Binary Chaotic White Shark Optimizer for the Unicost Set Covering Problem
Abstract
1. Introduction
1.1. Main Contributions
- Empirical evaluation demonstrating that specific binarization schemes and chaotic maps align with different problem structures: circle-based maps excel in structured instances while sinusoidal maps perform better in cyclic instances.
- Comprehensive analysis of population diversity and exploration–exploitation dynamics, providing insights into the algorithm behavior across different problem types using established metrics [6].
- Establishment of a performance benchmark for the USCP that demonstrates empirical improvements over standard binarization approaches (RPD improvements of up to 7.31%), though statistical significance was not established across all configurations, building upon previous comparative studies [25].
1.2. Paper Organization
2. Problem Definition
Mathematical Formulation
3. Related Work
3.1. Unicost Set Covering
3.2. Binary Metaheuristics
- Modified BPSO with genotype–phenotype representation and genetic algorithm mutations outperformed the original BPSO [23]
- BPSO improved feature selection in gene expression data, enhancing classification accuracy [24].
- BPSO solved unit commitment problems with superior cost and computation time [26].
- BPSO extracted high-quality rules in association rule mining [27].
- Novel velocity definitions improved BPSO’s binary interpretation [28].
- BPSO optimized high-utility itemset mining, reducing search space [29].
- BPSO adapted for knapsack problems maintained diversity and effectiveness [30].
- BPSO solved lot-sizing problems, finding optimal solutions in most cases [31].
3.3. Chaotic Maps into Metaheuristic
- Sensitivity to initial conditions: Minute differences in starting values lead to exponentially diverging trajectories.
- Ergodicity: The ability to non-repetitively visit all possible states within bounded regions.
- Intrinsic randomness: Despite being deterministic, chaotic sequences pass many statistical tests for randomness.
- Self-similarity: Many chaotic attractors exhibit fractal structures across different scales.
4. White Shark Optimizer
- Movement speed toward prey: White sharks utilize an undulating motion that leverages the waves produced by the movement of their prey. This behavior, guided by their auditory and olfactory senses, enables them to navigate efficiently toward potential food sources.
- Random prey search: White sharks move toward areas where prey activity has been detected and remain close to the most promising targets. This strategy involves exploring potential food sources randomly across the ocean.
- Nearby prey localization behavior: White sharks mimic the behavior of fish schools to identify nearby prey. In this process, a shark moves toward the most successful individual in the search, enhancing its ability to locate optimal prey.
4.1. Mathematical Model
4.1.1. Parameter Initialization
4.1.2. Shark Movement Speed Towards Prey
4.1.3. Updating Shark Velocity in Pursuit
- Sharks adjust their positions randomly around the prey, using their sense of smell as a guide.
- Sharks reposition themselves in the search space based on their ability to hear the prey.
4.1.4. Position Update Based on Schooling Behavior
4.1.5. Pseudocode for WSO
Algorithm 1 White Shark Optimizer. |
|
5. Binarization Techniques
5.1. Two-Step Technique
5.1.1. Transfer Function
5.1.2. Binarization Rules
6. A New Binary Approach for the White Shark Optimizer
6.1. Conceptual Framework for Binary Adaptation
6.1.1. Semantic Interpretation in Binary Domain
6.1.2. Shark Behavior Mapping to USCP Context
- Prey location (): Represents the best-known set selection pattern that minimizes coverage cost.
- Shark movement: Corresponds to iterative refinement of set selection decisions.
- Hunting behavior: Translates to the exploration of alternative set combinations while exploiting promising selection patterns.
6.1.3. Dual Binarization Rationale
- Consistency preservation: Both position and velocity represent decision-related information that should operate in the same domain to maintain algorithmic coherence.
- Enhanced decision dynamics: Binary velocity components provide discrete decision change signals that complement position-based set selections.
- Unified representation: Dual binarization eliminates domain inconsistencies that can arise when mixing continuous and binary components.
6.1.4. Mathematical Formulation Bridge
6.2. Transformation of Velocity and Population into Binary States
6.3. Initialization of Parameters
- Population size(n): This is simply the number of “sharks” or candidate solutions we use to explore the problem space. More sharks mean better exploration but require more computational resources.
- Velocity parameters (v, , , , , ): These control how the sharks move through the solution space—how fast they move, how much they are attracted to good solutions, and how they balance exploring new areas versus exploiting known good regions.
