Next Article in Journal
Set-Based Particle Swarm Optimisation: A Review
Previous Article in Journal
Neuroadaptive Asymptotic Tracking Control of Nonlinear Systems with Multiple Uncertainties
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Dynamic Complex Network, Exploring Differential Evolution Algorithms from Another Perspective

1
Faculty of Engineering, University of Toyama, Toyama-shi 930-8555, Japan
2
Graduate School of Information Sciences, Tohoku University, Sendai 980-8579, Japan
*
Author to whom correspondence should be addressed.
Mathematics 2023, 11(13), 2979; https://doi.org/10.3390/math11132979
Submission received: 12 June 2023 / Revised: 25 June 2023 / Accepted: 30 June 2023 / Published: 4 July 2023
(This article belongs to the Special Issue Dynamics in Complex Networks)

Abstract

:
Complex systems provide an opportunity to analyze the essence of phenomena by studying their intricate connections. The networks formed by these connections, known as complex networks, embody the underlying principles governing the system’s behavior. While complex networks have been previously applied in the field of evolutionary computation, prior studies have been limited in their ability to reach conclusive conclusions. Based on our investigations, we are against the notion that there is a direct link between the complex network structure of an algorithm and its performance, and we demonstrate this experimentally. In this paper, we address these limitations by analyzing the dynamic complex network structures of five algorithms across three different problems. By incorporating mathematical distributions utilized in prior research, we not only generate novel insights but also refine and challenge previous conclusions. Specifically, we introduce the biased Poisson distribution to describe the algorithm’s exploration capability and the biased power-law distribution to represent its exploitation potential during the convergence process. Our aim is to redirect research on the interplay between complex networks and evolutionary computation towards dynamic network structures, elucidating the essence of exploitation and exploration in the black-box optimization process of evolutionary algorithms via dynamic complex networks.

1. Introduction

A complex system refers to a system composed of interconnected real entities. These systems are characterized by various properties, including nonlinearity, spontaneity, emergence, and others [1]. The complexity of systems arises from the inherent challenge of accurately analyzing their internal connections, making them difficult to model [2,3]. In a complex system, every component plays a crucial role in the overall functioning, yet each individual component can be understood independently of others [4]. In the field of network research, networks that exhibit a large number of interconnected nodes and intricate relationships between them are referred to as complex networks [5,6]. Today, complex networks are a highly researched topic closely tied to information science, neuroscience, and social science [7,8,9]. When studying complex networks, an essential task is to model the network of a complete system as it allows us to extract valuable information about the system through mathematical analysis [10,11]. The analysis of various phenomena using complex networks often relies on studying their topology, including concepts like small-world networks and scale-free networks [12,13]. Complex networks have been employed as a tool to comprehend diverse subjects such as brain science research [14], studies on human social relationships [15], optimization research in control engineering [16], and other related fields [17,18,19,20]. Furthermore, complex networks offer an intriguing and effective direction in the realm of optimization algorithm research [21,22].
Evolutionary algorithms (EAs) and swarm intelligence algorithms draw inspiration from real-world phenomena and formulate them as computational algorithms [23]. Complex networks are often used to study the collective behaviors exhibited by various groups. Swarm intelligence algorithms, derived from these behaviors, such as animal behavior heuristics and sociological heuristics, often exhibit a similar structure [24]. However, there are notable differences in EAs. Over time, EAs have evolved from direct inspiration from real-world entities to incorporate more mathematical methodologies [25,26,27,28]. Among these algorithms, differential evolution algorithms (DEs) stand out due to their effectiveness and the wide range of available variants [29,30,31]. For this class of algorithms, inferring their topology from the formula becomes particularly challenging, especially when they incorporate adaptive mechanisms [32,33,34]. The study of complex networks in the context of EAs has posed significant challenges. Previous studies on DEs and complex networks have primarily adopted a result-oriented approach, where experimental analysis is performed at the end of the iteration process [35,36,37,38]. However, the network structure of EAs is not static, and in the case of DEs, the connection structure of individuals continuously changes throughout the iterations. Consequently, relying solely on a result-oriented analysis approach is insufficient for comprehensively analyzing EAs in the context of complex networks. Building upon previous research, we conducted a experimental analysis of the network structure changes during the iteration of DEs to enhance the analysis of DEs from a complex network perspective.
In the domain of algorithmic research, a fundamental theory known as the “balance between exploitation and exploration” serves as a theoretical cornerstone [39,40,41]. This theory revolves around the notion that an algorithm should strike a delicate equilibrium between its exploration and exploitation capabilities. Exploration refers to the algorithm’s capacity to discover the global optimum, whereby a stronger exploration capability enables the algorithm to continuously uncover improved solutions over successive iterations. On the other hand, exploitation pertains to the algorithm’s convergence capability, indicating its ability to swiftly progress towards a solution. Consequently, algorithm developers strive to create algorithms that are both efficient and effective in problem-solving, giving rise to the emergence of the balance between exploitation and exploration theory.
However, for a significant period, researchers have relied on abstract rather than concrete descriptions when defining the exploitation and exploration of algorithms. For instance, researchers have incorporated local search to enhance exploitation ability or introduced operators to facilitate escaping from local optima to strengthen exploration ability. However, when viewed from a different perspective, the operator used for local search may also enhance exploration ability due to the larger differences among the selected individuals, while the operator used for enhanced exploration may also involve additional local searches due to the smaller differences among the selected individuals. This ambiguity in the interpretation of the operators used for exploitation and exploration often leads to subjective author-dependent perspectives, which is clearly detrimental to the theoretical study of algorithms. Therefore, the field of evolutionary algorithms urgently requires a method to precisely calibrate the exploitation and exploration of algorithms.
We propose that the complex network structure of algorithms can serve as a manifestation of their exploitation and exploration abilities, an aspect that has yet to be extensively explored in existing research. Thus, advancing the application of complex networks in algorithm research carries significant implications for the progress of evolutionary computing. By unraveling the relationship between an algorithm’s complex network structure and its exploitation/exploration characteristics, researchers can deepen their understanding of algorithmic behavior and potentially devise more robust and efficient evolutionary algorithms.
Previous studies analyzing the complex network of DEs utilized the population interaction network (PIN) method to conduct experimental analysis [42]. The PIN method involves tracking the interactions among individuals during the algorithm’s execution, specifically recording how many old individuals are directly connected to each new generation. By quantifying and categorizing these connections, the algorithm’s PIN structure can be fitted to a specific mathematical distribution that best represents its connectivity pattern. Typically, the fitted target distribution is often characterized by either a Poisson or power-law distribution dominating the results [43,44,45]. Poisson distributions are associated with more discrete or average networks, characterized by a random network [46,47]. Power-law distributions indicate tightly connected networks that belong to the scale-free network category [48,49]. Notably, these two types of distributions exhibit mutually exclusive properties, and the closer an algorithm’s structure generally is to one of these distributions, the further it is from the other. Therefore, the proximity of an algorithm’s structure to either Poisson or power-law distributions, combined with its performance on the test set, provides insights into which type of network structure yields better algorithm performance. Unfortunately, more specific explanations and the significance of the degree distribution are not given in these studies. This is due to the difficulty of obtaining a general pattern in the structure of the network performed by iteration of the algorithm.
To resolve the relevance of complex networks to algorithms, we introduce dynamically changing complex network structures and combine them with the theory of algorithm exploitation and exploration. In this paper, we focus on the network structure changes of five algorithms: DE [50], JADE [51], SHADE [52], LSHADE [53], and EBLSHADE [54], on problems 9, 19, and 29 of the IEEE CEC2017 test set. As a continuation study, we chose to only count and compare the fitting results of Poisson distribution with power-law distribution based on previous studies. In this study, we observed a little correlation between the Poisson distribution and the algorithm’s performance. Conversely, the power-law distribution demonstrated a strong correlation with the convergence speed and global optimization capability of the algorithm, as confirmed by our experimental results.
This work aims to make the following contributions:
  • This paper presents the first experiment and study of the dynamic changes of complex networks of DEs.
  • This paper, for the first time, experimentally obtained and validated the correlation and correspondence between the complex network structure of the Poisson distribution, power-law distribution, and the exploration and exploitation of DEs.
  • This study is a complement to past research by refuting some one-sided conclusions of the study of complex networks of algorithms and presenting a more comprehensive explanation in the relationship between algorithmic network structure and performance.
In Section 2, we analyzed DEs in terms of theory and equations. In Section 3, based on the experimental results of PIN data, all experiments are analyzed and possibilities are explored from the data and images, and the concluding hypotheses of this paper are also given. Finally, in Section 4, we provide a comprehensive summary of the conclusions drawn from this research paper.

