algorithm generates two random initial solutions. Unlike the disassembly sequence, the swap sequence can directly perform operations, such as exchange and displacement, so the attacker and defender in the proposed method are composed of swap sequences. The value of the objective function in the middle is selected as the standard solution. Use the basic swap sequence generation method given in Section 3.2 to generate two. In order to make the length of the swap sequence consistent, all swap operators are reserved.
The swap sequence that transforms the standard solution into the optimal solution acts as the attacker, while the other acts as the defender, as shown in Figure 2; (3) Train and retrain In this step, a random integer α between 1 and n is set in advance. Then, randomly select α bits in defender vector and replace them with corresponding positions in the attacker vector, respectively, to generate α feasible solutions. If the optimal solution among feasible solutions is better than the defender, the defender is replaced with this solution.
For example, use the swap sequence shown in Figure 2. let α = 3. The example is displayed to clarify this step in Figure 3; (3) Train and retrain In this step, a random integer α between 1 and n is set in advance. Then, randomly select α bits in defender vector and replace them with corresponding positions in the attacker vector, respectively, to generate α feasible solutions. If the optimal solution among feasible solutions is better than the defender, the defender is replaced with this solution.
For example, use the swap sequence shown in Figure 2. let α = 3. The example is displayed to clarify this step in Figure 3; (4) Spot an attack This step randomly selects a method for the attacker to approach the defender in the search space. There are four methods to spot attacks in SEO: obtaining, phishing, diversion theft and pretext. However, these cannot be directly used to solve DSP problems. Therefore, some special operators are proposed to meet the requirements. Addition operator ⊕: The addition operator has been mentioned in Section 3.2 and is expressed as  (4) Spot an attack This step randomly selects a method for the attacker to approach the defender in the search space. There are four methods to spot attacks in SEO: obtaining, phishing, diversion theft and pretext. However, these cannot be directly used to solve DSP problems. Therefore, some special operators are proposed to meet the requirements. Addition operator ⊕: The addition operator has been mentioned in Section 3.2 and is expressed as where SS, SS 1 and SS 2 are swap sequences. Assuming that the length of SS 1 and SS 2 is n, the length of SS is 2n. Figure 4 shows the process of using the addition operator on swap sequences consisting of three swap operators. (4) Spot an attack This step randomly selects a method for the attacker to approach the defender in the search space. There are four methods to spot attacks in SEO: obtaining, phishing, diversion theft and pretext. However, these cannot be directly used to solve DSP problems. Therefore, some special operators are proposed to meet the requirements. Addition operator ⊕: The addition operator has been mentioned in Section 3.2 and is expressed as where SS, SS1 and SS2 are swap sequences. Assuming that the length of SS1 and SS2 is n, the length of SS is 2n. Figure 4 shows the process of using the addition operator on swap sequences consisting of three swap operators.
Let μ = 3, ν = 2, Figure 5 shows the process of using the derange operator on swap sequences consisting of six swap operators. Derange operator ⊗: Suppose SS is a swap sequence of length n, β ∈ [0, 1] is the input variable of search engine. Let µ= ceil(n × U(0, 1)), ν = ceil(n × sin(β)), the derange operator is to rearrange the µth position to the (µ + ν)th position of the sequence, if µ + ν ≥ n, then rearrange the µth position to the last position. In particular, for the case of (1 − U(0, 1) × sin(β)), rearrange the positions that are not between µth and (µ + ν)th position. The derange operator is expressed as SS = SS ⊗ (U(0, 1) × sin(β)), Let µ = 3, ν = 2, Figure 5 shows the process of using the derange operator on swap sequences consisting of six swap operators. Average operator ◎: Suppose SS1 and SS2 are two swap sequences. The averaging operator starts from the first position of the sequence and randomly selects the content in SS1 or SS2 as the new sequence with a 50% probability. The average operator is expressed as Average operator ◎: Suppose SS1 and SS2 are two swap sequences. The averaging operator starts from the first position of the sequence and randomly selects the content in SS1 or SS2 as the new sequence with a 50% probability. The average operator is expressed as Average operator ◎: Suppose SS1 and SS2 are two swap sequences. The averaging operator first position of the sequence and randomly selects the content in SS1 or S sequence with a 50% probability. The average operator is expressed as Figure 6 shows the process of using the average operator on sw consisting of six swap operators. Suppose SS1 and SS2 are two swap sequences. The averaging operator starts from the first position of the sequence and randomly selects the content in SS1 or SS2 as the new sequence with a 50% probability. The average operator is expressed as SS = SS1 ◎ SS2. Figure 6 shows the process of using the average operator on swap sequences consisting of six swap operators. Therefore, four methods to spot an attack is expressed as: Obtaining Therefore, four methods to spot an attack is expressed as: Obtaining Phishing Diversion theft Pretext de f new = (de f old ⊗ (sin( π 2 − β) × U(0, 1)) ⊗ (1 − sin β × U(0, 1))) ⊕ (((de f old ⊗ (sin( π 2 − β) × U(0, 1)))att) ⊗ (sin β × U(0, 1))); (10) where β ∈ [0, 1] is the input variable of search engine. (5) Check the disassembly sequence The defender generated through the above steps needs to verify its dismountability. Starting from the first position of the sequence, if the part represented by this position is dismountable, check the dismountability of the next part; if it is not dismountable, randomly select one of the dismountable parts to replace, and then check the dismountability of the next part. Repeat the above operations until the last part meets the dismountability requirements; (6) Respond to attack and create a new defender Let m be the number of attack times. After each attack, evaluate the new fitness of the defender and compare it with the old one, then choose a better fitness as the defender. If the fitness of the defender is better than attacker, the identities of the two are exchanged. When the attack lasts m times, the attack stops. Then, a new feasible solution vector is generated as the defender. Repeat the above steps until the maximum number of iterations is reached or the algorithm stops.
The optimization procedure of the proposed method is shown in Figure 7.
Let m be the number of attack times. After each attack, evaluate the new fitness of the defender and compare it with the old one, then choose a better fitness as the defender. If the fitness of the defender is better than attacker, the identities of the two are exchanged. When the attack lasts m times, the attack stops. Then, a new feasible solution vector is generated as the defender. Repeat the above steps until the maximum number of iterations is reached or the algorithm stops.
The optimization procedure of the proposed method is shown in Figure 7.