Binarize Velocity and Positions
- Transfer Function: We apply the V3 transfer function () to both population positions and velocities. We select V3 [40] after comparative testing because it preserves the directional information while producing the well-distributed probability values, outperforming S-shaped alternatives in preliminary experiments.
- Chaotic Maps: Instead of standard random number generation, we employ four chaotic maps to generate dynamic thresholds. Table 1 presents the mathematical definitions of these chaotic systems, while Figure 1 illustrates their behavioral patterns (Table 5):These deterministic systems produce complex, non-repeating sequences that enhance search diversity while maintaining structured exploration patterns. Each map offers unique characteristics: the singer map provides oscillatory behavior ideal for early exploration, the sinusoidal map delivers smooth transitions suitable for cyclic problems, the tent map creates sharp transitions for aggressive exploitation, and the circle map offers balanced ergodic properties for structured instances.
- Binarization Rule: After evaluating multiple approaches, we select the Elitist (ELIT) rule defined as
6.4. Chaotic Maps for Adaptive Thresholding
- Circle Map: We utilize this map with parameters and in equation . Our empirical analysis reveals this map’s exceptional performance in structured USCP instances (clr10-13), achieving up to 7.31% improvement in RPD compared to standard binarization approaches. The map’s balanced threshold dynamics particularly enhance the exploitation capabilities in well-defined solution spaces.
- Singer Map: Configured with in , this map generates the oscillatory sequences that enhance early-stage exploration. Our experimental results show this map is particularly effective during the initial search phases (first 150 iterations) when the population diversity is critical.
- Sinusoidal Map: We implement this map with in and discover its remarkable effectiveness in cyclic USCP instances (cyc06-07), where it achieves an RPD of 0.96% compared to 3.56% from standard methods. The map’s gradual threshold adaptations demonstrates significant alignment with cyclic problem structures.
- Tent Map: Our implementation with in this piecewise function creates sharp threshold transitions that accelerate convergence in later optimization stages while maintaining sufficient diversity to avoid premature convergence.
- Deterministic unpredictability: Unlike standard random number generators, our chaotic threshold sequences create structured exploration patterns that consistently outperform uniform random thresholds in our comparative analysis.
- Dynamic adaptation: Our implementation allows threshold values to evolve based on each map’s unique mathematical properties, automatically adjusting the exploration–exploitation balance throughout the optimization process.
- Problem-specific optimization: Our findings enable problem-specific chaotic map selection—circle maps for structured problems and sinusoidal maps for cyclic instances—facilitating tailored optimization strategies.
6.5. Repairing Complex Solutions
- Coverage constraint violations: When a binary solution fails to cover all elements in the universe, we implement a greedy repair heuristic that iteratively adds the most efficient sets (those covering the most uncovered elements) until all elements are covered. This is formulated as
- Redundant set elimination: After ensuring coverage, we apply a redundancy removal procedure that examines each selected set and removes it if all its covered elements are also covered by other selected sets. Sets are evaluated in ascending order of their efficiency (elements covered per set) to prioritize removing less efficient sets:
- The dynamic thresholds created by chaotic maps maintain population diversity, minimizing premature convergence to infeasible regions.
- The greedy repair heuristic preserves the solution structure created by the WSO while enforcing problem constraints.
- The redundancy elimination step improves solution quality without disrupting the exploration–exploitation balance established by the algorithm.