2. Methodology

2.1. Differential Evolutionary Algorithms

DE, which is widely recognized as one of the most extensively studied algorithms in EAs, encompasses a diverse range of variants. While numerous studies have proposed their own mutation formulas for DEs, the variations primarily arise from differences in individual selection methods. Thus, to simplify the categorization of DE formulas, we define the differences in formulas of DEs in the simplest way.
X i t + 1 = X s 1 t + F i · ( X s 2 t + X s 3 t X s 4 t X s 5 t )
where X indicates the individual and F means the multiplicity of mutation. We consider that the difference in the formulations of DEs lies in the difference in their individual selection strategies from s 1 to s 5 . Since the choice of individuals in complex networks is crucial, we must explain the relevant theory. First, the following is the list of the original mutation formulas of the five DE algorithms:
(1)
DE
X i t + 1 = X r 1 t + F · ( X r 2 t X r 3 t )
(2)
JADE
X i t + 1 = X i t + F i · ( X p b e s t t + X r 1 t X i t X r 2 t )
(3)
SHADE and LSHADE
X i t + 1 = X i t + F i · ( X p b e s t t + X r 1 t X i t X r 2 t )
(4)
EBLSHADE
X i t + 1 = X i t + F i · ( X o r d _ p b e s t t + X o r d _ p m e d i a n t X i t X o r d _ p w o r s t t )
We can easily find the correspondence of these algorithms with Equation (1). Taking DE as an example, we can use X s 1 t to denote X r 1 t , X s 2 t to denote X r 2 t , X s 4 t to denote X r 3 t , and take X s 3 t and X s 5 t to 0. Similarly, the other four algorithms can be represented by Equation (1). Therefore, it can be concluded that these five algorithms differ in the mutation only in the selection of individuals and in the multiplicity of difference amplification. We can rely on this to first analyze the possible network distribution of the algorithm from the perspective of the formula. Since the experimental approach of PIN does not need to consider the difference between + and −, we list the individuals used in each algorithmic mutation and crossover:
(1)
DE: X r 1 t , X r 2 t , X r 3 t , X i t .
(2)
JADE: X i t , X p b e s t t , X r 1 t , X i t , X r 2 t , X i t .
(3)
SHADE and LSHADE: X i t , X p b e s t t , X r 1 t , X i t , X r 2 t , X i t .
(4)
EBLSHADE: X i t , X o r d _ p b e s t t , X o r d _ p m e d i a n t , X i t , X o r d _ p w o r s t t , X i t .
In DE, the individual selection strategy of DE biases it toward a uniformly distributed random network structure in the mutation process because all three individuals are selected non-repetitively and randomly from the population. Utilizing the current individual X i t does not modify its probability distribution (since each individual of each generation is thus used once extra), resulting in the DE exhibiting a PIN structure that follows a Poisson distribution, with analysis focused on the formula. In the case of JADE, SHADE, and LSHADE, it is observed that they demonstrate a more pronounced power-law distribution during the mutation process compared to DE. Similar to DE, reusing the current individual does not alter the probability distribution of its individual selection. The inclusion of individuals X t r 2 from the external archive in the selection process decreases the likelihood of selecting individuals from the previous generation. This reduction can be attributed to the fact that the external archive comprises individuals that have been deemed inferior based on their historical information (continuously eliminated by the size constraint of the external archive). Moreover, the selection of X t p b e s t from the top individuals, based on a certain proportion, significantly enhances the probability of selecting superior individuals. Consequently, this leads to an increase in the utilization of minority individuals and a decrease in the utilization of majority individuals, which aligns with the characteristics of a power-law distribution. In the EBLSHADE strategy, the increased number of elite individuals reduces their likelihood of being selected compared to the elite individuals in LSHADE. As a consequence, the number of utilized individuals in EBLSHADE is smaller than that in LSHADE. Therefore, EBLSHADE exhibits a more pronounced Poisson distribution in theory compared to LSHADE. This assertion has been supported by previous research findings.
The aforementioned conclusions are derived from theoretical analysis based on formulas. Given that all DE variants employ greedy strategies, there is a possibility of individuals not undergoing renewal in each generation due to insufficient progress. The reuse of these individuals contributes to the algorithm converging towards a biased power-law distribution. Hence, a more accurate assessment of the complex network structure of DEs would involve experimental analysis rather than relying solely on formulaic derivation. In comparison with previous studies on the complex network analysis of algorithms, our theoretical analysis of the algorithm yields similar results. The purpose of re-analyzing the algorithm’s structure in this section is to further validate the fitting conclusions regarding the algorithm itself that have been unquestionably correct in past research.

2.2. Population Interaction Network

The PIN method is employed to label individuals in each generation and is recorded through the markers invoked during the generation of new individuals, ultimately yielding a count. The experimental results provide the frequency at which each marker is referenced, representing the number of times an individual is invoked. Subsequently, these invocation counts are sorted in ascending order, allowing for the determination of the distribution of individuals across different invocation levels. By analyzing this distribution, various probability distributions can be fitted, thereby revealing the underlying complex network structure. Figure 1 illustrates the schematic diagram of the PIN method in DEs. The dots represent individuals obtained from Equation (1). The individual V is obtained after the mutation process of DE and before the crossover process. The five individuals, ranging from X t s 1 to X t s 5 , along with the original individual s X s 1 t , generate a new individual X t + 1 , which then acts as the source for generating the subsequent individual X t + 2 . When a large number of individuals are interconnected as depicted in Figure 1, the resulting network structure exhibits complexity, nonlinearity, and spontaneity (as the selection of individuals is spontaneous), thereby meeting the definition of a complex network.

2.3. Some Doubts about Past Researches

As an illustration, the Poisson distribution is characterized by the condition that the majority of individuals cluster nearby a specific number of utilizations, while only a small number of individuals exhibit more or fewer utilizations. Concerning DEs, adhering to the Poisson distribution necessitates not only the formulation itself being consistent with the average utilization probability but also the renewal of individuals being in line with the predominant trend of individuals progressing in each generation. Assuming the existence of a generation where individuals largely remain stagnant without retiring, their reuse in subsequent iterations leads to an increase in their utilization, thereby deviating from the Poisson distribution. In essence, when the algorithm adheres to the Poisson distribution, it should converge smoothly, uniformly, and exhibit continuous progress.
Likewise, in the context of the power-law distribution, a small number of individuals exhibit a significant number of utilizations, while the majority of individuals possess an equal number of utilizations. In the algorithm, when it conforms to a power-law distribution, it should converge rapidly, attaining a locally optimal solution, and subsequently enter a state of stagnation. Stagnation here does not imply that all individuals cease to be updated but rather denotes that the optimal individual ceases to change, as it becomes the most utilized one. Other individuals continue to approach the optimal individual, thereby making progress. This progression is manifested in the probability density utilized by the individual, which exhibits a high concentration at the front and a low concentration at the tail, characteristic of a long tail distribution. Therefore, an algorithm that aligns with the characteristics of the power-law distribution should converge swiftly and readily transition into a state of stagnation.
The aforementioned theory does not aim to establish superiority of any particular distribution class in terms of algorithm performance. Rather, we seek to demonstrate that the PIN distribution of an algorithm is not directly linked to its performance. Notably, Li’s study also revealed that the PIN structure of EBLSHADE exhibited deviated further from a power-law distribution compared to LSHADE, specifically when the initial population size was set to 18 D [55]. Furthermore, EBLSHADE outperformed LSHADE in the CEC2017 competition, thus providing supporting evidence for our inference. As additional compelling evidence, Wang conducted a study on the fusion of complex networks and EAs, wherein an algorithm named B S O b p was specifically designed to align well with the power-law distribution [56]. Notably, although B S O b p , which originally signifies a power-law distribution, outperformed DE (which conforms to the Poisson distribution) in the CEC2005 competition, it did not employ the more widely accepted population size of 100 in the DE parameter setting. To address this, we replicated the experiment using the DE parameters commonly adopted, namely F = 0.5 , C R = 0.9 , and N = 100 , as indicated by the number of evaluations specified in their original text. Table 1 presents the results and a comparison between DE and B S O b p . Through the application of the Wilcoxon test, it becomes evident that while B S O b p outperforms DE significantly in the case of dimension 2, it is clear that DE surpasses B S O b p in dimensions 10 and 30. Does this imply that algorithms belonging to the Poisson distribution are inherently stronger than those adhering to the power-law distribution?
A similar issue arises in another article that focuses on enhancing DE through the utilization of scale-free networks [57]. The study by Yu constructs a structure for DE (judged by the formula with parameter pairs probably based on SHADE) that is consistent with a scale-free network, i.e., its compliance with a power-law distribution. Furthermore, when evaluated using the standard test set of CEC2017, SNDE significantly outperforms LSHADE-cnEpSin, which is an advanced improvement algorithm of LSHADE [58]. This demonstrates the crucial role of scale-free networks in enhancing the algorithm, as highlighted in the original article. If this inference holds true, it can be argued that SNDE should demonstrate a greater bias towards the power-law distribution compared to LSHADE. According to theory, EBLSHADE, which deviates further from the power-law distribution than LSHADE, should theoretically exhibit inferior performance to SNDE since a structure that aligns more closely with the scale-free network would yield better results. However, this is not the case when comparing the two algorithms using the test set. Table 2 presents a comprehensive comparison between SNDE and EBLSHADE, clearly indicating a significant performance gap between them. Although we did not experimentally analyze the PIN results for SNDE, it might be questionable to assert that SNDE exhibits a more pronounced power-law distribution. Nevertheless, the contradictions are still evident. Considering that the Yu paper elucidates the algorithm’s improvement based on the theoretical foundation established by Li, which posits that the better the algorithm fits the power-law distribution, the better its performance will be, our comparison results demonstrate that this assertion does not withstand scrutiny.
Our aforementioned verification and inference should not be perceived as a dismissal of the prior work conducted by researchers. Rather, it aims to elucidate that these studies might have inadvertently fallen into a local optimum. This is evident when considering a broader comparison of the performance disparities among the algorithms, which reveals that the conclusions drawn from these studies lack rigor. Subsequent comparisons demonstrate that the PIN structure of an algorithm is not directly associated with the quality of the final solution, and the algorithm that best aligns with the power-law distribution does not necessarily exhibit superior performance. Nonetheless, this does not imply that analyzing the complex network structure of the algorithm is inconsequential, as other characteristics of the algorithm may indeed exhibit a robust correlation with its distribution structure. This brings us back to a pivotal point, namely the dynamic complex network structure of the algorithm [59,60,61].