Problem Description
In order to verify the effectiveness, an example is used taken from [45]. A turbine reducer consists of 25 components, as shown in Figure 8. According to the product assembly relationship and spatial position constraints, the disassembly hybrid graph of the turbine reducer can be obtained, as shown in Figure 9.
The original disassembly information of components is shown in Table 1.
According to the steps of the developed method presented in Section 4, disassembly sequence planning can be carried out.

Problem Description
A turbine reducer consists of 25 components, as shown in Figure 8. According to the product assembly relationship and spatial position constraints, the disassembly hybrid graph of the turbine reducer can be obtained, as shown in Figure 9.  The original disassembly information of components is shown in Table 1.   The original disassembly information of components is shown in Table 1.

Influence of Parameters
According to Section 3, α and β are two parameters that affect the results of SEO. To analyze the sensitive of parameters in SEO, three different values of α and β are taken and substituted into the program. Let the number of iterations be 300, t e = 8 s, t d = 4 s, ω t = ω e = ω d = 1, m = 15. Run this 20 times to get nine sets of data, as shown in Figure 10. Hexagon socket head cap screws 4 Allen wrench (T3) +x According to the steps of the developed method presented in Section 4, disassembly sequence planning can be carried out.

Influence of Parameters
According to Section 3, α and β are two parameters that affect the results of SEO. To analyze the sensitive of parameters in SEO, three different values of α and β are taken and substituted into the program. Let the number of iterations be 300, te = 8 s, td = 4 s, ωt = ωe =ωd = 1, m = 15. Run this 20 times to get nine sets of data, as shown in Figure 10. It can be seen from the figure that the larger α is, the closer the result is to the optimal solution and the more concentrated it is. In a certain range, the increase in β will improve the optimization accuracy of the program. However, if β is too large, the optimization accuracy will decrease and the dispersion of the results will increase. It can be seen from the figure that the larger α is, the closer the result is to the optimal solution and the more concentrated it is. In a certain range, the increase in β will improve the optimization accuracy of the program. However, if β is too large, the optimization accuracy will decrease and the dispersion of the results will increase.

Comparison with Other Algorithms
In order to verify the effectiveness of SEO, use the models of genetic algorithm (GA), ant colony optimization (ACO), artificial bee colony (ABC) to solve the disassembly sequence of the turbine reducer and compare with the result of SEO. Let the number of attacks m (population number in other algorithms) be 5, 15 and 30, respectively, and let the number of iterations be 300, α = 0.5, β = 5π/18, t e = 8 s, t d = 4 s, ω t = ω e =ω d = 1. Each algorithm runs 20 times. Figure 11 shows the boxplot graph of the four algorithms under different population numbers. "+" indicates an outlier in data.