Algorithm 2 Binary White Shark Optimizer. | ||
1: | Establish the problem’s boundaries and constraints. | |
2: | Specify the configuration settings for the WSO. | |
3: | Create random starting locations for the WSO. | |
4: | Initialize the population’s movement rates. | |
5: | Assess the fitness of the initial population’s placements. | |
6: | while do | |
7: | Update the parameters v, , , , a, b, , f, , and respectively. | |
8: | for do | ▹ Velocity update phase |
9: | ||
10: | end for | |
11: | for do | ▹ Position update phase |
12: | if then | |
13: | ||
14: | else | |
15: | ||
16: | end if | |
17: | end for | |
18: | for do | ▹ Schooling behavior phase |
19: | if then | |
20: | ||
21: | if then | |
22: | ||
23: | else | |
24: | ||
25: | ||
26: | end if | |
27: | end if | |
28: | end for | |
29: | for to do | |
30: | for to do | |
31: | Apply transfer function: | ▹ on population |
32: | Generate chaotic value | |
33: | Apply binarization rule: | ▹ A chaotic map to generate the random sequence for the rule |
34: | ||
35: | Apply transfer function: | ▹ on velocity |
36: | Generate chaotic value | |
37: | Apply binarization rule: | ▹ A chaotic map to generate the random sequence for the rule |
38: | ||
39: | end for | |
40: | end for | |
41: | Enforce boundary constraints for shark positions. | |
42: | Check USCP coverage constraints and adjust fitness values. | ▹ Ensure all elements are covered |
43: | end while | |
44: | Retrieve the most optimal solution found so far. |
Algorithm 3 Chaotic Dual Binarization Process. | ||
1: | Input: Continuous position , continuous velocity , global best solution , map type . | |
2: | Output: New binary position . | |
3: | Initialize a chaotic map seed for the current individual. | |
4: | for to do | ▹ Iterate through each dimension of the solution |
5: | ||
6: | — Step 1: Binarize Position Component — | |
7: | ||
8: | ▹ Apply V3 transfer function to position | |
9: | ▹ Generate chaotic threshold | |
10: | if then | |
11: | ▹ Apply Elitist rule | |
12: | else | |
13: | ||
14: | end if | |
15: | ||
16: | — Step 2: Binarize Velocity Component — | |
17: | ||
18: | ▹ Apply V3 transfer function to velocity | |
19: | ▹ Generate next chaotic threshold | |
20: | if then | |
21: | ▹ Apply Elitist rule | |
22: | else | |
23: | ||
24: | end if | |
25: | ||
26: | — Step 3: Combine Both Binary Components — | |
27: | ||
28: | ▹ Combine using Bitwise OR | |
29: | end for | |
30: | Return | ▹ Return the complete new binary solution for the individual |
7. Results and Discussion
7.1. Experimental Setup
- Transfer Function: V3.
- Binarization Rules: Elit.
- Chaotic Maps: Circle, Singer, Sinu, and Tent.
- Structured Instances (clr10–13): These instances, derived from Beasley’s OR-Library [4], feature well-defined constraint matrices with regular patterns. They represent classic set covering challenges with the following characteristics:
- –
- clr10: 511 rows × 210 columns, density 3.8%, optimal solution = 25
- –
- clr11: 1023 rows × 330 columns, density 1.9%, optimal solution = 23
- –
- clr12: 2047 rows × 495 columns, density 0.9%, optimal solution = 23
- –
- clr13: 4095 rows × 715 columns, density 0.5%, optimal solution = 23
These instances feature increasing sparsity as problem size grows, testing algorithm scalability. - Cyclic Instances (cyc06–07): These instances represent network design problems with cyclic coverage patterns:
- –
- cyc06: 240 rows × 192 columns, density 5.1%, optimal solution = 60
- –
- cyc07: 672 rows × 448 columns, density 2.1%, optimal solution = 144
These instances exhibit circular dependency structures that challenge greedy solution approaches and require balanced exploration–exploitation strategies.
7.2. Summary of Results
- Best: The best result obtained.
- Avg: The average of the best fitness values across all runs.
- RPD: The “Relative Percentage Deviation”, which measures the percentage deviation of the obtained solution from the best-known solution, evaluating the algorithm’s quality [41].
7.3. Statistical Analysis
7.4. Analysis of Diversity Graphs
- n is the population size (number of sharks).
- l is the problem dimension (number of binary variables).
- is the median value of the population in dimension d.
- is the value of the i-th shark in dimension d.
- Instance clr10 (Figure 10):
- –
- The 5 binarization schemes converge from diversity values of 0.5 to 0.2.
- –
- The Elit scheme is the most stable, without pronounced peaks.
- –
- The Elit_Circle scheme is also stable but exhibits slight peaks.
- –
- The Elit_Singer scheme shows peaks toward values below 0.1.
- –
- The Elit_Sinu scheme exhibits many peaks between 0.2 and 0.1, displaying erratic behavior.
- –
- The Elit_Tent scheme is stable, similar to the Elit scheme.
In this instance, the Elit and Elit_Tent schemes are the most consistent. - Instance clr11 (Figure 11):
- –
- The schemes converge from 0.2 to 0, indicating a rapid reduction in diversity.
- –
- The Elit scheme shows several peaks toward 0.