3. Dynamic Complex Network Structure of DEs

In the experimental section, we selected problem 9, problem 19, and problem 29 from the CEC2017 benchmark set, each in a 30-dimensional setting. Due to the outstanding performance of all five algorithms on unimodal functions, it is difficult to analyze their differences. Therefore, we selected a problem from simple multimodal functions, mixed functions, and composite functions for experimentation. The error values and PIN results were obtained as the averages from 30 independent runs, with the maximum number of function evaluations ( M a x f e s ) set to the standard value of 10,000 · D . The parameter setting of the algorithms adopts the parameters recommended by the original papers. The average performance of the five algorithms in CEC2017 is presented in Table 3. In order to align with the mean fitness results obtained from PIN, an error-based mean ranking approach was employed for the algorithm ranking.
Figure 2 presents the cumulative distribution plot of LSHADE while fitting to two probability distributions at the beginning and end of the iteration. It is evident that the network structure of the algorithm undergoes significant changes during the PIN statistics iteration, as depicted from top to bottom in the figure. The results before and after fitting the Poisson distribution do not change significantly, but there is a large gap before and after fitting the power-law distribution in the figure. To gain a more comprehensive understanding of the algorithm’s dynamic changes, we further analyze its transformations using continuous experimental data. In our analysis of the experimental results, we will examine the correlation between the algorithm’s behavior, which tends to favor exploration or exploitation, and the two distributions. If a consistent pattern emerges, it can serve as a plausible explanation for the relationship between the algorithm’s perceived exploitation and exploration strategies. This interpretation should be based on a dynamic network change and not only on the results of the last recording (e.g., iteration 28 in the figure).

3.1. Using PIN Records for Dynamic Complex Network

The dynamic complex network analysis of DEs still relies on the utilization of the PIN method. However, it differs from previous experimental methods as we introduce multiple experimental and computational points during the iterative convergence of the algorithm. Specifically, the previous experimental approach was to insert PIN into the iterations of the algorithm and perform the calculation of the degree distribution based on the obtained data at the end of the iteration. In contrast, we take the algorithm with P as the iteration interval and perform the calculation once every P generations and continue until the end of the iteration of the algorithm. In this way, we can obtain a line graph similar to the convergence graph of the algorithm, and this process is the dynamic change of the network structure during the iteration of the algorithm. The population sizes of DE, JADE, and SHADE remain constant, ensuring uniform convergence processes and experimentally spaced data points at P generation intervals. In contrast, algorithms like LSHADE and EBLSHADE incorporate linearly decreasing population sizes, resulting in non-uniform consumption of evaluations throughout their iterations. As a result, the convergence results for the same P generation interval do not precisely correspond to the results obtained through PIN statistics. Considering the total number of iterations of approximately three thousand generations, our experimental approach maintains sufficient accuracy. During our experimental process, we set the value of P to M a x f e s D , where M a x f e s represents the maximum number of function evaluations and D denotes the dimensionality of the problem. The evolution of EAs stops at the termination condition of the iteration, so we employ the distribution that exhibits the closest similarity to the power-law distribution based on the complete set of last results. This approach enables us to capture the overall trend of the algorithm and obtain a more accurate estimation of the distribution’s similarity.

3.2. Fitting Results of PIN

In fitting the Poisson distribution to the statistics of PIN, we obtained its SSE (sum of squares of errors) with R 2 (coefficient of determination). Specifically, the smaller the SSE, the larger the R 2 , implying that it is closer to this distribution. The fit results are derived from the average performance of thirty times, so if there is an extreme value in one case, it will greatly affect the magnitude of the results. Similarly, the convergence data used for comparison are from the same set of averages, so the control relationship does not change.

3.2.1. Fitting Results in Problem 9

Table 4 shows all the fitting results of two distributions. In Figure 3, from left to right, the fit plots for the Poisson distribution, the fit plots for the power-law distribution, and the convergence plots are represented. Analyzing the fitting results from a single distribution, all algorithms on this problem show a tendency to move away from the Poisson distribution, and most of the convergence processes show a tendency to approach the power-law distribution. By comparing the initial result (or positive second result) with the final result in the table, we can obtain that the result of SSE becomes larger and the result of R 2 becomes smaller in the Poisson distribution, which means that these algorithms are deviating from the Poisson distribution. The results of the fit to the power-law distribution show the opposite trend.
Combining the two probability distributions to analyze the convergence process of the algorithm is difficult, but we can still find some connections. Based on our proposed hypothesis, the Poisson distribution reflects the exploration ability of the algorithm and the power-law distribution reflects the exploitation ability of the algorithm. Then JADE, which is overall furthest from the Poisson distribution, should be the least explored of the five algorithms. The convergence results of JADE and SHADE are also indeed the worst in terms of optimal solution performance, and the rapid convergence and stagnation indicate that they fall into a local optimum, which implies their lack of exploration ability. For the fitting results with the power-law distribution, we believe that the faster the algorithm approaches the power-law distribution, the better the algorithm is exploited and the faster it converges at this time. Due to the simplicity of problem 9, all algorithms perform the development task in a short process, except DE. The trend of DE is the slowest in the process of approaching the power-law distribution, and its convergence is the slowest. JADE, on the other hand, ends the development process at the beginning of the iteration, and SHADE and EBLSHADE have a fast descent in the early part of the iteration, and LSHADE is slightly flatter. This is also reflected in the convergence plot. Therefore, the experiment in problem 9 is consistent with our hypothesis.

3.2.2. Fitting Results in Problem 19

In Table 5, the results in problem 19 are quite different from those in problem 9; firstly, in the degree of fitting of the Poisson distribution, it is obvious that all the algorithms have approximate fitting results of the Poisson distribution except DE, which is the closest, and JADE, which is the furthest away. What is special is that SHADE has a crossover with EBLSHADE’s Poisson distribution fitting results in the late convergence period. Again, compared with the algorithm’s exploration ability, the JADE solution has the worst quality and has a clear step-down convergence process, which is more typical of the weaker exploration ability than other algorithms. The three algorithms with close exploration ability, SHADE, LSHADE, and EBLSHADE, are very close in terms of solution quality, and they all show a trend of continuous convergence in the convergence plots, which indicates that their exploration ability is also very close. In Figure 4, to comparing the fitting trend of the power-law distribution with the convergence graph, it is clear that SHADE has the most rapid approach to the power-law distribution regarding 20 statistics, and it is indeed the fastest converging algorithm before 2500 generations. Another favorable piece of evidence that the speed of approach to the power-law distribution is positively correlated with the speed of convergence is that there is a sudden and rapid approach to the power-law distribution in the late iteration of LSHADE, which is reflected in the convergence graph as the late and rapid convergence of LSHADE and which surpasses the convergence speed and the solution quality of EBLSHADE and SHADE at one go. Then, it stalls because it is no longer close to the power-law distribution. There is no doubt that the conclusion of question 19 can still support our hypothesis.

3.2.3. Fitting Results in Problem 29

In Table 6, the results of problem 29 are again very different from the two previous problems, but this does not prevent us from being able to explain them with the same hypothesis. But this time we need to analyze the convergence plots before combining the fitting results and Figure 5. First of all, it can be seen from the fact that each algorithm does not stall on this problem, which does not require high exploration ability of the algorithm. Since the algorithm does not even fall into a local optimum, there is no need to jump out of it. Therefore, even if JADE still exhibits the weakest exploration ability, it can still obtain a good solution to this problem. Second, for the fitting results of the power-law distribution, the DE is hardly close to the power-law distribution, which is shown in the convergence plots as the slowest convergence rate and the worst quality of the solution. However, it should be noted that before the fifth statistic, the fast approach to the power-law distribution is only a small part of JADE and SHADE initially, with the arms JADE clearly approaching faster. LSHADE and EBLSHADE are slower, showing in the convergence plot that JADE has the fastest initial convergence rate and, together with SHADE, slows down quickly. At the middle of the iteration, roughly the 5th to 20th statistics, JADE and SHADE at this time are very slow in approaching the power-law distribution, while LSHADE and EBLSHADE are extremely fast in approaching the power-law distribution. The convergence plots at this stage show a continuous high rate of convergence of these two algorithms and surpass JADE and SHADE at the end.

4. Conclusions

Through experimental analysis, we obtained a conclusion that fits all experimental cases. The exploration ability of an algorithm depends on how closely its complex network structure approximates the Poisson distribution (random network), and the exploitation ability of an algorithm depends on how quickly its complex network structure approximates the power-law distribution (scale-free network). Without considering the mutual influence between exploitation and exploration, the closer the algorithm is to the Poisson distribution, the better it is at finding the global optimum. The faster the algorithm approaches the power-law distribution at some point in the iterative process, then the faster the algorithm converges, i.e., the better the exploitation capability.
Moreover, we challenge certain limitations of previous research. The quality of an algorithm cannot be determined solely by its probability distribution or by forcing a specific probability distribution to fit a predefined PIN structure. The complex network structure of an algorithm arises from a combination of operator design and strategy adaptation, and it is through this interplay that the algorithm manifests its characteristic network properties. This phenomenon reflects the emergence inherent in complex systems, and imposing rigid constraints on algorithmic processes undermines the emergence of algorithmic functionalities. The methods we propose are effective in assessing the design quality of algorithms rather than providing specific guidance for improvement. It is worth noting that certain poorly designed algorithms may yield favorable results on specific problems (such as DE in problem 9), but their complex network structures exhibit similar performance across different problem domains. Hence, algorithms that deviate significantly from or closely approximate the Poisson distribution, as well as algorithms that exhibit slow convergence towards the power-law distribution, are indicative of suboptimal design. Such algorithms are generally ill-suited for a wide range of problems. By employing the testing methods we propose, one can avoid the utilization of inadequate algorithms and instead apply more reasonable approaches that are better suited for diverse problem scenarios.
In summary, the analytical approach of dynamic complex networks provides one of the most objective and reasonable explanations for the exploitation and exploration behavior of the test algorithms so far. In subsequent studies, this approach will also be applied to more problems and more algorithms to verify and improve the theoretical structure. Eventually, we can thoroughly resolve the black-box optimization process of the algorithm.