Comparison with Other Algorithms
In order to verify the effectiveness of SEO, use the models of genetic algorithm (GA), ant colony optimization (ACO), artificial bee colony (ABC) to solve the disassembly sequence of the turbine reducer and compare with the result of SEO. Let the number of attacks m (population number in other algorithms) be 5, 15 and 30, respectively, and let the number of iterations be 300, α = 0.5, β = 5π/18, te = 8 s, td = 4 s, ωt = ωe =ωd = 1. Each algorithm runs 20 times. Figure 11 shows the boxplot graph of the four algorithms under different population numbers. "+" indicates an outlier in data. It can be seen that when the number of attacks (population number) reaches a certain level, the optimization result of ACO is the best and most stable. However, when the number of attacks (population number) is low, the results of GA, ABC, and ACO are more dispersed, while SEO can maintain better accuracy. In actual production, when dismantling a group of institutions with similar but different structures, or when random damage occurs in the institutions and the disassembly sequence needs to be re-planned, the operating efficiency of the program must also be taken into consideration. The proposed method can effectively balance efficiency and accuracy.
Let m = 50, and the number of iterations be 500; other parameters are the same. For the illustration in Section 4.1, the convergence curve of a run is shown in Figure 12; the disassembly sequences of the four algorithms are shown in Table 2. It can be seen that when the number of attacks (population number) reaches a certain level, the optimization result of ACO is the best and most stable. However, when the number of attacks (population number) is low, the results of GA, ABC, and ACO are more dispersed, while SEO can maintain better accuracy. In actual production, when dismantling a group of institutions with similar but different structures, or when random damage occurs in the institutions and the disassembly sequence needs to be re-planned, the operating efficiency of the program must also be taken into consideration. The proposed method can effectively balance efficiency and accuracy.
Let m = 50, and the number of iterations be 500; other parameters are the same. For the illustration in Section 4.1, the convergence curve of a run is shown in Figure 12; the disassembly sequences of the four algorithms are shown in Table 2.
It can be seen that the proposed SEO algorithm has good convergence efficiency compared to other algorithms.  It can be seen that the proposed SEO algorithm has good convergence efficiency compared to other algorithms.

Conclusions
This paper proposes a novel DSP method based on social engineering optimizer. In order to solve the problem that the social engineering optimizer cannot solve the discrete combinatorial optimization, the swap operator and the swap sequence are introduced in SEO, and the swap sequence of the disassembly sequence is used as the optimization variable of the algorithm. On this basis, the calculation rule of exchange order and the new step of social engineering optimizer are defined. In order to generate a feasible disassembly sequence, a method of generating and correcting a disassembly sequence based on a constraint matrix is proposed. Finally, a turbo reducer is used to verify the proposed algorithm. Compared with known algorithms, this algorithm can better solve the disassembly sequence planning problem.
In actual production, the research on the disassembly line balancing problem, that is, the efficiency optimization of the disassembly process, is more extensive. As a way to improve disassembly efficiency, disassembly sequence planning is an important part of the research into the balance of disassembly lines. However, the condition of the internal parts of EOL products is unknown, and the preset disassembly sequence generally cannot meet actual requirements. Setting the internal conditions of EOL products as random variables and performing partial destructive disassembly is a solution. At the same time, parallel disassembly sequence planning is also a means to improve disassembly efficiency. However, the swap sequence is very effective in dealing with the sequence of the same

Conclusions
This paper proposes a novel DSP method based on social engineering optimizer. In order to solve the problem that the social engineering optimizer cannot solve the discrete combinatorial optimization, the swap operator and the swap sequence are introduced in SEO, and the swap sequence of the disassembly sequence is used as the optimization variable of the algorithm. On this basis, the calculation rule of exchange order and the new step of social engineering optimizer are defined. In order to generate a feasible disassembly sequence, a method of generating and correcting a disassembly sequence based on a constraint matrix is proposed. Finally, a turbo reducer is used to verify the proposed algorithm. Compared with known algorithms, this algorithm can better solve the disassembly sequence planning problem.
In actual production, the research on the disassembly line balancing problem, that is, the efficiency optimization of the disassembly process, is more extensive. As a way to improve disassembly efficiency, disassembly sequence planning is an important part of the research into the balance of disassembly lines. However, the condition of the internal parts of EOL products is unknown, and the preset disassembly sequence generally cannot meet actual requirements. Setting the internal conditions of EOL products as random variables and performing partial destructive disassembly is a solution. At the same time, parallel disassembly sequence planning is also a means to improve disassembly efficiency. However, the swap sequence is very effective in dealing with the sequence of the same length, but it cannot handle the partial disassembly and parallel disassembly. In the following research, we will focus on combining the proposed method with this.