- –
- The Elit_Circle scheme remains close to 0 with peaks toward 0.1.
- –
- The Elit_Singer scheme varies between 0.1 and 0.
- –
- The Elit_Sinu scheme also varies between 0.1 and 0.
- –
- The Elit_Tent scheme exhibits behavior similar to the others.
In this instance, all schemes tend to converge quickly, with Elit_Circle and Elit_Tent showing a slightly better balance. - Instance clr12 (Figure 12):
- –
- All schemes converge from 0.1 to 0, showing very similar behaviors.
This instance does not present significant differences between the schemes, suggesting that the problem is less sensitive to the choice of binarization scheme. - Instance clr13 (Figure 13):
- –
- Similar to clr12, all schemes converge from 0.1 to 0.
As in clr12, there are no notable differences between the schemes. - Instance cyc06 (Figure 14):
- –
- The schemes are divided into two groups:
- *
- Elit, Elit_Tent, and Elit_Circle: Vary between 0.1 and 0, showing stable behavior.
- *
- Elit_Singer and Elit_Sinu: Vary between 0.4 and 0.2, indicating greater exploration.
The Elit, Elit_Tent, and Elit_Circle schemes are more efficient in this instance. - Instance cyc07 (Figure 15):
- –
- Similar to cyc06 but with some differences:
- *
- Elit, Elit_Tent, and Elit_Circle: Vary between 0.1 and 0.
- *
- Elit_Singer: Varies between 0.4 and 0.3.
- *
- Elit_Sinu: Varies between 0.3 and 0.2.
Again, the Elit, Elit_Tent, and Elit_Circle schemes are more efficient.
7.5. Exploration vs. Exploitation
- If XPL ≥ XPT, the algorithm is in an exploration state (searching new regions).
- If XPL < XPT, the algorithm is in an exploitation state (refining known solutions).
- Instance clr10:
- –
- All schemes (Figure 16, Figure 17, Figure 18, Figure 19 and Figure 20) exhibit balanced behavior between exploration and exploitation. However, the schemes in Figure 18 Elit_Singer and Figure 19 Elit_Sinu show a tendency toward higher exploitation, which may explain their slightly higher RPD values compared to the others.
- Instance clr11:
- –
- The schemes (Figure 21, Figure 22, Figure 23, Figure 24 and Figure 25) generally lean toward higher exploitation, which is consistent with the rapid convergence observed in the diversity graphs. The schemes in Figure 23 Elit_Singer and Figure 24 Elit_Sinu display more variability, suggesting a stronger exploration component in their search process.
- Instance clr12:
- –
- Instance clr13:
- –
- Instance cyc06:
- –
- The schemes (Figure 36, Figure 37, Figure 38, Figure 39 and Figure 40) show high exploitation with low variability, except for Figure 38 Elit_Singer and Figure 39 Elit_Sinu, which maintain a better balance between exploration and exploitation but with higher variability. This behavior aligns with their lower RPD and Std-dev values, indicating better performance in this smaller instance.
- Instance cyc07:
- –
- Similar to cyc06, the schemes (Figure 41, Figure 42, Figure 43, Figure 44 and Figure 45) exhibit high exploitation with low variability. Again, Figure 43 Elit_Singer and Figure 44 Elit_Sinu demonstrate a more balanced approach, with higher variability but also better RPD and Std-dev values, highlighting their effectiveness in smaller instances.