Author Contributions

Conceptualization, Y.Y. and H.Y.; methodology, Y.Y.; software, Y.Y. and H.Y.; validation, Y.Y. and Z.Y.; formal analysis, Y.Y. and S.T.; investigation, Y.Y. and S.T.; resources, Z.T.; data curation, Y.Y.; writing—original draft preparation, Y.Y.; writing—review and editing, Y.Y. and Z.T.; visualization, Y.Y.; supervision, Z.T.; project administration, Z.T. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data will be made available upon request by contacting the corresponding author’s email address. The source code will be made public through the URL: https://velvety-frangollo-5d54c2.netlify.app/, accessed on 15 June 2023.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
EAsevolutionary algorithms
DEsdifferential evolution algorithms
PINpopulation interaction network
DEdifferential evolution
JADEadaptive differential evolution with optional external archive
SHADEsuccess-history-based parameter adaptation for DE
LSHADESHADE using linear population size reduction
EBLSHADEnovel mutation strategy for enhancing LSHADE

References

  1. Ottino, J.M. Engineering complex systems. Nature 2004, 427, 399. [Google Scholar] [CrossRef]
  2. An, L.; Grimm, V.; Sullivan, A.; Turner Ii, B.; Malleson, N.; Heppenstall, A.; Vincenot, C.; Robinson, D.; Ye, X.; Liu, J.; et al. Challenges, tasks, and opportunities in modeling agent-based complex systems. Ecol. Model. 2021, 457, 109685. [Google Scholar] [CrossRef]
  3. Belani, H.; Vukovic, M.; Car, Z. Requirements Engineering Challenges in Building AI-Based Complex Systems. In Proceedings of the 2019 IEEE 27th International Requirements Engineering Conference Workshops (REW), Jeju Island, Republic of Korea, 23–27 September 2019; pp. 252–255. [Google Scholar] [CrossRef] [Green Version]
  4. Carmichael, T.; Hadžikadić, M. The fundamentals of complex adaptive systems. In Complex Adaptive Systems: Views from the Physical, Natural, and Social Sciences; Springer: Berlin/Heidelberg, Germany, 2019; pp. 1–16. [Google Scholar]
  5. Orús, R. Tensor networks for complex quantum systems. Nat. Rev. Phys. 2019, 1, 538–550. [Google Scholar] [CrossRef] [Green Version]
  6. Sporns, O. Structure and function of complex brain networks. Dialogues Clin. Neurosci. 2022. [Google Scholar] [CrossRef]
  7. Appeltant, L.; Soriano, M.C.; Van der Sande, G.; Danckaert, J.; Massar, S.; Dambre, J.; Schrauwen, B.; Mirasso, C.R.; Fischer, I. Information processing using a single dynamical node as complex system. Nat. Commun. 2011, 2, 468. [Google Scholar] [CrossRef] [Green Version]
  8. Grimm, V.; Revilla, E.; Berger, U.; Jeltsch, F.; Mooij, W.M.; Railsback, S.F.; Thulke, H.H.; Weiner, J.; Wiegand, T.; DeAngelis, D.L. Pattern-oriented modeling of agent-based complex systems: Lessons from ecology. Science 2005, 310, 987–991. [Google Scholar] [CrossRef] [Green Version]
  9. Stylios, C.; Groumpos, P. Modeling complex systems using fuzzy cognitive maps. IEEE Trans. Syst. Man Cybern.- Part A Syst. Hum. 2004, 34, 155–162. [Google Scholar] [CrossRef]
  10. Haddadi, H.; Uhlig, S.; Moore, A.; Mortier, R.; Rio, M. Modeling internet topology dynamics. ACM SIGCOMM Comput. Commun. Rev. 2008, 38, 65–68. [Google Scholar] [CrossRef] [Green Version]
  11. Calvert, K.L.; Doar, M.B.; Zegura, E.W. Modeling internet topology. IEEE Commun. Mag. 1997, 35, 160–163. [Google Scholar] [CrossRef]
  12. Watts, D.J.; Strogatz, S.H. Collective dynamics of ‘small-world’networks. Nature 1998, 393, 440–442. [Google Scholar] [CrossRef]
  13. Barabási, A.L. Scale-free networks: A decade and beyond. Science 2009, 325, 412–413. [Google Scholar] [CrossRef] [Green Version]
  14. Bullmore, E.; Sporns, O. Complex brain networks: Graph theoretical analysis of structural and functional systems. Nat. Rev. Neurosci. 2009, 10, 186–198. [Google Scholar] [CrossRef]
  15. Bodin, Ö.; Alexander, S.M.; Baggio, J.; Barnes, M.L.; Berardo, R.; Cumming, G.S.; Dee, L.E.; Fischer, A.P.; Fischer, M.; Mancilla Garcia, M.; et al. Improving network approaches to the study of complex social–ecological interdependencies. Nat. Sustain. 2019, 2, 551–559. [Google Scholar] [CrossRef]
  16. Tan, X.; Cao, J.; Rutkowski, L. Distributed dynamic self-triggered control for uncertain complex networks with Markov switching topologies and random time-varying delay. IEEE Trans. Netw. Sci. Eng. 2019, 7, 1111–1120. [Google Scholar] [CrossRef]
  17. Zou, Y.; Donner, R.V.; Marwan, N.; Donges, J.F.; Kurths, J. Complex network approaches to nonlinear time series analysis. Phys. Rep. 2019, 787, 1–97. [Google Scholar] [CrossRef]
  18. Boers, N.; Goswami, B.; Rheinwalt, A.; Bookhagen, B.; Hoskins, B.; Kurths, J. Complex networks reveal global pattern of extreme-rainfall teleconnections. Nature 2019, 566, 373–377. [Google Scholar] [CrossRef]
  19. Li, H.; Liu, Z. Multivariate time series clustering based on complex network. Pattern Recognit. 2021, 115, 107919. [Google Scholar] [CrossRef]
  20. Qureshi, K.A.; Malick, R.A.S.; Sabih, M.; Cherifi, H. Complex network and source inspired COVID-19 fake news classification on Twitter. IEEE Access 2021, 9, 139636–139656. [Google Scholar] [CrossRef]
  21. Dorronsoro, B.; Bouvry, P. Improving Classical and Decentralized Differential Evolution with New Mutation Operator and Population Topologies. IEEE Trans. Evol. Comput. 2011, 15, 67–98. [Google Scholar] [CrossRef]
  22. Dorronsoro, B.; Bouvry, P. Study of different small-world topology generation mechanisms for Genetic Algorithms. In Proceedings of the 2012 IEEE Congress on Evolutionary Computation, Brisbane, Australia, 10–15 June 2012; pp. 1–8. [Google Scholar] [CrossRef]
  23. Bansal, J.C.; Singh, P.K.; Pal, N.R. Evolutionary and Swarm Intelligence Algorithms; Springer: Berlin/Heidelberg, Germany, 2019; Volume 779. [Google Scholar]
  24. Liu, C.; Du, W.B.; Wang, W.X. Particle swarm optimization with scale-free interactions. PLoS ONE 2014, 9, e97822. [Google Scholar] [CrossRef]
  25. Maier, H.R.; Razavi, S.; Kapelan, Z.; Matott, L.S.; Kasprzyk, J.; Tolson, B.A. Introductory overview: Optimization using evolutionary algorithms and other metaheuristics. Environ. Model. Softw. 2019, 114, 195–213. [Google Scholar] [CrossRef]
  26. Sobania, D.; Schweim, D.; Rothlauf, F. A comprehensive survey on program synthesis with evolutionary algorithms. IEEE Trans. Evol. Comput. 2022, 27, 82–97. [Google Scholar] [CrossRef]
  27. Hua, Y.; Liu, Q.; Hao, K.; Jin, Y. A survey of evolutionary algorithms for multi-objective optimization problems with irregular pareto fronts. IEEE/CAA J. Autom. Sin. 2021, 8, 303–318. [Google Scholar] [CrossRef]
  28. Mirjalili, S. Evolutionary algorithms and neural networks. In Studies in Computational Intelligence; Springer: Berlin/Heidelberg, Germany, 2019; Volume 780. [Google Scholar]
  29. Pant, M.; Zaheer, H.; Garcia-Hernandez, L.; Abraham, A. Differential Evolution: A review of more than two decades of research. Eng. Appl. Artif. Intell. 2020, 90, 103479. [Google Scholar]
  30. Tanabe, R.; Fukunaga, A. Reviewing and benchmarking parameter control methods in differential evolution. IEEE Trans. Cybern. 2019, 50, 1170–1184. [Google Scholar] [CrossRef]