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Bautista, J.; Pereira, J. A GRASP algorithm to solve the unicost set covering problem. Comput. Oper. Res. 2007, 34, 3162–3173. [Google Scholar] [CrossRef]
- Naji-Azimi, Z.; Toth, P.; Galli, L. An electromagnetism metaheuristic for the unicost set covering problem. Eur. J. Oper. Res. 2010, 205, 290–300. [Google Scholar] [CrossRef]
- Xu, Q.; Li, J. The Relationship between the Unicost Set Covering Problem and the Attribute Reduction Problem in Rough Set Theory. Math. Probl. Eng. 2020, 2020, 5359691. [Google Scholar] [CrossRef]
- Pinard, M.; Moalic, L.; Brévilliers, M.; Lepagnot, J.; Idoumghar, L. A Memetic Approach for the Unicost Set Covering Problem. In Proceedings of the Learning and Intelligent Optimization, Athens, Greece, 24–28 May 2020; Kotsireas, I.S., Pardalos, P.M., Eds.; Springer: Cham, Switzerland, 2020; pp. 233–248. [Google Scholar]
- Wang, Y.; Pan, S.; Al-Shihabi, S.; Zhou, J.; Yang, N.; Yin, M. An improved configuration checking-based algorithm for the unicost set covering problem. Eur. J. Oper. Res. 2021, 294, 476–491. [Google Scholar] [CrossRef]
- Becerra-Rozas, M.; Lemus-Romani, J.; Cisternas-Caneo, F.; Crawford, B.; Soto, R.; Astorga, G.; Castro, C.; García, J. Continuous Metaheuristics for Binary Optimization Problems: An Updated Systematic Literature Review. Mathematics 2023, 11, 129. [Google Scholar] [CrossRef]
- Crawford, B.; Soto, R.; Astorga, G.; García, J.; Castro, C.; Paredes, F. Putting Continuous Metaheuristics to Work in Binary Search Spaces. Complexity 2017, 2017, 8404231. [Google Scholar] [CrossRef]
- Kennedy, J.; Eberhart, R. A discrete binary version of the particle swarm algorithm. In Proceedings of the 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation, Orlando, FL, USA, 12–15 October 1997; Volume 5, pp. 4104–4108. [Google Scholar] [CrossRef]
- Lanza-Gutierrez, J.M.; Crawford, B.; Soto, R.; Berrios, N.; Gomez-Pulido, J.A.; Paredes, F. Analyzing the effects of binarization techniques when solving the set covering problem through swarm optimization. Expert Syst. Appl. 2017, 70, 67–82. [Google Scholar] [CrossRef]
- Nadimi-Shahraki, M.H.; Banaie-Dezfouli, M.; Zamani, H.; Taghian, S.; Mirjalili, S. B-MFO: A Binary Moth-Flame Optimization for Feature Selection from Medical Datasets. Computers 2021, 10, 136. [Google Scholar] [CrossRef]
- Mafarja, M.; Aljarah, I.; Faris, H.; Hammouri, A.I.; Al-Zoubi, A.M.; Mirjalili, S. Binary grasshopper optimisation algorithm approaches for feature selection problems. Expert Syst. Appl. 2019, 117, 267–286. [Google Scholar] [CrossRef]
- Braik, M.; Hammouri, A.; Atwan, J.; Al-Betar, M.A.; Awadallah, M.A. White Shark Optimizer: A novel bio-inspired meta-heuristic algorithm for global optimization problems. Knowl.-Based Syst. 2022, 243, 108457. [Google Scholar] [CrossRef]
- Zhu, P.; Hu, J.; Zhu, Z.; Xiao, F.; Li, J.; Peng, H. An efficient energy management method for plug-in hybrid electric vehicles based on multi-source and multi-feature velocity prediction and improved extreme learning machine. Appl. Energy 2025, 380, 125096. [Google Scholar] [CrossRef]
- Sheeba, M.C.; Christopher, C.S. Adaptive deep residual network for image denoising across multiple noise levels in medical, nature, and satellite images. Ain Shams Eng. J. 2025, 16, 103188. [Google Scholar] [CrossRef]
- Nagaraju, V.; Bala, G.; Ch, D.; Ravindran, G.; Biswal, M. Machine Learning–Informed Geomaterial Design for Embankment Construction. Transp. Infrastruct. Geotechnol. 2024, 12, 56. [Google Scholar] [CrossRef]
- Reda, R. Enhancing Object Detection and Classification Using White Shark Optimization with Deep Learning on Remote Sensing Images. Fusion Pract. Appl. 2025, 17, 147–160. [Google Scholar] [CrossRef]
- Elgamal, Z.M.; Yasin, N.B.M.; Tubishat, M.; Alswaitti, M.; Mirjalili, S. An Improved Harris Hawks Optimization Algorithm with Simulated Annealing for Feature Selection in the Medical Field. IEEE Access 2020, 8, 186638–186652. [Google Scholar] [CrossRef]
- Pierezan, J.; dos Santos Coelho, L.; Mariani, V.C.; de Vasconcelos Segundo, E.H.; Prayogo, D. Chaotic coyote algorithm applied to truss optimization problems. Comput. Struct. 2021, 242, 106353. [Google Scholar] [CrossRef]
- dos Santos Coelho, L.; Mariani, V.C. Firefly algorithm approach based on chaotic Tinkerbell map applied to multivariable PID controller tuning. Comput. Math. Appl. 2012, 64, 2371–2382. [Google Scholar] [CrossRef]
- Çelik, E. A powerful variant of symbiotic organisms search algorithm for global optimization. Eng. Appl. Artif. Intell. 2020, 87, 103294. [Google Scholar] [CrossRef]
- Abdelrazek, M.; Elaziz, M.A.; El-Baz, A.H. CDMO: Chaotic Dwarf Mongoose Optimization Algorithm for feature selection. Sci. Rep. 2024, 14, 701. [Google Scholar] [CrossRef]
- Cisternas-Caneo, F.; Crawford, B.; Soto, R.; Giachetti, G.; Paz, Á.; Fritz, A.P. Chaotic Binarization Schemes for Solving Combinatorial Optimization Problems Using Continuous Metaheuristics. Mathematics 2024, 12, 262. [Google Scholar] [CrossRef]
- Lee, S.; Soak, S.; Oh, S.; Pedrycz, W.; Jeon, M. Modified binary particle swarm optimization. Prog. Nat. Sci. 2008, 18, 1161–1166. [Google Scholar] [CrossRef]
- Chuang, L.Y.; Chang, H.W.; Tu, C.J.; Yang, C.H. Improved binary PSO for feature selection using gene expression data. Comput. Biol. Chem. 2008, 32, 29–38. [Google Scholar] [CrossRef]
- Lepe-Silva, F.; Crawford, B.; Cisternas-Caneo, F.; Barrera-Garcia, J.; Soto, R. A Binary Chaotic White Shark Optimizer. Mathematics 2024, 12, 3171. [Google Scholar] [CrossRef]
- Yuan, X.; Nie, H.; Su, A.; Wang, L.; Yuan, Y. An improved binary particle swarm optimization for unit commitment problem. Expert Syst. Appl. 2009, 36, 8049–8055. [Google Scholar] [CrossRef]
- Sarath, K.; Ravi, V. Association rule mining using binary particle swarm optimization. Eng. Appl. Artif. Intell. 2013, 26, 1832–1840. [Google Scholar] [CrossRef]
- Khanesar, M.A.; Teshnehlab, M.; Shoorehdeli, M.A. A novel binary particle swarm optimization. In Proceedings of the 2007 Mediterranean Conference on Control & Automation, Athens, Greece, 27–29 June 2007; pp. 1–6. [Google Scholar] [CrossRef]
- Lin, J.C.W.; Yang, L.; Fournier-Viger, P.; Hong, T.P.; Voznak, M. A binary PSO approach to mine high-utility itemsets. Soft Comput. 2017, 21, 5103–5121. [Google Scholar] [CrossRef]
- Bansal, J.C.; Deep, K. A Modified Binary Particle Swarm Optimization for Knapsack Problems. Appl. Math. Comput. 2012, 218, 11042–11061. [Google Scholar] [CrossRef]
- Tasgetiren, M.; Liang, Y.C. A Binary Particle Swarm Optimization Algorithm for Lot Sizing Problem. J. Econ. Soc. Res. 2004, 5, 1–20. [Google Scholar]