  31. Opara, K.R.; Arabas, J. Differential Evolution: A survey of theoretical analyses. Swarm Evol. Comput. 2019, 44, 546–558. [Google Scholar] [CrossRef]
  32. Li, S.; Gu, Q.; Gong, W.; Ning, B. An enhanced adaptive differential evolution algorithm for parameter extraction of photovoltaic models. Energy Convers. Manag. 2020, 205, 112443. [Google Scholar] [CrossRef]
  33. Sun, G.; Yang, B.; Yang, Z.; Xu, G. An adaptive differential evolution with combined strategy for global numerical optimization. Soft Comput. 2020, 24, 6277–6296. [Google Scholar] [CrossRef]
  34. Zhou, S.; Xing, L.; Zheng, X.; Du, N.; Wang, L.; Zhang, Q. A self-adaptive differential evolution algorithm for scheduling a single batch-processing machine with arbitrary job sizes and release times. IEEE Trans. Cybern. 2019, 51, 1430–1442. [Google Scholar] [CrossRef]
  35. Skanderova, L.; Fabian, T. Differential evolution dynamics analysis by complex networks. Soft Comput. 2017, 21, 1817–1831. [Google Scholar] [CrossRef]
  36. Xiao, J.; Zhang, Y.J.; Xu, X.K. Convergence improvement of differential evolution for community detection in complex networks. Phys. A Stat. Mech. Its Appl. 2018, 503, 762–779. [Google Scholar] [CrossRef]
  37. Davendra, D.; Zelinka, I.; Metlicka, M.; Senkerik, R.; Pluhacek, M. Complex network analysis of differential evolution algorithm applied to flowshop with no-wait problem. In Proceedings of the 2014 IEEE Symposium on Differential Evolution (SDE), Orlando, FL, USA, 9–12 December 2014; pp. 1–8. [Google Scholar]
  38. Senkerik, R.; Viktorin, A.; Pluhacek, M.; Janostik, J.; Davendra, D. On the influence of different randomization and complex network analysis for differential evolution. In Proceedings of the 2016 IEEE Congress on Evolutionary Computation (CEC), Vancouver, BC, Canada, 24–29 July 2016; pp. 3346–3353. [Google Scholar]
  39. Yang, H.; Yu, Y.; Cheng, J.; Lei, Z.; Cai, Z.; Zhang, Z.; Gao, S. An intelligent metaphor-free spatial information sampling algorithm for balancing exploitation and exploration. Knowl.-Based Syst. 2022, 250, 109081. [Google Scholar] [CrossRef]
  40. Osugi, T.; Kim, D.; Scott, S. Balancing exploration and exploitation: A new algorithm for active machine learning. In Proceedings of the Fifth IEEE International Conference on Data Mining (ICDM’05), Houston, TX, USA, 27–30 November 2005; p. 8. [Google Scholar] [CrossRef] [Green Version]
  41. Cuevas, E.; Echavarría, A.; Ramírez-Ortegón, M.A. An optimization algorithm inspired by the States of Matter that improves the balance between exploration and exploitation. Appl. Intell. 2014, 40, 256–272. [Google Scholar] [CrossRef] [Green Version]
  42. Gao, S.; Wang, Y.; Wang, J.; Cheng, J. Understanding differential evolution: A Poisson law derived from population interaction network. J. Comput. Sci. 2017, 21, 140–149. [Google Scholar] [CrossRef]
  43. Consul, P.C.; Jain, G.C. A generalization of the Poisson distribution. Technometrics 1973, 15, 791–799. [Google Scholar] [CrossRef]
  44. Adamic, L.A.; Huberman, B.A. Power-law distribution of the world wide web. Science 2000, 287, 2115. [Google Scholar] [CrossRef] [Green Version]
  45. Clauset, A.; Shalizi, C.R.; Newman, M.E. Power-law distributions in empirical data. SIAM Rev. 2009, 51, 661–703. [Google Scholar] [CrossRef] [Green Version]
  46. Barabási, A.L.; Albert, R. Emergence of scaling in random networks. Science 1999, 286, 509–512. [Google Scholar] [CrossRef] [Green Version]
  47. Flory, P.J. Statistical thermodynamics of random networks. Proc. R. Soc. Lond. A Math. Phys. Sci. 1976, 351, 351–380. [Google Scholar]
  48. Mossa, S.; Barthelemy, M.; Stanley, H.E.; Amaral, L.A.N. Truncation of power law behavior in “scale-free” network models due to information filtering. Phys. Rev. Lett. 2002, 88, 138701. [Google Scholar] [CrossRef] [Green Version]
  49. Goh, K.I.; Oh, E.; Jeong, H.; Kahng, B.; Kim, D. Classification of scale-free networks. Proc. Natl. Acad. Sci. USA 2002, 99, 12583–12588. [Google Scholar] [CrossRef] [PubMed]
  50. Storn, R.; Price, K. Differential evolution—A simple and efficient heuristic for global optimization over continuous spaces. J. Glob. Optim. 1997, 11, 341–359. [Google Scholar] [CrossRef]
  51. Zhang, J.; Sanderson, A.C. JADE: Adaptive differential evolution with optional external archive. IEEE Trans. Evol. Comput. 2009, 13, 945–958. [Google Scholar] [CrossRef]
  52. Tanabe, R.; Fukunaga, A. Success-history based parameter adaptation for Differential Evolution. In Proceedings of the 2013 IEEE Congress on Evolutionary Computation, Cancun, Mexico, 20–23 June 2013; pp. 71–78. [Google Scholar] [CrossRef] [Green Version]
  53. Tanabe, R.; Fukunaga, A.S. Improving the search performance of SHADE using linear population size reduction. In Proceedings of the 2014 IEEE Congress on Evolutionary Computation (CEC), Beijing, China, 6–11 July 2014; pp. 1658–1665. [Google Scholar] [CrossRef] [Green Version]
  54. Mohamed, A.W.; Hadi, A.A.; Jambi, K.M. Novel mutation strategy for enhancing SHADE and LSHADE algorithms for global numerical optimization. Swarm Evol. Comput. 2019, 50, 100455. [Google Scholar] [CrossRef]
  55. Li, X.; Li, J.; Yang, H.; Wang, Y.; Gao, S. Population interaction network in representative differential evolution algorithms: Power-law outperforms Poisson distribution. Phys. A Stat. Mech. Its Appl. 2022, 603, 127764. [Google Scholar] [CrossRef]
  56. Wang, Y.; Gao, S.; Yu, Y.; Xu, Z. The discovery of population interaction with a power law distribution in brain storm optimization. Memetic Comput. 2019, 11, 65–87. [Google Scholar] [CrossRef]
  57. Yu, Y.; Gao, S.; Zhou, M.; Wang, Y.; Lei, Z.; Zhang, T.; Wang, J. Scale-free network-based differential evolution to solve function optimization and parameter estimation of photovoltaic models. Swarm Evol. Comput. 2022, 74, 101142. [Google Scholar] [CrossRef]
  58. Awad, N.H.; Ali, M.Z.; Suganthan, P.N. Ensemble sinusoidal differential covariance matrix adaptation with Euclidean neighborhood for solving CEC2017 benchmark problems. In Proceedings of the 2017 IEEE Congress on Evolutionary Computation (CEC), Donostia, Spain, 5–8 June 2017; pp. 372–379. [Google Scholar] [CrossRef]
  59. Boccaletti, S.; Latora, V.; Moreno, Y.; Chavez, M.; Hwang, D.U. Complex networks: Structure and dynamics. Phys. Rep. 2006, 424, 175–308. [Google Scholar] [CrossRef]
  60. Strogatz, S.H. Exploring complex networks. Nature 2001, 410, 268–276. [Google Scholar] [CrossRef] [Green Version]
  61. Estrada, E. Introduction to complex networks: Structure and dynamics. In Evolutionary Equations with Applications in Natural Sciences; Springer: Berlin/Heidelberg, Germany, 2014; pp. 93–131. [Google Scholar]
Figure 1. Schematic diagram of the population interaction network.
Figure 1. Schematic diagram of the population interaction network.
Mathematics 11 02979 g001
Figure 2. CDF at the beginning and end of the iteration.
Figure 2. CDF at the beginning and end of the iteration.
Mathematics 11 02979 g002
Figure 3. Fitting and convergence results during iteration in problem 9.
Figure 3. Fitting and convergence results during iteration in problem 9.