- Mafarja, M.; Qasem, A.; Heidari, A.A.; Aljarah, I.; Faris, H.; Mirjalili, S. Efficient Hybrid Nature-Inspired Binary Optimizers for Feature Selection. Cogn. Comput. 2020, 12, 150–175. [Google Scholar] [CrossRef]
- Too, J.; Abdullah, A.R.; Mohd Saad, N. A New Quadratic Binary Harris Hawk Optimization for Feature Selection. Electronics 2019, 8, 1130. [Google Scholar] [CrossRef]
- Mafarja, M.; Heidari, A.A.; Faris, H.; Mirjalili, S.; Aljarah, I. Dragonfly Algorithm: Theory, Literature Review, and Application in Feature Selection. In Nature-Inspired Optimizers: Theories, Literature Reviews and Applications; Mirjalili, S., Dong, J.S., Lewis, A., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 47–67. [Google Scholar] [CrossRef]
- Alweshah, M.; Alkhalaileh, S.; Al-Betar, M.A.; Bakar, A.A. Coronavirus herd immunity optimizer with greedy crossover for feature selection in medical diagnosis. Knowl.-Based Syst. 2022, 235, 107629. [Google Scholar] [CrossRef] [PubMed]
- Hu, J.; Chen, H.; Heidari, A.A.; Wang, M.; Zhang, X.; Chen, Y.; Pan, Z. Orthogonal learning covariance matrix for defects of grey wolf optimizer: Insights, balance, diversity, and feature selection. Knowl.-Based Syst. 2021, 213, 106684. [Google Scholar] [CrossRef]
- Dhiman, G.; Oliva, D.; Kaur, A.; Singh, K.K.; Vimal, S.; Sharma, A.; Cengiz, K. BEPO: A novel binary emperor penguin optimizer for automatic feature selection. Knowl.-Based Syst. 2021, 211, 106560. [Google Scholar] [CrossRef]
- Agrawal, P.; Abutarboush, H.F.; Ganesh, T.; Mohamed, A.W. Metaheuristic Algorithms on Feature Selection: A Survey of One Decade of Research (2009–2019). IEEE Access 2021, 9, 26766–26791. [Google Scholar] [CrossRef]
- Mehmood, K.; Chaudhary, N.I.; Khan, Z.A.; Cheema, K.M.; Zahoor Raja, M.A. Atomic physics-inspired atom search optimization heuristics integrated with chaotic maps for identification of electro-hydraulic actuator systems. Mod. Phys. Lett. B 2024, 38, 2450308. [Google Scholar] [CrossRef]
- Lemus-Romani, J.; Crawford, B.; Cisternas-Caneo, F.; Soto, R.; Becerra-Rozas, M. Binarization of Metaheuristics: Is the Transfer Function Really Important? Biomimetics 2023, 8, 400. [Google Scholar] [CrossRef]
- Almonacid, B.; Soto, R. Andean Condor Algorithm for cell formation problems. Nat. Comput. 2019, 18, 351–381. [Google Scholar] [CrossRef]
Type | Chaotic Maps |
---|---|
Singer Map | |
Sinusoidal Map | , where |
Tent Map | |
Circle Map | , where and |
Symbol | Definition |
---|---|
ub | Upper bound |
lb | Lower bound |
n | Number of search agents |
d | Dimension |
t | Current iteration |
T | Maximum iterations |
S-Shaped | Equation | V-Shaped | Equation |
---|---|---|---|
S1 | V1 | ||
S2 | V2 | ||
S3 | V3 | ||
S4 | V4 |
Type | Binarization Rules |
---|---|
Standard (STD) | |
Complement (COM) | |
Static Probability (SP) | |
Elitist (ELIT) |
Chaotic Maps | ELIT |
---|---|
Circle Map | ELIT_CIRCLE |
Singer Map | ELIT_SINGER |
Sinusoidal Map | ELIT_SINU |
Tent Map | ELIT_TENT |
Parameter | Value |
---|---|
Independent runs | 31 |
Transfer function | V3 |
Number of binarization schemes | 5 |
Number of USCP instances | 6 |
Population size | 30 |
Number of iterations | 500 |
WSO Parameters | a = 2 |
= 0.07 | |
= 0.75 | |
= 4.125 | |
= 6.25 | |
= 100 | |
= 0.0005 |
Experiment | clr10 (25) | clr11 (23) | ||||||
---|---|---|---|---|---|---|---|---|