Mathematics 11 02979 g003
Figure 4. Fitting and convergence results during iteration in problem 19.
Figure 4. Fitting and convergence results during iteration in problem 19.
Mathematics 11 02979 g004
Figure 5. Fitting and convergence results during iteration in problem 29.
Figure 5. Fitting and convergence results during iteration in problem 29.
Mathematics 11 02979 g005
Table 1. Comparison of DE and B S O b p in CEC2005.
Table 1. Comparison of DE and B S O b p in CEC2005.
D = 2D = 10D = 30
DE BSO bp DE BSO bp DE BSO bp
FuctionMeanStdMeanStdMeanStdMeanStdMeanStdMeanStd
F1 4.50 × 10 2 0 4.50 × 10 2 0 4.50 × 10 2 0 4.50 × 10 2 0 4.50 × 10 2 3.69 × 10 29 4.50 × 10 2 0
F2 4.50 × 10 2 0 4.50 × 10 2 0 4.50 × 10 2 0 4.50 × 10 2 0 4.50 × 10 2 5.93 × 10 8 4.49 × 10 2 6.20 × 10 1
F3 4.50 × 10 2 0 4.50 × 10 2 0 4.50 × 10 2 1.85 × 10 26 6.15 × 10 4 1.18 × 10 5 2.82 × 10 5 1.93 × 10 5 1.89 × 10 6 5.15 × 10 5
F4 4.50 × 10 2 0 4.50 × 10 2 0 4.50 × 10 2 0 4.43 × 10 2 3.18 × 10 1 4.50 × 10 2 1.93 × 10 4 2.06 × 10 4 3.17 × 10 3
F5 3.10 × 10 2 0 3.10 × 10 2 0 3.10 × 10 2 0 3.09 × 10 2 5.40 × 10 1 2.97 × 10 2 2.64 × 10 1 4.06 × 10 3 7.03 × 10 2
F6 4.29 × 10 2 0 3.90 × 10 2 0 1.66 × 10 3 0 3.96 × 10 2 8.30 × 10 1 3.90 × 10 2 1.18 × 10 3 970 × 10 2 3.27 × 10 2
F7 1.80 × 10 2 0 1.41 × 10 2 0 1.60 × 10 2 1.52 × 10 13 1.23 × 10 3 6.08 × 10 1 4.52 × 10 3 3.07 × 10 4 6.64 × 10 3 2.63 × 10 2
F8 1.40 × 10 2 0 1.39 × 10 2 3.16 1.39 × 10 2 4.82 × 10 2 1.20 × 10 2 3.66 × 10 2 1.19 × 10 2 4.90 × 10 2 1.20 × 10 2 1.10 × 10 1
F9 3.30 × 10 2 0 3.30 × 10 2 0 3.24 × 10 2 2.11 3.27 × 10 2 1.04 2.32 × 10 2 2.52 × 10 1 2.30 × 10 2 6.31
F10 3.30 × 10 2 0 3.30 × 10 2 0 3.30 × 10 2 3.86 3.27 × 10 2 1.24 1.53 × 10 2 7.3 3.01 × 10 2 1.05 × 10 1
F11 9.00 × 10 1 0 9.00 × 10 1 0 9.17 × 10 1 6.93 × 10 1 9.27 × 10 1 8.50 × 10 1 1.29 × 10 2 1.11 1.14 × 10 2 2.99
F12 4.60 × 10 2 1.54 × 10 29 4.60 × 10 2 0 4.59 × 10 2 3.79 4.47 × 10 2 1.60 × 10 1 1.32 × 10 3 2.08 × 10 3 1.58 × 10 4 1.08 × 10 4
F13 1.30 × 10 2 0 1.30 × 10 2 0 1.28 × 10 2 5.24 × 10 1 1.29 × 10 2 1.90 × 10 1 1.15 × 10 2 1.1 1.25 × 10 2 1.17
F14 3.00 × 10 2 0 3.00 × 10 2 0 1.49 × 10 2 4.44 × 10 1 2.97 × 10 2 3.10 × 10 1 2.87 × 10 2 1.24 × 10 1 2.88 × 10 2 4.00 × 10 1
F15 1.20 × 10 2 0 1.20 × 10 2 0 2.12 × 10 2 1.56 × 10 2 2.07 × 10 2 9.99 × 10 1 5.20 × 10 2 6.43 × 10 1 5.15 × 10 2 9.34 × 10 1
F16 1.20 × 10 2 0 1.20 × 10 2 0 2.20 × 10 2 2.11 × 10 1 2.06 × 10 2 1.97 × 10 1 3.19 × 10 2 1.02 × 10 1 2.02 × 10 2 9.26 × 10 1
F17 1.83 × 10 2 0 1.20 × 10 2 0 8.87 × 10 2 1.30 × 10 2 2.13 × 10 2 1.87 × 10 1 3.41 × 10 2 2.04 × 10 1 3.12 × 10 2 1.65 × 10 2
F18 2.10 × 10 2 9.64 × 10 1 1.00 × 10 1 0 7.77 × 10 2 1.27 × 10 2 7.62 × 10 2 1.84 × 10 2 9.07 × 10 2 2.64 × 10 1 9.01 × 10 2 4.65 × 10 1
F19 1.76 × 10 2 5.87 × 10 1 1.07 × 10 2 4.90 × 10 1 7.43 × 10 2 1.27 × 10 2 7.13 × 10 2 2.06 × 10 2 9.11 × 10 2 1.92 × 10 1 8.97 × 10 2 4.89 × 10 1
F20 1.90 × 10 2 8.44 × 10 1 6.00 × 10 1 6.30 × 10 1 5.03 × 10 2 1.73 × 10 2 8.24 × 10 2 1.05 × 10 2 9.11 × 10 2 1.91 × 10 1 9.01 × 10 2 4.65 × 10 1
F21 5.48 × 10 2 6.10 × 10 1 3.60 × 10 2 0 1.08 × 10 3 1.08 × 10 2 7.67 × 10 2 1.70 × 10 2 8.60 × 10 2 1.73 × 10 13 8.60 × 10 2 2.75 × 10 13
F22 5.63 × 10 2 4.09 × 10 1 3.67 × 10 2 3.65 × 10 2 1.01 × 10 3 1.15 × 10 2 9.34 × 10 2 2.29 × 10 2 1.26 × 10 3 8.32 1.25 × 10 3 9.15
F23 5.60 × 10 2 1.03 × 10 2 3.60 × 10 2 0 5.60 × 10 2 1.41 × 10 2 1.04 × 10 3 1.26 × 10 2 8.94 × 10 2 2.57 × 10 4 9.08 × 10 2 7.36 × 10 1
F24 3.60 × 10 2 0 4.38 × 10 2 4.45 × 10 1 2.00 × 10 3 0 4.70 × 10 2 5.48 × 10 1 4.60 × 10 2 2.89 × 10 14 4.60 × 10 2 0
F25 2.60 × 10 2 0 3.60 × 10 2 0 2.60 × 10 2 4.5 2.01 × 10 3 5.21 1.91 × 10 3 4.26 1.93 × 10 3 6.39
W/T/L3/14/811/4/108/10/7
Table 2. Comparison of SNDE and EBLSHADE in CEC2017.
Table 2. Comparison of SNDE and EBLSHADE in CEC2017.
D = 10D = 30D = 50D = 100
SNDEEBLSHADESNDEEBLSHADESNDEEBLSHADESNDEEBLSHADE
FuctionMeanstdMeanStdMeanStdMeanStdMeanStdMeanStdMeanStdMeanStd
F10000000 5.80 × 10 15 3.75 × 10 5 1.69 × 10 4 0 2.53 × 10 14 5.43 × 10 3 6.79 × 10 3 9.59 × 10 6 1.32 × 10 5
F30000000 5.68 × 10 14 00 5.68 × 10 13 4.05 × 10 13 3.28 × 10 4 7.47 × 10 4 4.18 × 10 4 6.84 × 10 4
F40000 1.02 × 10 1 2.12 × 10 1 4.10 × 10 1 2.85 × 10 1 5.10 × 10 1 4.65 × 10 1 5.38 × 10 1 4.94 × 10 1 1.79 × 10 2 4.26 × 10 1 1.32 × 10 2 5.71 × 10 1
F53.692.292.42 8.40 × 10 1 4.55 × 10 1 1.44 × 10 1 7.521.35 1.21 × 10 2 2.49 × 10 1 1.48 × 10 1 1.98 4.40 × 10 2 5.76 × 10 1 4.28 × 10 1 7.96
F65.67 2.26 × 10 6 00 3.57 × 10 1 9.25 × 10 1 4.56 × 10 9 2.45 × 10 8 1.262.44 1.38 × 10 4 7.39 × 10 4 1.20 × 10 1 1.06 × 10 1 1.64 × 10 2 9.88 × 10 3
F7 1.36 × 10 1 2.04 1.21 × 10 1 5.11 × 10 1 9.48 × 10 1 2.35 × 10 1 3.74 × 10 1 1.29 2.84 × 10 2 8.06 × 10 1 6.35 × 10 1 1.76 1.06 × 10 3 3.40 × 10 2 1.47 × 10 2 5.33
F82.962.112.06 9.25 × 10 1 3.86 × 10 1 1.09 × 10 1 7.401.25 1.30 × 10 2 2.44 × 10 1 1.55 × 10 1 2.78 4.98 × 10 2 6.48 × 10 1 4.92 × 10 1 5.67
F9 1.76 × 10 3 1.25 × 10 2 00 2.54 × 10 1 3.23 × 10 1 00 1.16 × 10 3 1.07 × 10 3 00 9.18 × 10 3 4.37 × 10 3 1.55 9.28 × 10 1
F10 1.76 × 10 2 1.61 × 10 2 4.09 × 10 1 4.81 × 10 1 2.81 × 10 3 7.27 × 10 2 1.53 × 10 3 2.34 × 10 2 5.08 × 10 3 1.29 × 10 3 3.16 × 10 3 3.31 × 10 2 1.20 × 10 4 1.19 × 10 3 1.07 × 10 4 4.96 × 10 2
F11 8.33 × 10 1 1.24 4.94 × 10 1 6.74 × 10 1 9.78 × 10 1 3.61 × 10 1 9.98 1.45 × 10 1 1.97 × 10 2 4.72 × 10 1 4.87 × 10 1 8.19 1.05 × 10 3 2.26 × 10 2 4.83 × 10 2 7.60 × 10 1
F12 1.91 × 10 2 1.31 × 10 2 2.71 × 10 1 1.87 × 10 1 7.00 × 10 3 6.02 × 10 3 7.95 × 10 2 2.83 × 10 2 1.17 × 10 4 9.26 × 10 3 1.94 × 10 3 4.94 × 10 2 1.62 × 10 5 7.02 × 10 4 3.18 × 10 4 1.22 × 10 4
F133.993.081.992.49 1.42 × 10 2 1.25 × 10 2 1.29 × 10 1 7.12 4.18 × 10 3 4.94 × 10 3 5.14 × 10 1 3.18 × 10 1 6.61 × 10 3 4.85 × 10 3 2.59 × 10 2 6.40 × 10 1
F14 7.18 × 10 1 1.00 6.38 × 10 1 1.22 1.01 × 10 2 3.80 × 10 1 2.23 × 10 1 3.01 2.89 × 10 2 9.12 × 10 1 2.81 × 10 1 1.66 2.25 × 10 3 1.13 × 10 3 2.03 × 10 2 2.50 × 10 1
F151.392.28 1.56 × 10 1 1.82 × 10 1 1.22 × 10 2 7.29 × 10 1 3.13 9.33 × 10 1 3.18 × 10 2 1.26 × 10 2 3.30 × 10 1 5.02 2.47 × 10 3 2.71 × 10 3 2.38 × 10 2 4.95 × 10 1
F167.66 2.81 × 10 1 3.32 × 10 1 2.11 × 10 1 3.95 × 10 2 2.23 × 10 2 1.27 × 10 2 1.08 × 10 2 8.10 × 10 2 3.15 × 10 2 4.09 × 10 2 8.10 × 10 1 2.71 × 10 3 5.45 × 10 2 1.53 × 10 3 2.37 × 10 2
F172.425.12 1.56 × 10 1 1.62 × 10 1 6.69 × 10 1 4.88 × 10 1 3.41 × 10 1 6.39 6.17 × 10 2 2.27 × 10 2 2.82 × 10 2 6.15 × 10 1 2.10 × 10 3 4.36 × 10 2 1.15 × 10 3 2.08 × 10 2
F187.609.74 2.41 × 10 1 1.98 × 10 1 1.56 × 10 2 1.68 × 10 2 2.13 × 10 1 6.65 × 10 1 1.20 × 10 3 1.01 × 10 3 2.87 × 10 1 3.10 9.09 × 10 3 5.44 × 10 3 1.96 × 10 2 3.31 × 10 1
F19 3.60 × 10 1 6.61 × 10 1 1.23 × 10 2 1.04 × 10 2 9.20 × 10 1 4.64 × 10 1 5.341.65 1.43 × 10 2 4.95 × 10 1 1.77 × 10 1 3.89 3.92 × 10 3 4.31 × 10 3 1.76 × 10 2 2.40 × 10 1
F20 5.03 × 10 1 2.9600 1.16 × 10 2 6.97 × 10 1 3.82 × 10 1 7.88 3.18 × 10 2 1.50 × 10 2 2.03 × 10 2 7.75 × 10 1 1.87 × 10 3 4.72 × 10 2 1.58 × 10 2 2.19 × 10 2
F21 1.89 × 10 2 3.84 × 10 1 1.35 × 10 2 4.85 × 10 1 2.42 × 10 2 1.37 × 10 1 2.07 × 10 1 1.68 3.13 × 10 2 2.66 × 10 1 2.17 × 10 2 2.00 6.47 × 10 2 9.17 × 10 1 2.75 × 10 2 6.11
F22 9.74 × 10 1 1.39 × 10 1 1.00 × 10 2 7.99 × 10 2 1.00 × 10 2 1.08 1.00 × 10 2 0 4.45 × 10 3 2.41 × 10 3 7.92 × 10 2 1.43 × 10 3 1.37 × 10 4 1.39 × 10 3 1.10 × 10 4 2.76 × 10 3
F23 3.04 × 10 2 3.81 3.02 × 10 2 1.39 3.89 × 10 2 1.53 × 10 1 3.44 × 10 2 2.63 5.62 × 10 2 5.10 × 10 1 4.28 × 10 2 9.98 9.54 × 10 2 1.32 × 10 2 6.48 × 10 2 1.88 × 10 1
F24 3.09 × 10 2 6.97 × 10 1 2.90 × 10 2 8.49 × 10 1 4.59 × 10 2 1.72 × 10 1 4.22 × 10 2 2.04 6.15 × 10 2 5.35 × 10 1 5.07 × 10 2 5.46 1.44 × 10 3 1.81 × 10 2 9.57 × 10 2 1.67 × 10 1
F25 4.20 × 10 2 2.33 × 10 1 4.15 × 10 2 2.20 × 10 1 3.90 × 10 2 8.92 3.87 × 10 2 4.14 × 10 2 5.43 × 10 2 4.08 × 10 1 5.23 × 10 2 2.28 × 10 1 7.94 × 10 2 7.30 × 10 1 7.49 × 10 2 3.08 × 10 1
F26 3.04 × 10 2 1.85 × 10 1 3.00 × 10 2 0 1.43 × 10 3 6.38 × 10 2 9.03 × 10 2 4.72 × 10 1 3.65 × 10 3 1.05 × 10 3 1.17 × 10 3 7.88 × 10 1 1.32 × 10 4 3.39 × 10 3 3.46 × 10 3 1.44 × 10 2
F27 3.92 × 10 2 2.86 3.93 × 10 2 1.69 5.21 × 10 2 1.46 × 10 1 5.01 × 10 2 6.53 7.56 × 10 2 1.11 × 10 2 5.33 × 10 2 1.27 × 10 1 1.10 × 10 3 1.54 × 10 2 6.49 × 10 2 1.93 × 10 1
F28 3.60 × 10 2 1.18 × 10 2 3.09 × 10 2 5.09 × 10 1 3.38 × 10 2 5.52 × 10 1 3.14 × 10 2 3.70 × 10 1 4.92 × 10 2 2.32 × 10 1 4.98 × 10 2 1.95 × 10 1 5.55 × 10 2 2.88 × 10 1 5.61 × 10 2 2.57 × 10 1
F29 2.44 × 10 2 9.72 2.35 × 10 2 2.48 5.43 × 10 2 9.70 × 10 1 4.33 × 10 2 5.98 8.97 × 10 2 2.51 × 10 2 3.55 × 10 2 9.01 3.68 × 10 3 6.40 × 10 2 1.04 × 10 3 1.01 × 10 2
F30 6.45 × 10 4 2.22 × 10 5 4.01 × 10 2 1.64 × 10 1 2.21 × 10 3 1.97 × 10 2 2.01 × 10 3 3.64 × 10 1 7.09 × 10 5 1.33 × 10 5 5.94 × 10 5 2.38 × 10 4 3.25 × 10 3 3.18 × 10 2 2.49 × 10 3 1.47 × 10 2
W/T/L1/5/231/4/242/2/252/0/27
Table 3. Average result of five algorithms in three problems of CEC2017.
Table 3. Average result of five algorithms in three problems of CEC2017.
FunDEJADESHADELSHADEEBLSHADE
MeanRankMeanRankMeanRankMeanRankMeanRank
F901 5.27 × 10 3 4 8.91 × 10 3 50101
F19 1.77 × 10 1 4 5.03 × 10 1 5 8.16 35.0315.342
F29 6.21 × 10 2 5 4.72 × 10 2 4 4.66 × 10 2 3 4.32 × 10 2 1 4.33 × 10 2 2
Table 4. Fitting results in problem 9.
Table 4. Fitting results in problem 9.
PossionPower-Law
DEJADESHADELSHADEEBLSHADEDEJADESHADELSHADEEBLSHADE
SSE R 2 SSE R 2 SSE R 2 SSE R 2 SSE R 2 SSE R 2 SSE R 2 SSE R 2 SSE R 2 SSE R 2
0.03200.99080.38650.95900.09920.9842----0.49030.60070.02270.97550.00720.9923----
0.04710.98770.42960.95580.11570.9825----0.40690.67810.01590.98420.01440.9814----
0.05500.98610.43880.95540.11510.98280.05410.99200.09500.98600.32210.73990.01810.98330.02350.96390.04100.95160.02910.9658
0.05990.98540.44470.95500.11470.98300.06410.99100.11620.98330.26770.78130.01820.98320.02990.95240.02660.97130.06620.9080
0.06300.98480.44900.95470.11440.98310.07420.99020.12530.98420.22500.81140.01830.98300.03480.94370.02530.97320.06160.9144
0.06570.98440.47250.95240.11730.98350.10610.98730.15050.98210.18600.84000.01930.98160.03050.95320.01300.98720.02130.9786
0.06700.98420.51160.94850.13300.98310.13920.98360.15290.98180.15670.86150.02340.97730.01200.98560.00910.99080.01880.9818
0.06820.98400.53490.94620.14750.98210.15410.98180.15270.98190.13180.88020.02340.97660.02110.97080.00740.99250.01880.9819
0.06990.98370.55020.94470.16370.98050.15780.98140.15240.98190.11870.89110.02460.97520.02090.97150.00690.99300.01860.9824
0.07120.98360.56240.94350.17900.97880.15940.98120.15220.98190.10210.90460.02460.97480.01660.97920.00690.99310.01870.9824
0.07230.98340.57270.94240.19140.97750.16070.98110.15200.98190.08550.91790.02430.97470.01620.98040.00690.99310.01860.9824
0.07310.98330.58130.94160.20060.97660.16190.98090.15180.98200.07520.92630.02460.97420.01740.97940.00690.99310.01860.9825
0.07390.98310.58920.94080.20670.97590.16280.98080.15160.98200.06650.93350.02410.97430.01650.98140.00720.99290.01840.9827
0.07460.98300.59620.94010.21090.97550.16370.98070.15150.98200.05820.94050.02400.97410.01630.98210.00720.99290.01830.9828
0.07520.98300.60210.93950.21310.97530.16430.98060.15140.98200.05370.94460.02420.97380.01490.98370.00730.99280.01840.9827
0.07550.98290.60720.93900.21450.97520.16490.98060.15130.98210.04940.94830.02420.97360.01560.98290.00750.99260.01840.9828
0.07620.98280.61240.93850.21540.97520.16540.98050.15120.98210.04370.95320.02430.97330.01500.98370.00750.99260.01840.9828
0.07860.98250.61730.93800.21570.97520.16590.98050.15110.98210.04330.95400.02430.97320.01360.98520.00760.99260.01820.9830
0.07870.98310.62180.93760.21560.97520.16630.98040.15100.98210.04910.95070.02430.97300.01300.98600.00770.99250.01810.9830
0.07770.98430.62550.93720.21540.97530.16660.98040.15100.98210.04730.95440.02420.97300.01220.98680.00780.99240.01810.9830
0.07770.98480.62880.93690.21500.97540.16700.98030.15100.98210.04800.95510.02430.97280.01160.98730.00790.99230.01810.9830
0.07760.98500.63180.93660.21460.97550.16720.98030.15090.98210.04700.95570.02410.97290.01130.98760.00800.99230.01810.9830
0.07650.98530.63460.93630.21440.97550.16740.98030.15080.98210.04900.95440.02400.97290.01090.98800.00800.99230.01810.9830
0.07540.98560.63730.93600.21410.97560.16760.98030.15060.98210.04820.95450.02400.97280.01070.98820.00800.99220.01810.9830
0.07420.98580.63980.93580.21370.97570.16770.98020.15040.98220.04770.95440.02380.97290.01050.98840.00800.99220.01810.9830
0.07320.98600.64220.93550.21320.97580.16780.98020.15030.98220.04740.95410.02380.97290.01050.98830.00810.99220.01810.9830
0.07200.98620.64430.93530.21280.97590.16780.98020.15010.98220.04740.95350.02380.97280.01050.98830.00810.99220.01810.9830
0.07120.98640.64660.93510.21240.97590.16780.98020.14990.98220.04740.95290.02370.97280.01030.98840.00810.99210.01810.9829
0.07040.98660.64840.93490.21210.97600.16790.98020.14970.98220.04760.95220.02370.97280.01040.98820.00810.99220.01820.9829
0.06960.98670.65030.93470.21180.97610.16790.98020.14970.98220.04800.95140.02350.97290.01040.98820.00810.99220.01820.9829
Table 5. Fitting results in problem 19.
Table 5. Fitting results in problem 19.
PossionPower-Law
DEJADESHADELSHADEEBLSHADEDEJADESHADELSHADEEBLSHADE
SSE R 2 SSE R 2 SSE R 2 SSE R 2 SSE R 2 SSE R 2 SSE R 2 SSE R 2 SSE R 2 SSE R 2
0.03960.98910.37080.96030.09420.9852----0.16900.83270.58480.75270.32450.7691----
0.04760.98760.41380.95700.10500.9838----0.09870.89690.31220.83850.23800.8230----
0.05140.98690.42870.95580.10950.98330.06280.99070.09470.98630.06740.92610.26530.85570.15890.87420.01370.98920.00930.9899
0.05260.98670.43750.95500.11420.98270.06710.99030.10410.98520.06160.93180.25170.86110.13360.89210.00740.99370.00840.9909
0.05320.98660.44840.95400.11620.98240.06760.99030.10360.98520.06040.93320.24130.86560.11700.90330.00710.99380.00790.9913
0.05360.98660.45430.95350.11770.98230.06780.99030.10340.98530.05900.93450.23570.86950.11260.90670.00730.99360.00770.9915
0.05390.98650.45850.95320.11970.98220.06820.99020.10350.98530.05960.93390.21540.87770.09550.91960.00780.99320.00760.9916
0.05400.98650.46050.95310.12230.98190.06850.99020.10400.98520.06330.93060.20350.88390.08660.92650.00810.99290.00750.9916
0.05410.98650.46020.95320.12430.98180.06840.99020.10430.98520.06100.93280.18940.89050.08130.93110.00820.99280.00740.9917