Best | Avg. | Std-Dev | RPD | Best | Avg. | Std-Dev | RPD | |
WSO-ELIT | 25 | 26.9 | 0.64 | 7.61 | 23 | 24.23 | 0.91 | 5.33 |
WSO-ELIT_CIRCLE | 25 | 25.97 | 0.97 | 3.87 | 23 | 23.16 | 0.51 | 0.7 |
WSO-ELIT_SINGER | 26 | 27.39 | 0.66 | 9.55 | 23 | 24.71 | 0.58 | 7.43 |
WSO-ELIT_SINU | 26 | 27.32 | 0.64 | 9.29 | 24 | 24.9 | 0.3 | 8.27 |
WSO-ELIT_TENT | 25 | 26.87 | 0.79 | 7.48 | 23 | 23.84 | 0.99 | 3.65 |
Experiment | clr12 (23) | clr13 (23) | ||||||
---|---|---|---|---|---|---|---|---|
Best | Avg. | Std-Dev | RPD | Best | Avg. | Std-Dev | RPD | |
WSO-ELIT | 23 | 26.06 | 1.11 | 13.32 | 25 | 28 | 1.22 | 21.74 |
WSO-ELIT_CIRCLE | 23 | 24.55 | 1.39 | 6.73 | 25 | 27.39 | 1.29 | 19.07 |
WSO-ELIT_SINGER | 26 | 26.39 | 0.61 | 14.73 | 27 | 28.16 | 0.92 | 22.44 |
WSO-ELIT_SINU | 26 | 26.42 | 0.61 | 14.87 | 27 | 28.52 | 1.01 | 23.98 |
WSO-ELIT_TENT | 23 | 25.81 | 0.9 | 12.2 | 26 | 27.55 | 1.07 | 19.78 |
Experiment | cyc06 (60) | cyc07 (144) | ||||||
---|---|---|---|---|---|---|---|---|
Best | Avg. | Std-Dev | RPD | Best | Avg. | Std-Dev | RPD | |
WSO-ELIT | 60 | 61.03 | 0.82 | 1.72 | 144 | 149.13 | 1.96 | 3.56 |
WSO-ELIT_CIRCLE | 60 | 61.45 | 0.76 | 2.42 | 144 | 151.58 | 1.72 | 5.26 |
WSO-ELIT_SINGER | 60 | 60 | 0 | 0 | 144 | 149.32 | 3.1 | 3.7 |
WSO-ELIT_SINU | 60 | 60 | 0 | 0 | 144 | 145.39 | 2.97 | 0.96 |
WSO-ELIT_TENT | 60 | 60.94 | 0.8 | 1.56 | 144 | 148.87 | 2.11 | 3.38 |
Configuration | Description |
---|---|
WSO-ELIT | Baseline configuration using standard random number generation for binarization thresholds |
WSO-ELIT_CIRCLE | Enhanced with circle chaotic map for dynamic threshold generation |
WSO-ELIT_SINGER | Enhanced with Singer chaotic map for dynamic threshold generation |
WSO-ELIT_SINU | Enhanced with Sinusoidal chaotic map for dynamic threshold generation |
WSO-ELIT_TENT | Enhanced with Tent chaotic map for dynamic threshold generation |
ELIT | ELIT_CIRCLE | ELIT_SINGER | ELIT_SINU | ELIT_TENT | |
---|---|---|---|---|---|
ELIT | X | 0.6 | 0.337 | 0.429 | 0.823 |
ELIT_CIRCLE | 0.401 | X | 0.401 | 0.4 | 0.457 |
ELIT_SINGER | 0.666 | 0.599 | X | 0.511 | 0.771 |
ELIT_SINU | 0.572 | 0.6 | 0.691 | X | 0.599 |
ELIT_TENT | 0.181 | 0.544 | 0.23 | 0.401 | X |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zúñiga-Valenzuela, P.; Crawford, B.; Cisternas-Caneo, F.; Rodriguez-Tello, E.; Soto, R.; Barrera-Garcia, J.; Lepe-Silva, F. Binary Chaotic White Shark Optimizer for the Unicost Set Covering Problem. Mathematics 2025, 13, 2175. https://doi.org/10.3390/math13132175
Zúñiga-Valenzuela P, Crawford B, Cisternas-Caneo F, Rodriguez-Tello E, Soto R, Barrera-Garcia J, Lepe-Silva F. Binary Chaotic White Shark Optimizer for the Unicost Set Covering Problem. Mathematics. 2025; 13(13):2175. https://doi.org/10.3390/math13132175
Chicago/Turabian StyleZúñiga-Valenzuela, Pablo, Broderick Crawford, Felipe Cisternas-Caneo, Eduardo Rodriguez-Tello, Ricardo Soto, José Barrera-Garcia, and Fernando Lepe-Silva. 2025. "Binary Chaotic White Shark Optimizer for the Unicost Set Covering Problem" Mathematics 13, no. 13: 2175. https://doi.org/10.3390/math13132175
APA StyleZúñiga-Valenzuela, P., Crawford, B., Cisternas-Caneo, F., Rodriguez-Tello, E., Soto, R., Barrera-Garcia, J., & Lepe-Silva, F. (2025). Binary Chaotic White Shark Optimizer for the Unicost Set Covering Problem. Mathematics, 13(13), 2175. https://doi.org/10.3390/math13132175