0.05430.98640.45720.95350.12590.98170.06850.99020.10460.98510.06340.93100.16840.90020.07290.93770.00840.99260.00710.9920
0.05430.98640.45420.95390.12650.98170.06900.99010.10530.98500.06000.93370.13350.91670.06390.94480.00840.99250.00690.9923
0.05440.98640.45080.95430.12690.98170.06970.99000.10610.98490.05960.93420.12130.92310.05620.95080.00760.99300.00680.9925
0.05450.98640.44430.95500.12750.98160.07060.98990.10690.98480.05900.93470.09330.93810.05260.95370.00770.99290.00630.9929
0.05460.98640.43780.95580.12740.98160.07200.98970.10800.98470.06030.93360.07410.94920.04610.95890.00760.99290.00610.9932
0.05480.98630.43250.95630.12740.98160.07410.98940.10900.98460.05980.93410.06710.95430.04370.96120.00740.99300.00620.9931
0.05490.98630.42750.95690.12620.98190.07680.98910.11000.98450.05920.93460.05580.96110.03790.96610.00710.99330.00610.9932
0.05500.98630.42230.95740.12350.98230.07970.98880.11100.98430.05620.93750.05460.96320.03430.96930.00700.99350.00620.9931
0.05510.98630.41920.95780.12100.98260.08240.98860.11160.98430.05590.93780.04070.97060.02920.97360.00620.99430.00620.9931
0.05530.98620.41740.95800.11840.98310.08470.98850.11250.98420.05530.93840.03610.97350.02420.97790.00690.99380.00590.9935
0.05540.98620.41580.95810.11670.98330.08660.98840.11310.98410.05490.93870.03250.97580.02170.97990.00890.99260.00610.9933
0.05570.98620.41460.95830.11430.98370.08840.98830.11390.98410.05440.93920.02920.97800.02000.98110.01260.99040.00610.9933
0.05590.98610.41440.95830.11240.98390.08970.98830.11420.98400.05370.94000.02810.97860.01860.98210.00760.99370.00610.9933
0.05620.98600.41550.95820.11070.98420.09070.98820.11420.98400.05290.94070.02920.97780.01630.98380.01320.99010.00600.9934
0.05650.98600.41700.95810.10980.98440.09120.98820.11400.98410.05200.94170.02950.97750.01580.98390.01470.98930.00620.9932
0.05680.98590.41850.95790.10870.98460.09150.98820.11380.98410.05120.94240.02840.97800.01570.98370.01280.99050.00630.9931
0.05710.98580.41990.95780.10810.98470.09180.98830.11340.98410.05130.94220.02790.97840.01600.98310.01280.99060.00630.9929
0.05730.98580.42160.95760.10760.98490.09180.98830.11310.98420.04960.94400.02620.97920.01650.98230.01390.98990.00650.9927
0.05770.98570.42340.95740.10780.98490.09190.98830.11280.98420.04850.94500.02630.97910.01620.98240.01300.99040.00670.9925
0.05800.98560.42520.95730.10840.98500.09190.98840.11250.98430.04760.94600.02510.97960.01480.98350.01270.99060.00680.9924
0.05830.98550.42710.95710.10910.98510.09180.98840.11230.98440.04670.94680.02410.98040.01510.98310.01360.99010.00690.9923
Table 6. Fitting results in problem 29.
Table 6. Fitting results in problem 29.
PossionPower-Law
DEJADESHADELSHADEEBLSHADEDEJADESHADELSHADEEBLSHADE
SSE R 2 SSE R 2 SSE R 2 SSE R 2 SSE R 2 SSE R 2 SSE R 2 SSE R 2 SSE R 2 SSE R 2
0.02820.99140.33890.96260.08440.9863----0.04290.93690.02770.95800.00900.9893----
0.03220.99050.37670.95990.09190.9855----0.04280.94230.02500.95890.00830.9907----
0.03440.99000.39560.95870.09720.98500.05030.99200.05480.99120.04320.94340.02790.94760.00980.98940.21960.85900.01600.9852
0.03580.98970.40640.95790.10130.98450.05180.99190.05890.99070.04480.94230.02290.95930.01500.98450.22850.85630.01520.9857
0.03720.98940.41310.95740.10500.98410.05240.99190.06250.99030.04280.94390.01960.97080.01680.98310.22240.86030.01470.9861
0.03830.98920.41880.95690.10870.98400.05340.99180.06640.98970.04410.94360.01960.97080.02090.97970.20460.87020.01310.9875
0.03870.98910.42130.95670.11110.98390.05590.99150.07090.98910.04480.94390.01960.97070.02370.97750.16200.89390.01210.9883
0.03970.98890.42440.95650.11250.98380.05970.99100.07530.98850.04330.94520.01820.97330.02370.97760.11200.92280.01070.9897
0.04040.98880.42690.95630.11400.98370.06380.99050.07920.98810.04460.94460.01710.97530.02500.97670.07650.94460.01000.9904
0.04100.98870.42930.95610.11520.98350.06810.99000.08310.98760.04530.94400.01760.97420.02460.97690.05410.95960.00900.9914
0.04180.98850.43080.95600.11650.98340.07160.98950.08620.98730.04470.94490.01660.97590.02310.97810.03900.96990.00830.9921
0.04240.98830.43200.95590.11770.98330.07420.98910.08840.98710.04330.94610.01680.97550.02190.97920.02980.97630.00760.9926
0.04300.98820.43370.95580.11880.98320.07600.98890.09010.98690.04170.94770.01620.97680.02220.97900.02570.97930.00720.9931
0.04380.98800.43500.95570.11950.98320.07740.98870.09160.98670.04200.94730.01550.97790.02080.98030.02140.98250.00710.9932
0.04500.98770.43600.95560.12020.98320.07870.98850.09270.98660.04230.94760.01510.97850.02030.98070.01840.98470.00670.9936
0.04560.98760.43750.95540.12090.98310.07990.98840.09370.98650.04060.94980.01480.97910.02050.98060.01610.98650.00650.9938
0.04610.98750.43860.95540.12170.98310.08100.98830.09460.98640.03960.95020.01470.97920.02060.98050.01440.98780.00620.9941
0.04700.98730.43920.95530.12200.98310.08210.98820.09520.98630.03990.95010.01460.97950.02050.98050.01290.98910.00610.9941
0.04820.98700.44010.95520.12270.98300.08300.98810.09580.98620.03820.95250.01430.98000.01990.98110.01180.98990.00610.9942
0.04890.98680.44090.95520.12310.98300.08380.98800.09630.98620.03860.95160.01460.97950.02020.98090.01070.99080.00610.9942
0.05010.98660.44180.95510.12360.98300.08430.98790.09670.98610.03960.95080.01440.97980.02000.98110.01030.99110.00610.9942
0.05150.98630.44270.95500.12390.98300.08470.98790.09690.98610.03970.95140.01400.98050.01960.98150.01000.99130.00610.9942
0.05270.98600.44360.95490.12420.98300.08500.98780.09710.98600.03720.95430.01400.98060.01960.98150.00960.99160.00600.9943
0.05370.98580.44460.95490.12460.98290.08500.98780.09720.98600.03850.95330.01360.98120.01960.98150.00970.99160.00600.9943
0.05460.98570.44550.95480.12500.98290.08510.98780.09730.98600.03760.95440.01410.98020.01930.98180.00990.99140.00600.9943
0.05570.98550.44640.95470.12500.98290.08510.98780.09730.98600.03840.95330.01370.98090.01950.98160.00990.99140.00610.9942
0.05660.98530.44690.95470.12530.98290.08510.98780.09730.98600.03720.95490.01330.98170.01980.98140.01000.99140.00610.9942
0.05840.98500.44730.95460.12570.98290.08510.98780.09720.98600.03760.95480.01310.98190.01900.98210.01010.99130.00610.9942
0.06000.98470.44790.95460.12590.98290.08510.98780.09720.98600.03760.95540.01300.98210.01890.98220.01020.99120.00610.9942
0.06110.98440.44840.95450.12640.98280.08510.98780.09720.98600.03680.95640.01300.98210.01830.98270.01030.99110.00610.9942
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yang, Y.; Tao, S.; Yang, H.; Yuan, Z.; Tang, Z. Dynamic Complex Network, Exploring Differential Evolution Algorithms from Another Perspective. Mathematics 2023, 11, 2979. https://doi.org/10.3390/math11132979

AMA Style

Yang Y, Tao S, Yang H, Yuan Z, Tang Z. Dynamic Complex Network, Exploring Differential Evolution Algorithms from Another Perspective. Mathematics. 2023; 11(13):2979. https://doi.org/10.3390/math11132979

Chicago/Turabian Style

Yang, Yifei, Sichen Tao, Haichuan Yang, Zijing Yuan, and Zheng Tang. 2023. "Dynamic Complex Network, Exploring Differential Evolution Algorithms from Another Perspective" Mathematics 11, no. 13: 2979. https://doi.org/10.3390/math11132979

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop